summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authornaddy@openbsd.org <naddy@openbsd.org>2019-12-19 15:09:30 +0000
committerDarren Tucker <dtucker@dtucker.net>2019-12-20 14:25:08 +1100
commitae024b22c4fd68e7f39681d605585889f9511108 (patch)
tree13b0f16f9f778ba7169ccc5a7ab11a62dec36368
parentbc2dc091e0ac4ff6245c43a61ebe12c7e9ea0b7f (diff)
upstream: Document that security key-hosted keys can act as host
keys. Update the list of default host key algorithms in ssh_config.5 and sshd_config.5. Copy the description of the SecurityKeyProvider option to sshd_config.5. ok jmc@ OpenBSD-Commit-ID: edadf3566ab5e94582df4377fee3b8b702c7eca0
-rw-r--r--ssh_config.526
-rw-r--r--sshd_config.530
2 files changed, 38 insertions, 18 deletions
diff --git a/ssh_config.5 b/ssh_config.5
index 93029031a..dc7a2143d 100644
--- a/ssh_config.5
+++ b/ssh_config.5
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: ssh_config.5,v 1.310 2019/11/30 07:07:59 jmc Exp $ 36.\" $OpenBSD: ssh_config.5,v 1.311 2019/12/19 15:09:30 naddy Exp $
37.Dd $Mdocdate: November 30 2019 $ 37.Dd $Mdocdate: December 19 2019 $
38.Dt SSH_CONFIG 5 38.Dt SSH_CONFIG 5
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -809,12 +809,16 @@ The default for this option is:
809ecdsa-sha2-nistp256-cert-v01@openssh.com, 809ecdsa-sha2-nistp256-cert-v01@openssh.com,
810ecdsa-sha2-nistp384-cert-v01@openssh.com, 810ecdsa-sha2-nistp384-cert-v01@openssh.com,
811ecdsa-sha2-nistp521-cert-v01@openssh.com, 811ecdsa-sha2-nistp521-cert-v01@openssh.com,
812sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
812ssh-ed25519-cert-v01@openssh.com, 813ssh-ed25519-cert-v01@openssh.com,
814sk-ssh-ed25519-cert-v01@openssh.com,
813rsa-sha2-512-cert-v01@openssh.com, 815rsa-sha2-512-cert-v01@openssh.com,
814rsa-sha2-256-cert-v01@openssh.com, 816rsa-sha2-256-cert-v01@openssh.com,
815ssh-rsa-cert-v01@openssh.com, 817ssh-rsa-cert-v01@openssh.com,
816ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521, 818ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
817ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa 819sk-ecdsa-sha2-nistp256@openssh.com,
820ssh-ed25519,sk-ssh-ed25519@openssh.com,
821rsa-sha2-512,rsa-sha2-256,ssh-rsa
818.Ed 822.Ed
819.Pp 823.Pp
820The 824The
@@ -842,12 +846,16 @@ The default for this option is:
842ecdsa-sha2-nistp256-cert-v01@openssh.com, 846ecdsa-sha2-nistp256-cert-v01@openssh.com,
843ecdsa-sha2-nistp384-cert-v01@openssh.com, 847ecdsa-sha2-nistp384-cert-v01@openssh.com,
844ecdsa-sha2-nistp521-cert-v01@openssh.com, 848ecdsa-sha2-nistp521-cert-v01@openssh.com,
849sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
845ssh-ed25519-cert-v01@openssh.com, 850ssh-ed25519-cert-v01@openssh.com,
851sk-ssh-ed25519-cert-v01@openssh.com,
846rsa-sha2-512-cert-v01@openssh.com, 852rsa-sha2-512-cert-v01@openssh.com,
847rsa-sha2-256-cert-v01@openssh.com, 853rsa-sha2-256-cert-v01@openssh.com,
848ssh-rsa-cert-v01@openssh.com, 854ssh-rsa-cert-v01@openssh.com,
849ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521, 855ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
850ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa 856sk-ecdsa-sha2-nistp256@openssh.com,
857ssh-ed25519,sk-ssh-ed25519@openssh.com,
858rsa-sha2-512,rsa-sha2-256,ssh-rsa
851.Ed 859.Ed
852.Pp 860.Pp
853If hostkeys are known for the destination host then this default is modified 861If hostkeys are known for the destination host then this default is modified
@@ -1323,19 +1331,19 @@ character, then the specified key types will be placed at the head of the
1323default set. 1331default set.
1324The default for this option is: 1332The default for this option is:
1325.Bd -literal -offset 3n 1333.Bd -literal -offset 3n
1326sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
1327ecdsa-sha2-nistp256-cert-v01@openssh.com, 1334ecdsa-sha2-nistp256-cert-v01@openssh.com,
1328ecdsa-sha2-nistp384-cert-v01@openssh.com, 1335ecdsa-sha2-nistp384-cert-v01@openssh.com,
1329ecdsa-sha2-nistp521-cert-v01@openssh.com, 1336ecdsa-sha2-nistp521-cert-v01@openssh.com,
1330sk-ssh-ed25519-cert-v01@openssh.com, 1337sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
1331ssh-ed25519-cert-v01@openssh.com, 1338ssh-ed25519-cert-v01@openssh.com,
1339sk-ssh-ed25519-cert-v01@openssh.com,
1332rsa-sha2-512-cert-v01@openssh.com, 1340rsa-sha2-512-cert-v01@openssh.com,
1333rsa-sha2-256-cert-v01@openssh.com, 1341rsa-sha2-256-cert-v01@openssh.com,
1334ssh-rsa-cert-v01@openssh.com, 1342ssh-rsa-cert-v01@openssh.com,
1335sk-ecdsa-sha2-nistp256@openssh.com,
1336ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521, 1343ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
1337sk-ssh-ed25519@openssh.com, 1344sk-ecdsa-sha2-nistp256@openssh.com,
1338ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa 1345ssh-ed25519,sk-ssh-ed25519@openssh.com,
1346rsa-sha2-512,rsa-sha2-256,ssh-rsa
1339.Ed 1347.Ed
1340.Pp 1348.Pp
1341The list of available key types may also be obtained using 1349The list of available key types may also be obtained using
diff --git a/sshd_config.5 b/sshd_config.5
index 8bfb3b6c8..222193170 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: sshd_config.5,v 1.295 2019/11/30 07:07:59 jmc Exp $ 36.\" $OpenBSD: sshd_config.5,v 1.296 2019/12/19 15:09:30 naddy Exp $
37.Dd $Mdocdate: November 30 2019 $ 37.Dd $Mdocdate: December 19 2019 $
38.Dt SSHD_CONFIG 5 38.Dt SSHD_CONFIG 5
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -689,12 +689,16 @@ The default for this option is:
689ecdsa-sha2-nistp256-cert-v01@openssh.com, 689ecdsa-sha2-nistp256-cert-v01@openssh.com,
690ecdsa-sha2-nistp384-cert-v01@openssh.com, 690ecdsa-sha2-nistp384-cert-v01@openssh.com,
691ecdsa-sha2-nistp521-cert-v01@openssh.com, 691ecdsa-sha2-nistp521-cert-v01@openssh.com,
692sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
692ssh-ed25519-cert-v01@openssh.com, 693ssh-ed25519-cert-v01@openssh.com,
694sk-ssh-ed25519-cert-v01@openssh.com,
693rsa-sha2-512-cert-v01@openssh.com, 695rsa-sha2-512-cert-v01@openssh.com,
694rsa-sha2-256-cert-v01@openssh.com, 696rsa-sha2-256-cert-v01@openssh.com,
695ssh-rsa-cert-v01@openssh.com, 697ssh-rsa-cert-v01@openssh.com,
696ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521, 698ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
697ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa 699sk-ecdsa-sha2-nistp256@openssh.com,
700ssh-ed25519,sk-ssh-ed25519@openssh.com,
701rsa-sha2-512,rsa-sha2-256,ssh-rsa
698.Ed 702.Ed
699.Pp 703.Pp
700The list of available key types may also be obtained using 704The list of available key types may also be obtained using
@@ -768,12 +772,16 @@ The default for this option is:
768ecdsa-sha2-nistp256-cert-v01@openssh.com, 772ecdsa-sha2-nistp256-cert-v01@openssh.com,
769ecdsa-sha2-nistp384-cert-v01@openssh.com, 773ecdsa-sha2-nistp384-cert-v01@openssh.com,
770ecdsa-sha2-nistp521-cert-v01@openssh.com, 774ecdsa-sha2-nistp521-cert-v01@openssh.com,
775sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
771ssh-ed25519-cert-v01@openssh.com, 776ssh-ed25519-cert-v01@openssh.com,
777sk-ssh-ed25519-cert-v01@openssh.com,
772rsa-sha2-512-cert-v01@openssh.com, 778rsa-sha2-512-cert-v01@openssh.com,
773rsa-sha2-256-cert-v01@openssh.com, 779rsa-sha2-256-cert-v01@openssh.com,
774ssh-rsa-cert-v01@openssh.com, 780ssh-rsa-cert-v01@openssh.com,
775ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521, 781ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
776ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa 782sk-ecdsa-sha2-nistp256@openssh.com,
783ssh-ed25519,sk-ssh-ed25519@openssh.com,
784rsa-sha2-512,rsa-sha2-256,ssh-rsa
777.Ed 785.Ed
778.Pp 786.Pp
779The list of available key types may also be obtained using 787The list of available key types may also be obtained using
@@ -1427,19 +1435,19 @@ character, then the specified key types will be placed at the head of the
1427default set. 1435default set.
1428The default for this option is: 1436The default for this option is:
1429.Bd -literal -offset 3n 1437.Bd -literal -offset 3n
1430sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
1431ecdsa-sha2-nistp256-cert-v01@openssh.com, 1438ecdsa-sha2-nistp256-cert-v01@openssh.com,
1432ecdsa-sha2-nistp384-cert-v01@openssh.com, 1439ecdsa-sha2-nistp384-cert-v01@openssh.com,
1433ecdsa-sha2-nistp521-cert-v01@openssh.com, 1440ecdsa-sha2-nistp521-cert-v01@openssh.com,
1434sk-ssh-ed25519-cert-v01@openssh.com, 1441sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
1435ssh-ed25519-cert-v01@openssh.com, 1442ssh-ed25519-cert-v01@openssh.com,
1443sk-ssh-ed25519-cert-v01@openssh.com,
1436rsa-sha2-512-cert-v01@openssh.com, 1444rsa-sha2-512-cert-v01@openssh.com,
1437rsa-sha2-256-cert-v01@openssh.com, 1445rsa-sha2-256-cert-v01@openssh.com,
1438ssh-rsa-cert-v01@openssh.com, 1446ssh-rsa-cert-v01@openssh.com,
1439sk-ecdsa-sha2-nistp256@openssh.com,
1440ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521, 1447ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
1441sk-ssh-ed25519@openssh.com, 1448sk-ecdsa-sha2-nistp256@openssh.com,
1442ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa 1449ssh-ed25519,sk-ssh-ed25519@openssh.com,
1450rsa-sha2-512,rsa-sha2-256,ssh-rsa
1443.Ed 1451.Ed
1444.Pp 1452.Pp
1445The list of available key types may also be obtained using 1453The list of available key types may also be obtained using
@@ -1518,6 +1526,10 @@ will be bound to this
1518If the routing domain is set to 1526If the routing domain is set to
1519.Cm \&%D , 1527.Cm \&%D ,
1520then the domain in which the incoming connection was received will be applied. 1528then the domain in which the incoming connection was received will be applied.
1529.It Cm SecurityKeyProvider
1530Specifies a path to a security key provider library that will be used when
1531loading any security key-hosted keys, overriding the default of using
1532the built-in support for USB HID keys.
1521.It Cm SetEnv 1533.It Cm SetEnv
1522Specifies one or more environment variables to set in child sessions started 1534Specifies one or more environment variables to set in child sessions started
1523by 1535by