summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2001-09-12 16:52:28 +0000
committerBen Lindstrom <mouring@eviladmin.org>2001-09-12 16:52:28 +0000
commitffa1dd681712f92c71444cea28975265b826e8e8 (patch)
tree97a6275941f2e15ba8d05944a45fcace988bb484
parent044274bcb0ed2b0153d520ce500ebd886e0105f1 (diff)
- stevesk@cvs.openbsd.org 2001/08/22 17:45:16
[ssh.1] document cipher des for protocol 1; ok deraadt@
-rw-r--r--ChangeLog5
-rw-r--r--ssh.129
2 files changed, 25 insertions, 9 deletions
diff --git a/ChangeLog b/ChangeLog
index 61f07163d..900b40fbd 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -19,6 +19,9 @@
19 - stevesk@cvs.openbsd.org 2001/08/22 16:30:02 19 - stevesk@cvs.openbsd.org 2001/08/22 16:30:02
20 [sshd.8] 20 [sshd.8]
21 no rexd; ok markus@ 21 no rexd; ok markus@
22 - stevesk@cvs.openbsd.org 2001/08/22 17:45:16
23 [ssh.1]
24 document cipher des for protocol 1; ok deraadt@
22 25
2320010815 2620010815
24 - (bal) Fixed stray code in readconf.c that went in by mistake. 27 - (bal) Fixed stray code in readconf.c that went in by mistake.
@@ -6342,4 +6345,4 @@
6342 - Wrote replacements for strlcpy and mkdtemp 6345 - Wrote replacements for strlcpy and mkdtemp
6343 - Released 1.0pre1 6346 - Released 1.0pre1
6344 6347
6345$Id: ChangeLog,v 1.1490 2001/09/12 16:46:08 mouring Exp $ 6348$Id: ChangeLog,v 1.1491 2001/09/12 16:52:28 mouring Exp $
diff --git a/ssh.1 b/ssh.1
index ff08013bb..4fef3d587 100644
--- a/ssh.1
+++ b/ssh.1
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: ssh.1,v 1.130 2001/08/22 16:21:21 stevesk Exp $ 37.\" $OpenBSD: ssh.1,v 1.131 2001/08/22 17:45:16 stevesk Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSH 1 39.Dt SSH 1
40.Os 40.Os
@@ -389,20 +389,24 @@ This can also be specified on a per-host basis in a configuration file.
389.It Fl b Ar bind_address 389.It Fl b Ar bind_address
390Specify the interface to transmit from on machines with multiple 390Specify the interface to transmit from on machines with multiple
391interfaces or aliased addresses. 391interfaces or aliased addresses.
392.It Fl c Ar blowfish|3des 392.It Fl c Ar blowfish|3des|des
393Selects the cipher to use for encrypting the session. 393Selects the cipher to use for encrypting the session.
394.Ar 3des 394.Ar 3des
395is used by default. 395is used by default.
396It is believed to be secure. 396It is believed to be secure.
397.Ar 3des 397.Ar 3des
398(triple-des) is an encrypt-decrypt-encrypt triple with three different keys. 398(triple-des) is an encrypt-decrypt-encrypt triple with three different keys.
399It is presumably more secure than the
400.Ar des
401cipher which is no longer fully supported in
402.Nm ssh .
403.Ar blowfish 399.Ar blowfish
404is a fast block cipher, it appears very secure and is much faster than 400is a fast block cipher, it appears very secure and is much faster than
405.Ar 3des . 401.Ar 3des .
402.Ar des
403is only supported in the
404.Nm
405client for interoperability with legacy protocol 1 implementations
406that do not support the
407.Ar 3des
408cipher. Its use is strongly discouraged due to cryptographic
409weaknesses.
406.It Fl c Ar cipher_spec 410.It Fl c Ar cipher_spec
407Additionally, for protocol version 2 a comma-separated list of ciphers can 411Additionally, for protocol version 2 a comma-separated list of ciphers can
408be specified in order of preference. 412be specified in order of preference.
@@ -714,10 +718,19 @@ The default is
714Specifies the cipher to use for encrypting the session 718Specifies the cipher to use for encrypting the session
715in protocol version 1. 719in protocol version 1.
716Currently, 720Currently,
717.Dq blowfish 721.Dq blowfish ,
722.Dq 3des ,
718and 723and
719.Dq 3des 724.Dq des
720are supported. 725are supported.
726.Ar des
727is only supported in the
728.Nm
729client for interoperability with legacy protocol 1 implementations
730that do not support the
731.Ar 3des
732cipher. Its use is strongly discouraged due to cryptographic
733weaknesses.
721The default is 734The default is
722.Dq 3des . 735.Dq 3des .
723.It Cm Ciphers 736.It Cm Ciphers