diff options
author | Darren Tucker <dtucker@zip.com.au> | 2009-10-24 11:42:44 +1100 |
---|---|---|
committer | Darren Tucker <dtucker@zip.com.au> | 2009-10-24 11:42:44 +1100 |
commit | 98c9aec30e75ba890ed36227793e1e5ea6a23d45 (patch) | |
tree | 55b22950c2ebebb4adcd7a29353b5a0eacb4ea4f | |
parent | ae69e1d010ddf367fdd8ecf7f006c54cfe3f9728 (diff) |
- sobrado@cvs.openbsd.org 2009/10/22 15:02:12
[ssh-agent.1 ssh-add.1 ssh.1]
write UNIX-domain in a more consistent way; while here, replace a
few remaining ".Tn UNIX" macros with ".Ux" ones.
pointed out by ratchov@, thanks!
ok jmc@
-rw-r--r-- | ChangeLog | 6 | ||||
-rw-r--r-- | ssh-add.1 | 6 | ||||
-rw-r--r-- | ssh-agent.1 | 15 | ||||
-rw-r--r-- | ssh.1 | 6 |
4 files changed, 19 insertions, 14 deletions
@@ -10,6 +10,12 @@ | |||
10 | [ssh.1 ssh-agent.1 ssh-add.1] | 10 | [ssh.1 ssh-agent.1 ssh-add.1] |
11 | use the UNIX-related macros (.At and .Ux) where appropriate. | 11 | use the UNIX-related macros (.At and .Ux) where appropriate. |
12 | ok jmc@ | 12 | ok jmc@ |
13 | - sobrado@cvs.openbsd.org 2009/10/22 15:02:12 | ||
14 | [ssh-agent.1 ssh-add.1 ssh.1] | ||
15 | write UNIX-domain in a more consistent way; while here, replace a | ||
16 | few remaining ".Tn UNIX" macros with ".Ux" ones. | ||
17 | pointed out by ratchov@, thanks! | ||
18 | ok jmc@ | ||
13 | 19 | ||
14 | 20091011 | 20 | 20091011 |
15 | - (dtucker) [configure.ac sftp-client.c] Remove the gyrations required for | 21 | - (dtucker) [configure.ac sftp-client.c] Remove the gyrations required for |
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ssh-add.1,v 1.47 2009/10/22 12:35:53 sobrado Exp $ | 1 | .\" $OpenBSD: ssh-add.1,v 1.48 2009/10/22 15:02:12 sobrado Exp $ |
2 | .\" | 2 | .\" |
3 | .\" -*- nroff -*- | 3 | .\" -*- nroff -*- |
4 | .\" | 4 | .\" |
@@ -149,8 +149,8 @@ may be necessary to redirect the input from | |||
149 | to make this work.) | 149 | to make this work.) |
150 | .It Ev SSH_AUTH_SOCK | 150 | .It Ev SSH_AUTH_SOCK |
151 | Identifies the path of a | 151 | Identifies the path of a |
152 | .Ux | 152 | .Ux Ns -domain |
153 | domain socket used to communicate with the agent. | 153 | socket used to communicate with the agent. |
154 | .El | 154 | .El |
155 | .Sh FILES | 155 | .Sh FILES |
156 | .Bl -tag -width Ds | 156 | .Bl -tag -width Ds |
diff --git a/ssh-agent.1 b/ssh-agent.1 index bbae4af92..acc115bd4 100644 --- a/ssh-agent.1 +++ b/ssh-agent.1 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ssh-agent.1,v 1.48 2009/10/22 12:35:53 sobrado Exp $ | 1 | .\" $OpenBSD: ssh-agent.1,v 1.49 2009/10/22 15:02:12 sobrado Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | .\" Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -68,8 +68,8 @@ The options are as follows: | |||
68 | .Bl -tag -width Ds | 68 | .Bl -tag -width Ds |
69 | .It Fl a Ar bind_address | 69 | .It Fl a Ar bind_address |
70 | Bind the agent to the | 70 | Bind the agent to the |
71 | .Ux | 71 | .Ux Ns -domain |
72 | domain socket | 72 | socket |
73 | .Ar bind_address . | 73 | .Ar bind_address . |
74 | The default is | 74 | The default is |
75 | .Pa /tmp/ssh-XXXXXXXXXX/agent.\*(Ltppid\*(Gt . | 75 | .Pa /tmp/ssh-XXXXXXXXXX/agent.\*(Ltppid\*(Gt . |
@@ -165,8 +165,8 @@ by the agent, and the result will be returned to the requester. | |||
165 | This way, private keys are not exposed to clients using the agent. | 165 | This way, private keys are not exposed to clients using the agent. |
166 | .Pp | 166 | .Pp |
167 | A | 167 | A |
168 | .Ux | 168 | .Ux Ns -domain |
169 | domain socket is created and the name of this socket is stored in the | 169 | socket is created and the name of this socket is stored in the |
170 | .Ev SSH_AUTH_SOCK | 170 | .Ev SSH_AUTH_SOCK |
171 | environment | 171 | environment |
172 | variable. | 172 | variable. |
@@ -189,9 +189,8 @@ Contains the protocol version 2 DSA authentication identity of the user. | |||
189 | .It Pa ~/.ssh/id_rsa | 189 | .It Pa ~/.ssh/id_rsa |
190 | Contains the protocol version 2 RSA authentication identity of the user. | 190 | Contains the protocol version 2 RSA authentication identity of the user. |
191 | .It Pa /tmp/ssh-XXXXXXXXXX/agent.\*(Ltppid\*(Gt | 191 | .It Pa /tmp/ssh-XXXXXXXXXX/agent.\*(Ltppid\*(Gt |
192 | .Ux | 192 | .Ux Ns -domain |
193 | domain sockets used to contain the connection to the | 193 | sockets used to contain the connection to the authentication agent. |
194 | authentication agent. | ||
195 | These sockets should only be readable by the owner. | 194 | These sockets should only be readable by the owner. |
196 | The sockets should get automatically removed when the agent exits. | 195 | The sockets should get automatically removed when the agent exits. |
197 | .El | 196 | .El |
@@ -34,7 +34,7 @@ | |||
34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
36 | .\" | 36 | .\" |
37 | .\" $OpenBSD: ssh.1,v 1.285 2009/10/22 12:35:53 sobrado Exp $ | 37 | .\" $OpenBSD: ssh.1,v 1.286 2009/10/22 15:02:12 sobrado Exp $ |
38 | .Dd $Mdocdate: October 22 2009 $ | 38 | .Dd $Mdocdate: October 22 2009 $ |
39 | .Dt SSH 1 | 39 | .Dt SSH 1 |
40 | .Os | 40 | .Os |
@@ -133,8 +133,8 @@ This can also be specified on a per-host basis in a configuration file. | |||
133 | Agent forwarding should be enabled with caution. | 133 | Agent forwarding should be enabled with caution. |
134 | Users with the ability to bypass file permissions on the remote host | 134 | Users with the ability to bypass file permissions on the remote host |
135 | (for the agent's | 135 | (for the agent's |
136 | .Ux | 136 | .Ux Ns -domain |
137 | domain socket) can access the local agent through the forwarded connection. | 137 | socket) can access the local agent through the forwarded connection. |
138 | An attacker cannot obtain key material from the agent, | 138 | An attacker cannot obtain key material from the agent, |
139 | however they can perform operations on the keys that enable them to | 139 | however they can perform operations on the keys that enable them to |
140 | authenticate using the identities loaded into the agent. | 140 | authenticate using the identities loaded into the agent. |