diff options
author | Colin Watson <cjwatson@debian.org> | 2018-08-24 12:49:36 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2018-08-30 00:57:27 +0100 |
commit | 816386e17654ca36834bebbf351419e460fad8f6 (patch) | |
tree | 3dc79d831cb73bc25b92f5a4d18f8e328c0c570a /PROTOCOL | |
parent | 3e6f76c7039d3df22b1d0a3a5f30150efb09b69d (diff) | |
parent | 16a47fc4b04977a14f44dd433c8da1499fa80671 (diff) |
New upstream release (7.8p1)
Closes: #907534
Diffstat (limited to 'PROTOCOL')
-rw-r--r-- | PROTOCOL | 37 |
1 files changed, 34 insertions, 3 deletions
@@ -428,7 +428,7 @@ The values of the f_flag bitmask are as follows: | |||
428 | Both the "statvfs@openssh.com" and "fstatvfs@openssh.com" extensions are | 428 | Both the "statvfs@openssh.com" and "fstatvfs@openssh.com" extensions are |
429 | advertised in the SSH_FXP_VERSION hello with version "2". | 429 | advertised in the SSH_FXP_VERSION hello with version "2". |
430 | 430 | ||
431 | 10. sftp: Extension request "hardlink@openssh.com" | 431 | 3.5. sftp: Extension request "hardlink@openssh.com" |
432 | 432 | ||
433 | This request is for creating a hard link to a regular file. This | 433 | This request is for creating a hard link to a regular file. This |
434 | request is implemented as a SSH_FXP_EXTENDED request with the | 434 | request is implemented as a SSH_FXP_EXTENDED request with the |
@@ -444,7 +444,7 @@ link(oldpath, newpath) and will respond with a SSH_FXP_STATUS message. | |||
444 | This extension is advertised in the SSH_FXP_VERSION hello with version | 444 | This extension is advertised in the SSH_FXP_VERSION hello with version |
445 | "1". | 445 | "1". |
446 | 446 | ||
447 | 10. sftp: Extension request "fsync@openssh.com" | 447 | 3.6. sftp: Extension request "fsync@openssh.com" |
448 | 448 | ||
449 | This request asks the server to call fsync(2) on an open file handle. | 449 | This request asks the server to call fsync(2) on an open file handle. |
450 | 450 | ||
@@ -458,4 +458,35 @@ respond with a SSH_FXP_STATUS message. | |||
458 | This extension is advertised in the SSH_FXP_VERSION hello with version | 458 | This extension is advertised in the SSH_FXP_VERSION hello with version |
459 | "1". | 459 | "1". |
460 | 460 | ||
461 | $OpenBSD: PROTOCOL,v 1.32 2018/02/19 00:55:02 djm Exp $ | 461 | 4. Miscellaneous changes |
462 | |||
463 | 4.1 Public key format | ||
464 | |||
465 | OpenSSH public keys, as generated by ssh-keygen(1) and appearing in | ||
466 | authorized_keys files, are formatted as a single line of text consisting | ||
467 | of the public key algorithm name followed by a base64-encoded key blob. | ||
468 | The public key blob (before base64 encoding) is the same format used for | ||
469 | the encoding of public keys sent on the wire: as described in RFC4253 | ||
470 | section 6.6 for RSA and DSA keys, RFC5656 section 3.1 for ECDSA keys | ||
471 | and the "New public key formats" section of PROTOCOL.certkeys for the | ||
472 | OpenSSH certificate formats. | ||
473 | |||
474 | 4.2 Private key format | ||
475 | |||
476 | OpenSSH private keys, as generated by ssh-keygen(1) use the format | ||
477 | described in PROTOCOL.key by default. As a legacy option, PEM format | ||
478 | (RFC7468) private keys are also supported for RSA, DSA and ECDSA keys | ||
479 | and were the default format before OpenSSH 7.8. | ||
480 | |||
481 | 4.3 KRL format | ||
482 | |||
483 | OpenSSH supports a compact format for Key Revocation Lists (KRLs). This | ||
484 | format is described in the PROTOCOL.krl file. | ||
485 | |||
486 | 4.4 Connection multiplexing | ||
487 | |||
488 | OpenSSH's connection multiplexing uses messages as described in | ||
489 | PROTOCOL.mux over a Unix domain socket for communications between a | ||
490 | master instance and later clients. | ||
491 | |||
492 | $OpenBSD: PROTOCOL,v 1.35 2018/08/10 00:44:01 djm Exp $ | ||