diff options
author | Colin Watson <cjwatson@debian.org> | 2011-09-06 14:56:29 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2011-09-06 14:56:29 +0100 |
commit | 978e62d6f14c60747bddef2cc72d66a9c8b83b54 (patch) | |
tree | 89400a44e42d84937deba7864e4964d6c7734da5 /moduli.0 | |
parent | 87c685b8c6a49814fd782288097b3093f975aa72 (diff) | |
parent | 3a7e89697ca363de0f64e0d5704c57219294e41c (diff) |
* New upstream release (http://www.openssh.org/txt/release-5.9).
- Introduce sandboxing of the pre-auth privsep child using an optional
sshd_config(5) "UsePrivilegeSeparation=sandbox" mode that enables
mandatory restrictions on the syscalls the privsep child can perform.
- Add new SHA256-based HMAC transport integrity modes from
http://www.ietf.org/id/draft-dbider-sha2-mac-for-ssh-02.txt.
- The pre-authentication sshd(8) privilege separation slave process now
logs via a socket shared with the master process, avoiding the need to
maintain /dev/log inside the chroot (closes: #75043, #429243,
#599240).
- ssh(1) now warns when a server refuses X11 forwarding (closes:
#504757).
- sshd_config(5)'s AuthorizedKeysFile now accepts multiple paths,
separated by whitespace (closes: #76312). The authorized_keys2
fallback is deprecated but documented (closes: #560156).
- ssh(1) and sshd(8): set IPv6 traffic class from IPQoS, as well as IPv4
ToS/DSCP (closes: #498297).
- ssh-add(1) now accepts keys piped from standard input. E.g. "ssh-add
- < /path/to/key" (closes: #229124).
- Clean up lost-passphrase text in ssh-keygen(1) (closes: #444691).
- Say "required" rather than "recommended" in unprotected-private-key
warning (LP: #663455).
Diffstat (limited to 'moduli.0')
-rw-r--r-- | moduli.0 | 30 |
1 files changed, 15 insertions, 15 deletions
@@ -1,7 +1,7 @@ | |||
1 | MODULI(5) OpenBSD Programmer's Manual MODULI(5) | 1 | MODULI(5) OpenBSD Programmer's Manual MODULI(5) |
2 | 2 | ||
3 | NAME | 3 | NAME |
4 | moduli - Diffie Hellman moduli | 4 | moduli - Diffie-Hellman moduli |
5 | 5 | ||
6 | DESCRIPTION | 6 | DESCRIPTION |
7 | The /etc/moduli file contains prime numbers and generators for use by | 7 | The /etc/moduli file contains prime numbers and generators for use by |
@@ -10,12 +10,12 @@ DESCRIPTION | |||
10 | New moduli may be generated with ssh-keygen(1) using a two-step process. | 10 | New moduli may be generated with ssh-keygen(1) using a two-step process. |
11 | An initial candidate generation pass, using ssh-keygen -G, calculates | 11 | An initial candidate generation pass, using ssh-keygen -G, calculates |
12 | numbers that are likely to be useful. A second primality testing pass, | 12 | numbers that are likely to be useful. A second primality testing pass, |
13 | using ssh-keygen -T provides a high degree of assurance that the numbers | 13 | using ssh-keygen -T, provides a high degree of assurance that the numbers |
14 | are prime and are safe for use in Diffie Hellman operations by sshd(8). | 14 | are prime and are safe for use in Diffie-Hellman operations by sshd(8). |
15 | This moduli format is used as the output from each pass. | 15 | This moduli format is used as the output from each pass. |
16 | 16 | ||
17 | The file consists of newline-separated records, one per modulus, | 17 | The file consists of newline-separated records, one per modulus, |
18 | containing seven space separated fields. These fields are as follows: | 18 | containing seven space-separated fields. These fields are as follows: |
19 | 19 | ||
20 | timestamp The time that the modulus was last processed as | 20 | timestamp The time that the modulus was last processed as |
21 | YYYYMMDDHHMMSS. | 21 | YYYYMMDDHHMMSS. |
@@ -23,12 +23,12 @@ DESCRIPTION | |||
23 | type Decimal number specifying the internal structure of | 23 | type Decimal number specifying the internal structure of |
24 | the prime modulus. Supported types are: | 24 | the prime modulus. Supported types are: |
25 | 25 | ||
26 | 0 Unknown, not tested | 26 | 0 Unknown, not tested. |
27 | 2 "Safe" prime; (p-1)/2 is also prime. | 27 | 2 "Safe" prime; (p-1)/2 is also prime. |
28 | 4 Sophie Germain; (p+1)*2 is also prime. | 28 | 4 Sophie Germain; (p+1)*2 is also prime. |
29 | 29 | ||
30 | Moduli candidates initially produced by ssh-keygen(1) | 30 | Moduli candidates initially produced by ssh-keygen(1) |
31 | are Sophie Germain primes (type 4). Futher primality | 31 | are Sophie Germain primes (type 4). Further primality |
32 | testing with ssh-keygen(1) produces safe prime moduli | 32 | testing with ssh-keygen(1) produces safe prime moduli |
33 | (type 2) that are ready for use in sshd(8). Other | 33 | (type 2) that are ready for use in sshd(8). Other |
34 | types are not used by OpenSSH. | 34 | types are not used by OpenSSH. |
@@ -37,18 +37,18 @@ DESCRIPTION | |||
37 | that the number has been subjected to represented as a | 37 | that the number has been subjected to represented as a |
38 | bitmask of the following values: | 38 | bitmask of the following values: |
39 | 39 | ||
40 | 0x00 Not tested | 40 | 0x00 Not tested. |
41 | 0x01 Composite number - not prime. | 41 | 0x01 Composite number - not prime. |
42 | 0x02 Sieve of Eratosthenes | 42 | 0x02 Sieve of Eratosthenes. |
43 | 0x04 Probabalistic Miller-Rabin primality tests. | 43 | 0x04 Probabilistic Miller-Rabin primality tests. |
44 | 44 | ||
45 | The ssh-keygen(1) moduli candidate generation uses the | 45 | The ssh-keygen(1) moduli candidate generation uses the |
46 | Sieve of Eratosthenes (flag 0x02). Subsequent | 46 | Sieve of Eratosthenes (flag 0x02). Subsequent |
47 | ssh-keygen(1) primality tests are Miller-Rabin tests | 47 | ssh-keygen(1) primality tests are Miller-Rabin tests |
48 | (flag 0x04). | 48 | (flag 0x04). |
49 | 49 | ||
50 | trials Decimal number indicating of primaility trials that | 50 | trials Decimal number indicating the number of primality |
51 | have been performed on the modulus. | 51 | trials that have been performed on the modulus. |
52 | 52 | ||
53 | size Decimal number indicating the size of the prime in | 53 | size Decimal number indicating the size of the prime in |
54 | bits. | 54 | bits. |
@@ -58,15 +58,15 @@ DESCRIPTION | |||
58 | 58 | ||
59 | modulus The modulus itself in hexadecimal. | 59 | modulus The modulus itself in hexadecimal. |
60 | 60 | ||
61 | When performing Diffie Hellman Group Exchange, sshd(8) first estimates | 61 | When performing Diffie-Hellman Group Exchange, sshd(8) first estimates |
62 | the size of the modulus required to produce enough Diffie Hellman output | 62 | the size of the modulus required to produce enough Diffie-Hellman output |
63 | to sufficiently key the selected symmetric cipher. sshd(8) then randomly | 63 | to sufficiently key the selected symmetric cipher. sshd(8) then randomly |
64 | selects a modulus from /etc/moduli that best meets the size requirement. | 64 | selects a modulus from /etc/moduli that best meets the size requirement. |
65 | 65 | ||
66 | SEE ALSO | 66 | SEE ALSO |
67 | ssh-keygen(1), sshd(8), | 67 | ssh-keygen(1), sshd(8) |
68 | 68 | ||
69 | Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer | 69 | Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer |
70 | Protocol, RFC 4419, 2006. | 70 | Protocol, RFC 4419, 2006. |
71 | 71 | ||
72 | OpenBSD 4.9 June 26, 2008 OpenBSD 4.9 | 72 | OpenBSD 5.0 October 14, 2010 OpenBSD 5.0 |