diff options
author | Colin Watson <cjwatson@debian.org> | 2011-09-06 14:56:29 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2011-09-06 14:56:29 +0100 |
commit | 978e62d6f14c60747bddef2cc72d66a9c8b83b54 (patch) | |
tree | 89400a44e42d84937deba7864e4964d6c7734da5 /ssh.0 | |
parent | 87c685b8c6a49814fd782288097b3093f975aa72 (diff) | |
parent | 3a7e89697ca363de0f64e0d5704c57219294e41c (diff) |
* New upstream release (http://www.openssh.org/txt/release-5.9).
- Introduce sandboxing of the pre-auth privsep child using an optional
sshd_config(5) "UsePrivilegeSeparation=sandbox" mode that enables
mandatory restrictions on the syscalls the privsep child can perform.
- Add new SHA256-based HMAC transport integrity modes from
http://www.ietf.org/id/draft-dbider-sha2-mac-for-ssh-02.txt.
- The pre-authentication sshd(8) privilege separation slave process now
logs via a socket shared with the master process, avoiding the need to
maintain /dev/log inside the chroot (closes: #75043, #429243,
#599240).
- ssh(1) now warns when a server refuses X11 forwarding (closes:
#504757).
- sshd_config(5)'s AuthorizedKeysFile now accepts multiple paths,
separated by whitespace (closes: #76312). The authorized_keys2
fallback is deprecated but documented (closes: #560156).
- ssh(1) and sshd(8): set IPv6 traffic class from IPQoS, as well as IPv4
ToS/DSCP (closes: #498297).
- ssh-add(1) now accepts keys piped from standard input. E.g. "ssh-add
- < /path/to/key" (closes: #229124).
- Clean up lost-passphrase text in ssh-keygen(1) (closes: #444691).
- Say "required" rather than "recommended" in unprotected-private-key
warning (LP: #663455).
Diffstat (limited to 'ssh.0')
-rw-r--r-- | ssh.0 | 13 |
1 files changed, 8 insertions, 5 deletions
@@ -202,8 +202,9 @@ DESCRIPTION | |||
202 | the -O option is specified, the ctl_cmd argument is interpreted | 202 | the -O option is specified, the ctl_cmd argument is interpreted |
203 | and passed to the master process. Valid commands are: ``check'' | 203 | and passed to the master process. Valid commands are: ``check'' |
204 | (check that the master process is running), ``forward'' (request | 204 | (check that the master process is running), ``forward'' (request |
205 | forwardings without command execution) and ``exit'' (request the | 205 | forwardings without command execution), ``exit'' (request the |
206 | master to exit). | 206 | master to exit), and ``stop'' (request the master to stop |
207 | accepting further multiplexing requests). | ||
207 | 208 | ||
208 | -o option | 209 | -o option |
209 | Can be used to give options in the format used in the | 210 | Can be used to give options in the format used in the |
@@ -263,6 +264,7 @@ DESCRIPTION | |||
263 | PubkeyAuthentication | 264 | PubkeyAuthentication |
264 | RekeyLimit | 265 | RekeyLimit |
265 | RemoteForward | 266 | RemoteForward |
267 | RequestTTY | ||
266 | RhostsRSAAuthentication | 268 | RhostsRSAAuthentication |
267 | RSAAuthentication | 269 | RSAAuthentication |
268 | SendEnv | 270 | SendEnv |
@@ -389,8 +391,9 @@ AUTHENTICATION | |||
389 | support similar authentication methods, but protocol 2 is the default | 391 | support similar authentication methods, but protocol 2 is the default |
390 | since it provides additional mechanisms for confidentiality (the traffic | 392 | since it provides additional mechanisms for confidentiality (the traffic |
391 | is encrypted using AES, 3DES, Blowfish, CAST128, or Arcfour) and | 393 | is encrypted using AES, 3DES, Blowfish, CAST128, or Arcfour) and |
392 | integrity (hmac-md5, hmac-sha1, umac-64, hmac-ripemd160). Protocol 1 | 394 | integrity (hmac-md5, hmac-sha1, hmac-sha2-256, hmac-sha2-512, umac-64, |
393 | lacks a strong mechanism for ensuring the integrity of the connection. | 395 | hmac-ripemd160). Protocol 1 lacks a strong mechanism for ensuring the |
396 | integrity of the connection. | ||
394 | 397 | ||
395 | The methods available for authentication are: GSSAPI-based | 398 | The methods available for authentication are: GSSAPI-based |
396 | authentication, host-based authentication, public key authentication, | 399 | authentication, host-based authentication, public key authentication, |
@@ -895,4 +898,4 @@ AUTHORS | |||
895 | created OpenSSH. Markus Friedl contributed the support for SSH protocol | 898 | created OpenSSH. Markus Friedl contributed the support for SSH protocol |
896 | versions 1.5 and 2.0. | 899 | versions 1.5 and 2.0. |
897 | 900 | ||
898 | OpenBSD 4.9 November 18, 2010 OpenBSD 4.9 | 901 | OpenBSD 5.0 August 2, 2011 OpenBSD 5.0 |