summaryrefslogtreecommitdiff
path: root/ssh.0
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2011-09-06 14:56:29 +0100
committerColin Watson <cjwatson@debian.org>2011-09-06 14:56:29 +0100
commit978e62d6f14c60747bddef2cc72d66a9c8b83b54 (patch)
tree89400a44e42d84937deba7864e4964d6c7734da5 /ssh.0
parent87c685b8c6a49814fd782288097b3093f975aa72 (diff)
parent3a7e89697ca363de0f64e0d5704c57219294e41c (diff)
* New upstream release (http://www.openssh.org/txt/release-5.9).
- Introduce sandboxing of the pre-auth privsep child using an optional sshd_config(5) "UsePrivilegeSeparation=sandbox" mode that enables mandatory restrictions on the syscalls the privsep child can perform. - Add new SHA256-based HMAC transport integrity modes from http://www.ietf.org/id/draft-dbider-sha2-mac-for-ssh-02.txt. - The pre-authentication sshd(8) privilege separation slave process now logs via a socket shared with the master process, avoiding the need to maintain /dev/log inside the chroot (closes: #75043, #429243, #599240). - ssh(1) now warns when a server refuses X11 forwarding (closes: #504757). - sshd_config(5)'s AuthorizedKeysFile now accepts multiple paths, separated by whitespace (closes: #76312). The authorized_keys2 fallback is deprecated but documented (closes: #560156). - ssh(1) and sshd(8): set IPv6 traffic class from IPQoS, as well as IPv4 ToS/DSCP (closes: #498297). - ssh-add(1) now accepts keys piped from standard input. E.g. "ssh-add - < /path/to/key" (closes: #229124). - Clean up lost-passphrase text in ssh-keygen(1) (closes: #444691). - Say "required" rather than "recommended" in unprotected-private-key warning (LP: #663455).
Diffstat (limited to 'ssh.0')
-rw-r--r--ssh.013
1 files changed, 8 insertions, 5 deletions
diff --git a/ssh.0 b/ssh.0
index c1d3135ce..1c98f7780 100644
--- a/ssh.0
+++ b/ssh.0
@@ -202,8 +202,9 @@ DESCRIPTION
202 the -O option is specified, the ctl_cmd argument is interpreted 202 the -O option is specified, the ctl_cmd argument is interpreted
203 and passed to the master process. Valid commands are: ``check'' 203 and passed to the master process. Valid commands are: ``check''
204 (check that the master process is running), ``forward'' (request 204 (check that the master process is running), ``forward'' (request
205 forwardings without command execution) and ``exit'' (request the 205 forwardings without command execution), ``exit'' (request the
206 master to exit). 206 master to exit), and ``stop'' (request the master to stop
207 accepting further multiplexing requests).
207 208
208 -o option 209 -o option
209 Can be used to give options in the format used in the 210 Can be used to give options in the format used in the
@@ -263,6 +264,7 @@ DESCRIPTION
263 PubkeyAuthentication 264 PubkeyAuthentication
264 RekeyLimit 265 RekeyLimit
265 RemoteForward 266 RemoteForward
267 RequestTTY
266 RhostsRSAAuthentication 268 RhostsRSAAuthentication
267 RSAAuthentication 269 RSAAuthentication
268 SendEnv 270 SendEnv
@@ -389,8 +391,9 @@ AUTHENTICATION
389 support similar authentication methods, but protocol 2 is the default 391 support similar authentication methods, but protocol 2 is the default
390 since it provides additional mechanisms for confidentiality (the traffic 392 since it provides additional mechanisms for confidentiality (the traffic
391 is encrypted using AES, 3DES, Blowfish, CAST128, or Arcfour) and 393 is encrypted using AES, 3DES, Blowfish, CAST128, or Arcfour) and
392 integrity (hmac-md5, hmac-sha1, umac-64, hmac-ripemd160). Protocol 1 394 integrity (hmac-md5, hmac-sha1, hmac-sha2-256, hmac-sha2-512, umac-64,
393 lacks a strong mechanism for ensuring the integrity of the connection. 395 hmac-ripemd160). Protocol 1 lacks a strong mechanism for ensuring the
396 integrity of the connection.
394 397
395 The methods available for authentication are: GSSAPI-based 398 The methods available for authentication are: GSSAPI-based
396 authentication, host-based authentication, public key authentication, 399 authentication, host-based authentication, public key authentication,
@@ -895,4 +898,4 @@ AUTHORS
895 created OpenSSH. Markus Friedl contributed the support for SSH protocol 898 created OpenSSH. Markus Friedl contributed the support for SSH protocol
896 versions 1.5 and 2.0. 899 versions 1.5 and 2.0.
897 900
898OpenBSD 4.9 November 18, 2010 OpenBSD 4.9 901OpenBSD 5.0 August 2, 2011 OpenBSD 5.0