summaryrefslogtreecommitdiff
path: root/ssh.0
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2010-01-01 23:53:30 +0000
committerColin Watson <cjwatson@debian.org>2010-01-01 23:53:30 +0000
commitdf03186a4f9e0c2ece398b5c0571cb6263d7a752 (patch)
tree1aab079441dff9615274769b19f2d734ddf508dd /ssh.0
parent6ad6994c288662fca6949f42bf91fec2aff00bca (diff)
parent99b402ea4c8457b0a3cafff37f5b3410a8dc6476 (diff)
* New upstream release (closes: #536182). Yes, I know 5.3p1 has been out
for a while, but there's no GSSAPI patch available for it yet. - Change the default cipher order to prefer the AES CTR modes and the revised "arcfour256" mode to CBC mode ciphers that are susceptible to CPNI-957037 "Plaintext Recovery Attack Against SSH". - Add countermeasures to mitigate CPNI-957037-style attacks against the SSH protocol's use of CBC-mode ciphers. Upon detection of an invalid packet length or Message Authentication Code, ssh/sshd will continue reading up to the maximum supported packet length rather than immediately terminating the connection. This eliminates most of the known differences in behaviour that leaked information about the plaintext of injected data which formed the basis of this attack (closes: #506115, LP: #379329). - ForceCommand directive now accepts commandline arguments for the internal-sftp server (closes: #524423, LP: #362511). - Add AllowAgentForwarding to available Match keywords list (closes: #540623). - Make ssh(1) send the correct channel number for SSH2_MSG_CHANNEL_SUCCESS and SSH2_MSG_CHANNEL_FAILURE messages to avoid triggering 'Non-public channel' error messages on sshd(8) in openssh-5.1. - Avoid printing 'Non-public channel' warnings in sshd(8), since the ssh(1) has sent incorrect channel numbers since ~2004 (this reverts a behaviour introduced in openssh-5.1; closes: #496017). * Update to GSSAPI patch from http://www.sxw.org.uk/computing/patches/openssh-5.2p1-gsskex-all-20090726.patch, including cascading credentials support (LP: #416958).
Diffstat (limited to 'ssh.0')
-rw-r--r--ssh.020
1 files changed, 13 insertions, 7 deletions
diff --git a/ssh.0 b/ssh.0
index 21e5ac9a3..1788bf9cc 100644
--- a/ssh.0
+++ b/ssh.0
@@ -4,7 +4,7 @@ NAME
4 ssh - OpenSSH SSH client (remote login program) 4 ssh - OpenSSH SSH client (remote login program)
5 5
6SYNOPSIS 6SYNOPSIS
7 ssh [-1246AaCfgKkMNnqsTtVvXxY] [-b bind_address] [-c cipher_spec] 7 ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec]
8 [-D [bind_address:]port] [-e escape_char] [-F configfile] 8 [-D [bind_address:]port] [-e escape_char] [-F configfile]
9 [-i identity_file] [-L [bind_address:]port:host:hostport] 9 [-i identity_file] [-L [bind_address:]port:host:hostport]
10 [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port] 10 [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port]
@@ -304,12 +304,15 @@ DESCRIPTION
304 [bind_address/]host/port/hostport. 304 [bind_address/]host/port/hostport.
305 305
306 By default, the listening socket on the server will be bound to 306 By default, the listening socket on the server will be bound to
307 the loopback interface only. This may be overriden by specifying 307 the loopback interface only. This may be overridden by specify-
308 a bind_address. An empty bind_address, or the address `*', indi- 308 ing a bind_address. An empty bind_address, or the address `*',
309 cates that the remote socket should listen on all interfaces. 309 indicates that the remote socket should listen on all interfaces.
310 Specifying a remote bind_address will only succeed if the serv- 310 Specifying a remote bind_address will only succeed if the serv-
311 er's GatewayPorts option is enabled (see sshd_config(5)). 311 er's GatewayPorts option is enabled (see sshd_config(5)).
312 312
313 If the port argument is `0', the listen port will be dynamically
314 allocated on the server and reported to the client at run time.
315
313 -S ctl_path 316 -S ctl_path
314 Specifies the location of a control socket for connection shar- 317 Specifies the location of a control socket for connection shar-
315 ing. Refer to the description of ControlPath and ControlMaster 318 ing. Refer to the description of ControlPath and ControlMaster
@@ -365,6 +368,9 @@ DESCRIPTION
365 -Y Enables trusted X11 forwarding. Trusted X11 forwardings are not 368 -Y Enables trusted X11 forwarding. Trusted X11 forwardings are not
366 subjected to the X11 SECURITY extension controls. 369 subjected to the X11 SECURITY extension controls.
367 370
371 -y Send log information using the syslog(3) system module. By de-
372 fault this information is sent to stderr.
373
368 ssh may additionally obtain configuration data from a per-user configura- 374 ssh may additionally obtain configuration data from a per-user configura-
369 tion file and a system-wide configuration file. The file format and con- 375 tion file and a system-wide configuration file. The file format and con-
370 figuration options are described in ssh_config(5). 376 figuration options are described in ssh_config(5).
@@ -500,8 +506,8 @@ ESCAPE CHARACTERS
500 version 2 and if the peer supports it). 506 version 2 and if the peer supports it).
501 507
502 ~C Open command line. Currently this allows the addition of port 508 ~C Open command line. Currently this allows the addition of port
503 forwardings using the -L and -R options (see above). It also al- 509 forwardings using the -L, -R and -D options (see above). It also
504 lows the cancellation of existing remote port-forwardings using 510 allows the cancellation of existing remote port-forwardings using
505 -KR[bind_address:]port. !command allows the user to execute a 511 -KR[bind_address:]port. !command allows the user to execute a
506 local command if the PermitLocalCommand option is enabled in 512 local command if the PermitLocalCommand option is enabled in
507 ssh_config(5). Basic help is available, using the -h option. 513 ssh_config(5). Basic help is available, using the -h option.
@@ -864,4 +870,4 @@ AUTHORS
864 created OpenSSH. Markus Friedl contributed the support for SSH protocol 870 created OpenSSH. Markus Friedl contributed the support for SSH protocol
865 versions 1.5 and 2.0. 871 versions 1.5 and 2.0.
866 872
867OpenBSD 4.4 July 2, 2008 14 873OpenBSD 4.5 February 12, 2009 14