diff options
author | Colin Watson <cjwatson@debian.org> | 2011-09-06 14:56:29 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2011-09-06 14:56:29 +0100 |
commit | 978e62d6f14c60747bddef2cc72d66a9c8b83b54 (patch) | |
tree | 89400a44e42d84937deba7864e4964d6c7734da5 /ssh.1 | |
parent | 87c685b8c6a49814fd782288097b3093f975aa72 (diff) | |
parent | 3a7e89697ca363de0f64e0d5704c57219294e41c (diff) |
* New upstream release (http://www.openssh.org/txt/release-5.9).
- Introduce sandboxing of the pre-auth privsep child using an optional
sshd_config(5) "UsePrivilegeSeparation=sandbox" mode that enables
mandatory restrictions on the syscalls the privsep child can perform.
- Add new SHA256-based HMAC transport integrity modes from
http://www.ietf.org/id/draft-dbider-sha2-mac-for-ssh-02.txt.
- The pre-authentication sshd(8) privilege separation slave process now
logs via a socket shared with the master process, avoiding the need to
maintain /dev/log inside the chroot (closes: #75043, #429243,
#599240).
- ssh(1) now warns when a server refuses X11 forwarding (closes:
#504757).
- sshd_config(5)'s AuthorizedKeysFile now accepts multiple paths,
separated by whitespace (closes: #76312). The authorized_keys2
fallback is deprecated but documented (closes: #560156).
- ssh(1) and sshd(8): set IPv6 traffic class from IPQoS, as well as IPv4
ToS/DSCP (closes: #498297).
- ssh-add(1) now accepts keys piped from standard input. E.g. "ssh-add
- < /path/to/key" (closes: #229124).
- Clean up lost-passphrase text in ssh-keygen(1) (closes: #444691).
- Say "required" rather than "recommended" in unprotected-private-key
warning (LP: #663455).
Diffstat (limited to 'ssh.1')
-rw-r--r-- | ssh.1 | 15 |
1 files changed, 10 insertions, 5 deletions
@@ -33,8 +33,8 @@ | |||
33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
35 | .\" | 35 | .\" |
36 | .\" $OpenBSD: ssh.1,v 1.316 2010/11/18 15:01:00 jmc Exp $ | 36 | .\" $OpenBSD: ssh.1,v 1.320 2011/08/02 01:22:11 djm Exp $ |
37 | .Dd $Mdocdate: November 18 2010 $ | 37 | .Dd $Mdocdate: August 2 2011 $ |
38 | .Dt SSH 1 | 38 | .Dt SSH 1 |
39 | .Os | 39 | .Os |
40 | .Sh NAME | 40 | .Sh NAME |
@@ -392,9 +392,11 @@ Valid commands are: | |||
392 | .Dq check | 392 | .Dq check |
393 | (check that the master process is running), | 393 | (check that the master process is running), |
394 | .Dq forward | 394 | .Dq forward |
395 | (request forwardings without command execution) and | 395 | (request forwardings without command execution), |
396 | .Dq exit | 396 | .Dq exit |
397 | (request the master to exit). | 397 | (request the master to exit), and |
398 | .Dq stop | ||
399 | (request the master to stop accepting further multiplexing requests). | ||
398 | .It Fl o Ar option | 400 | .It Fl o Ar option |
399 | Can be used to give options in the format used in the configuration file. | 401 | Can be used to give options in the format used in the configuration file. |
400 | This is useful for specifying options for which there is no separate | 402 | This is useful for specifying options for which there is no separate |
@@ -454,6 +456,7 @@ For full details of the options listed below, and their possible values, see | |||
454 | .It PubkeyAuthentication | 456 | .It PubkeyAuthentication |
455 | .It RekeyLimit | 457 | .It RekeyLimit |
456 | .It RemoteForward | 458 | .It RemoteForward |
459 | .It RequestTTY | ||
457 | .It RhostsRSAAuthentication | 460 | .It RhostsRSAAuthentication |
458 | .It RSAAuthentication | 461 | .It RSAAuthentication |
459 | .It SendEnv | 462 | .It SendEnv |
@@ -664,7 +667,9 @@ Both protocols support similar authentication methods, | |||
664 | but protocol 2 is the default since | 667 | but protocol 2 is the default since |
665 | it provides additional mechanisms for confidentiality | 668 | it provides additional mechanisms for confidentiality |
666 | (the traffic is encrypted using AES, 3DES, Blowfish, CAST128, or Arcfour) | 669 | (the traffic is encrypted using AES, 3DES, Blowfish, CAST128, or Arcfour) |
667 | and integrity (hmac-md5, hmac-sha1, umac-64, hmac-ripemd160). | 670 | and integrity (hmac-md5, hmac-sha1, |
671 | hmac-sha2-256, hmac-sha2-512, | ||
672 | umac-64, hmac-ripemd160). | ||
668 | Protocol 1 lacks a strong mechanism for ensuring the | 673 | Protocol 1 lacks a strong mechanism for ensuring the |
669 | integrity of the connection. | 674 | integrity of the connection. |
670 | .Pp | 675 | .Pp |