summaryrefslogtreecommitdiff
path: root/ssh.1
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2011-09-06 14:56:29 +0100
committerColin Watson <cjwatson@debian.org>2011-09-06 14:56:29 +0100
commit978e62d6f14c60747bddef2cc72d66a9c8b83b54 (patch)
tree89400a44e42d84937deba7864e4964d6c7734da5 /ssh.1
parent87c685b8c6a49814fd782288097b3093f975aa72 (diff)
parent3a7e89697ca363de0f64e0d5704c57219294e41c (diff)
* New upstream release (http://www.openssh.org/txt/release-5.9).
- Introduce sandboxing of the pre-auth privsep child using an optional sshd_config(5) "UsePrivilegeSeparation=sandbox" mode that enables mandatory restrictions on the syscalls the privsep child can perform. - Add new SHA256-based HMAC transport integrity modes from http://www.ietf.org/id/draft-dbider-sha2-mac-for-ssh-02.txt. - The pre-authentication sshd(8) privilege separation slave process now logs via a socket shared with the master process, avoiding the need to maintain /dev/log inside the chroot (closes: #75043, #429243, #599240). - ssh(1) now warns when a server refuses X11 forwarding (closes: #504757). - sshd_config(5)'s AuthorizedKeysFile now accepts multiple paths, separated by whitespace (closes: #76312). The authorized_keys2 fallback is deprecated but documented (closes: #560156). - ssh(1) and sshd(8): set IPv6 traffic class from IPQoS, as well as IPv4 ToS/DSCP (closes: #498297). - ssh-add(1) now accepts keys piped from standard input. E.g. "ssh-add - < /path/to/key" (closes: #229124). - Clean up lost-passphrase text in ssh-keygen(1) (closes: #444691). - Say "required" rather than "recommended" in unprotected-private-key warning (LP: #663455).
Diffstat (limited to 'ssh.1')
-rw-r--r--ssh.115
1 files changed, 10 insertions, 5 deletions
diff --git a/ssh.1 b/ssh.1
index e0f237966..d20a5671e 100644
--- a/ssh.1
+++ b/ssh.1
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: ssh.1,v 1.316 2010/11/18 15:01:00 jmc Exp $ 36.\" $OpenBSD: ssh.1,v 1.320 2011/08/02 01:22:11 djm Exp $
37.Dd $Mdocdate: November 18 2010 $ 37.Dd $Mdocdate: August 2 2011 $
38.Dt SSH 1 38.Dt SSH 1
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -392,9 +392,11 @@ Valid commands are:
392.Dq check 392.Dq check
393(check that the master process is running), 393(check that the master process is running),
394.Dq forward 394.Dq forward
395(request forwardings without command execution) and 395(request forwardings without command execution),
396.Dq exit 396.Dq exit
397(request the master to exit). 397(request the master to exit), and
398.Dq stop
399(request the master to stop accepting further multiplexing requests).
398.It Fl o Ar option 400.It Fl o Ar option
399Can be used to give options in the format used in the configuration file. 401Can be used to give options in the format used in the configuration file.
400This is useful for specifying options for which there is no separate 402This is useful for specifying options for which there is no separate
@@ -454,6 +456,7 @@ For full details of the options listed below, and their possible values, see
454.It PubkeyAuthentication 456.It PubkeyAuthentication
455.It RekeyLimit 457.It RekeyLimit
456.It RemoteForward 458.It RemoteForward
459.It RequestTTY
457.It RhostsRSAAuthentication 460.It RhostsRSAAuthentication
458.It RSAAuthentication 461.It RSAAuthentication
459.It SendEnv 462.It SendEnv
@@ -664,7 +667,9 @@ Both protocols support similar authentication methods,
664but protocol 2 is the default since 667but protocol 2 is the default since
665it provides additional mechanisms for confidentiality 668it provides additional mechanisms for confidentiality
666(the traffic is encrypted using AES, 3DES, Blowfish, CAST128, or Arcfour) 669(the traffic is encrypted using AES, 3DES, Blowfish, CAST128, or Arcfour)
667and integrity (hmac-md5, hmac-sha1, umac-64, hmac-ripemd160). 670and integrity (hmac-md5, hmac-sha1,
671hmac-sha2-256, hmac-sha2-512,
672umac-64, hmac-ripemd160).
668Protocol 1 lacks a strong mechanism for ensuring the 673Protocol 1 lacks a strong mechanism for ensuring the
669integrity of the connection. 674integrity of the connection.
670.Pp 675.Pp