summaryrefslogtreecommitdiff
path: root/ssh.1
diff options
context:
space:
mode:
authorDarren Tucker <dtucker@zip.com.au>2004-08-29 16:37:24 +1000
committerDarren Tucker <dtucker@zip.com.au>2004-08-29 16:37:24 +1000
commitdb693908178e1e2390d2bbfc34fe709eb23ea039 (patch)
tree59504c4b6f9daac326f510097daeda07b150b43d /ssh.1
parent34620d6f710f97bddc6f7730cee5c6404c4153ba (diff)
- markus@cvs.openbsd.org 2004/08/26 16:00:55
[ssh.1 sshd.8] get rid of references to rhosts authentication; with jmc@
Diffstat (limited to 'ssh.1')
-rw-r--r--ssh.170
1 files changed, 30 insertions, 40 deletions
diff --git a/ssh.1 b/ssh.1
index 0ff77ea29..b9ee4c62b 100644
--- a/ssh.1
+++ b/ssh.1
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: ssh.1,v 1.194 2004/08/12 21:41:13 jakob Exp $ 37.\" $OpenBSD: ssh.1,v 1.195 2004/08/26 16:00:55 markus Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSH 1 39.Dt SSH 1
40.Os 40.Os
@@ -103,35 +103,25 @@ is specified,
103.Ar command 103.Ar command
104is executed on the remote host instead of a login shell. 104is executed on the remote host instead of a login shell.
105.Ss SSH protocol version 1 105.Ss SSH protocol version 1
106First, if the machine the user logs in from is listed in 106The first authentication method is the
107.Em rhosts
108or
109.Em hosts.equiv
110method combined with RSA-based host authentication.
111If the machine the user logs in from is listed in
107.Pa /etc/hosts.equiv 112.Pa /etc/hosts.equiv
108or 113or
109.Pa /etc/shosts.equiv 114.Pa /etc/shosts.equiv
110on the remote machine, and the user names are 115on the remote machine, and the user names are
111the same on both sides, the user is immediately permitted to log in. 116the same on both sides, or if the files
112Second, if 117.Pa $HOME/.rhosts
113.Pa .rhosts
114or 118or
115.Pa .shosts 119.Pa $HOME/.shosts
116exists in the user's home directory on the 120exist in the user's home directory on the
117remote machine and contains a line containing the name of the client 121remote machine and contain a line containing the name of the client
118machine and the name of the user on that machine, the user is 122machine and the name of the user on that machine, the user is
119permitted to log in. 123considered for log in.
120This form of authentication alone is normally not 124Additionally, if the server can verify the client's
121allowed by the server because it is not secure.
122.Pp
123The second authentication method is the
124.Em rhosts
125or
126.Em hosts.equiv
127method combined with RSA-based host authentication.
128It means that if the login would be permitted by
129.Pa $HOME/.rhosts ,
130.Pa $HOME/.shosts ,
131.Pa /etc/hosts.equiv ,
132or
133.Pa /etc/shosts.equiv ,
134and if additionally the server can verify the client's
135host key (see 125host key (see
136.Pa /etc/ssh/ssh_known_hosts 126.Pa /etc/ssh/ssh_known_hosts
137and 127and
@@ -147,7 +137,7 @@ spoofing, DNS spoofing and routing spoofing.
147and the rlogin/rsh protocol in general, are inherently insecure and should be 137and the rlogin/rsh protocol in general, are inherently insecure and should be
148disabled if security is desired.] 138disabled if security is desired.]
149.Pp 139.Pp
150As a third authentication method, 140As a second authentication method,
151.Nm 141.Nm
152supports RSA based authentication. 142supports RSA based authentication.
153The scheme is based on public-key cryptography: there are cryptosystems 143The scheme is based on public-key cryptography: there are cryptosystems
@@ -195,9 +185,6 @@ file corresponds to the conventional
195file, and has one key 185file, and has one key
196per line, though the lines can be very long). 186per line, though the lines can be very long).
197After this, the user can log in without giving the password. 187After this, the user can log in without giving the password.
198RSA authentication is much more secure than
199.Em rhosts
200authentication.
201.Pp 188.Pp
202The most convenient way to use RSA authentication may be with an 189The most convenient way to use RSA authentication may be with an
203authentication agent. 190authentication agent.
@@ -1012,7 +999,9 @@ By default
1012is not setuid root. 999is not setuid root.
1013.It Pa $HOME/.rhosts 1000.It Pa $HOME/.rhosts
1014This file is used in 1001This file is used in
1015.Em rhosts 1002.Cm RhostsRSAAuthentication
1003and
1004.Cm HostbasedAuthentication
1016authentication to list the 1005authentication to list the
1017host/user pairs that are permitted to log in. 1006host/user pairs that are permitted to log in.
1018(Note that this file is 1007(Note that this file is
@@ -1031,12 +1020,10 @@ The recommended
1031permission for most machines is read/write for the user, and not 1020permission for most machines is read/write for the user, and not
1032accessible by others. 1021accessible by others.
1033.Pp 1022.Pp
1034Note that by default 1023Note that
1035.Xr sshd 8 1024.Xr sshd 8
1036will be installed so that it requires successful RSA host 1025allows authentication only in combination with client host key
1037authentication before permitting 1026authentication before permitting log in.
1038.Em rhosts
1039authentication.
1040If the server machine does not have the client's host key in 1027If the server machine does not have the client's host key in
1041.Pa /etc/ssh/ssh_known_hosts , 1028.Pa /etc/ssh/ssh_known_hosts ,
1042it can be stored in 1029it can be stored in
@@ -1049,15 +1036,19 @@ will automatically add the host key to
1049This file is used exactly the same way as 1036This file is used exactly the same way as
1050.Pa .rhosts . 1037.Pa .rhosts .
1051The purpose for 1038The purpose for
1052having this file is to be able to use rhosts authentication with 1039having this file is to be able to use
1053.Nm 1040.Cm RhostsRSAAuthentication
1054without permitting login with 1041and
1042.Cm HostbasedAuthentication
1043authentication without permitting login with
1055.Xr rlogin 1044.Xr rlogin
1056or 1045or
1057.Xr rsh 1 . 1046.Xr rsh 1 .
1058.It Pa /etc/hosts.equiv 1047.It Pa /etc/hosts.equiv
1059This file is used during 1048This file is used during
1060.Em rhosts 1049.Cm RhostsRSAAuthentication
1050and
1051.Cm HostbasedAuthentication
1061authentication. 1052authentication.
1062It contains 1053It contains
1063canonical hosts names, one per line (the full format is described in the 1054canonical hosts names, one per line (the full format is described in the
@@ -1066,8 +1057,7 @@ manual page).
1066If the client host is found in this file, login is 1057If the client host is found in this file, login is
1067automatically permitted provided client and server user names are the 1058automatically permitted provided client and server user names are the
1068same. 1059same.
1069Additionally, successful RSA host authentication is normally 1060Additionally, successful client host key authentication is required.
1070required.
1071This file should only be writable by root. 1061This file should only be writable by root.
1072.It Pa /etc/shosts.equiv 1062.It Pa /etc/shosts.equiv
1073This file is processed exactly as 1063This file is processed exactly as