diff options
author | Colin Watson <cjwatson@debian.org> | 2009-12-29 21:40:29 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2009-12-29 21:40:29 +0000 |
commit | a25ec0b132c44c9e341e08464ff830de06b81126 (patch) | |
tree | e20842d80f9e25cb6cf09525abea63f7bf655dd7 /ssh.1 | |
parent | 1b816ea846aca3ee89e7995373ace609e9518424 (diff) | |
parent | 70847d299887abb96f8703ca99db6d817b78960e (diff) |
import openssh-4.7p1-gsskex-20070927.patch
Diffstat (limited to 'ssh.1')
-rw-r--r-- | ssh.1 | 11 |
1 files changed, 7 insertions, 4 deletions
@@ -34,8 +34,8 @@ | |||
34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
36 | .\" | 36 | .\" |
37 | .\" $OpenBSD: ssh.1,v 1.266 2006/12/11 21:25:46 markus Exp $ | 37 | .\" $OpenBSD: ssh.1,v 1.270 2007/06/12 13:43:55 jmc Exp $ |
38 | .Dd September 25, 1999 | 38 | .Dd $Mdocdate: June 12 2007 $ |
39 | .Dt SSH 1 | 39 | .Dt SSH 1 |
40 | .Os | 40 | .Os |
41 | .Sh NAME | 41 | .Sh NAME |
@@ -43,7 +43,7 @@ | |||
43 | .Nd OpenSSH SSH client (remote login program) | 43 | .Nd OpenSSH SSH client (remote login program) |
44 | .Sh SYNOPSIS | 44 | .Sh SYNOPSIS |
45 | .Nm ssh | 45 | .Nm ssh |
46 | .Op Fl 1246AaCfgkMNnqsTtVvXxY | 46 | .Op Fl 1246AaCfgKkMNnqsTtVvXxY |
47 | .Op Fl b Ar bind_address | 47 | .Op Fl b Ar bind_address |
48 | .Op Fl c Ar cipher_spec | 48 | .Op Fl c Ar cipher_spec |
49 | .Oo Fl D\ \& | 49 | .Oo Fl D\ \& |
@@ -315,6 +315,9 @@ It is possible to have multiple | |||
315 | .Fl i | 315 | .Fl i |
316 | options (and multiple identities specified in | 316 | options (and multiple identities specified in |
317 | configuration files). | 317 | configuration files). |
318 | .It Fl K | ||
319 | Enables GSSAPI-based authentication and forwarding (delegation) of GSSAPI | ||
320 | credentials to the server. | ||
318 | .It Fl k | 321 | .It Fl k |
319 | Disables forwarding (delegation) of GSSAPI credentials to the server. | 322 | Disables forwarding (delegation) of GSSAPI credentials to the server. |
320 | .It Fl L Xo | 323 | .It Fl L Xo |
@@ -674,7 +677,7 @@ Both protocols support similar authentication methods, | |||
674 | but protocol 2 is preferred since | 677 | but protocol 2 is preferred since |
675 | it provides additional mechanisms for confidentiality | 678 | it provides additional mechanisms for confidentiality |
676 | (the traffic is encrypted using AES, 3DES, Blowfish, CAST128, or Arcfour) | 679 | (the traffic is encrypted using AES, 3DES, Blowfish, CAST128, or Arcfour) |
677 | and integrity (hmac-md5, hmac-sha1, hmac-ripemd160). | 680 | and integrity (hmac-md5, hmac-sha1, umac-64, hmac-ripemd160). |
678 | Protocol 1 lacks a strong mechanism for ensuring the | 681 | Protocol 1 lacks a strong mechanism for ensuring the |
679 | integrity of the connection. | 682 | integrity of the connection. |
680 | .Pp | 683 | .Pp |