diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2001-01-09 00:35:42 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2001-01-09 00:35:42 +0000 |
commit | 48bd7c118a25b950842864c7eb87ef666cbc342d (patch) | |
tree | b678668f292f8a8bb5e00b9b8f89d86370a8e11f /sshd.8 | |
parent | 99a0563fd59e1d3e1b79a1a9dd38ce9f6b5059ee (diff) |
- (bal) OpenBSD Sync
- markus@cvs.openbsd.org 2001/01/08 22:29:05
[auth2.c compat.c compat.h servconf.c servconf.h sshd.8
sshd_config version.h]
implement option 'Banner /etc/issue.net' for ssh2, move version to
2.3.1 (needed for bugcompat detection, 2.3.0 would fail if Banner
is enabled).
- markus@cvs.openbsd.org 2001/01/08 22:03:23
[channels.c ssh-keyscan.c]
O_NDELAY -> O_NONBLOCK; thanks stevesk@pobox.com
- markus@cvs.openbsd.org 2001/01/08 21:55:41
[sshconnect1.c]
more cleanups and fixes from stevesk@pobox.com:
1) try_agent_authentication() for loop will overwrite key just
allocated with key_new(); don't alloc
2) call ssh_close_authentication_connection() before exit
try_agent_authentication()
3) free mem on bad passphrase in try_rsa_authentication()
- markus@cvs.openbsd.org 2001/01/08 21:48:17
[kex.c]
missing free; thanks stevesk@pobox.com
Diffstat (limited to 'sshd.8')
-rw-r--r-- | sshd.8 | 9 |
1 files changed, 8 insertions, 1 deletions
@@ -34,7 +34,7 @@ | |||
34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
36 | .\" | 36 | .\" |
37 | .\" $OpenBSD: sshd.8,v 1.79 2001/01/07 11:28:07 markus Exp $ | 37 | .\" $OpenBSD: sshd.8,v 1.80 2001/01/08 22:29:05 markus Exp $ |
38 | .Dd September 25, 1999 | 38 | .Dd September 25, 1999 |
39 | .Dt SSHD 8 | 39 | .Dt SSHD 8 |
40 | .Os | 40 | .Os |
@@ -333,6 +333,13 @@ wildcards in the patterns. | |||
333 | Only user names are valid; a numerical user ID isn't recognized. | 333 | Only user names are valid; a numerical user ID isn't recognized. |
334 | By default login is allowed regardless of the user name. | 334 | By default login is allowed regardless of the user name. |
335 | .Pp | 335 | .Pp |
336 | .It Cm Banner | ||
337 | In some jurisdictions, sending a warning message before authentication | ||
338 | may be relevant for getting legal protection. | ||
339 | The contents of the specified file are sent to the remote user before | ||
340 | authentication is allowed. | ||
341 | This option is only available for protocol version 2. | ||
342 | .Pp | ||
336 | .It Cm Ciphers | 343 | .It Cm Ciphers |
337 | Specifies the ciphers allowed for protocol version 2. | 344 | Specifies the ciphers allowed for protocol version 2. |
338 | Multiple ciphers must be comma-separated. | 345 | Multiple ciphers must be comma-separated. |