summaryrefslogtreecommitdiff
path: root/sshd.8
diff options
context:
space:
mode:
authordtucker@openbsd.org <dtucker@openbsd.org>2019-12-19 03:50:01 +0000
committerDarren Tucker <dtucker@dtucker.net>2019-12-20 14:25:08 +1100
commitbc2dc091e0ac4ff6245c43a61ebe12c7e9ea0b7f (patch)
treedb7f630456cb7bd83d32d24a5852fcc86f5865e4 /sshd.8
parente905f7260d72bc0e33ef5f10a0db737ff6e77ba7 (diff)
upstream: "Forward security" -> "Forward secrecy" since that's the
correct term. Add "MAC" since we use that acronym in other man pages. ok naddy@ OpenBSD-Commit-ID: c35529e511788586725fb63bda3459e10738c5f5
Diffstat (limited to 'sshd.8')
-rw-r--r--sshd.88
1 files changed, 4 insertions, 4 deletions
diff --git a/sshd.8 b/sshd.8
index c052b8005..dc11a0d00 100644
--- a/sshd.8
+++ b/sshd.8
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: sshd.8,v 1.309 2019/12/17 16:21:07 naddy Exp $ 36.\" $OpenBSD: sshd.8,v 1.310 2019/12/19 03:50:01 dtucker Exp $
37.Dd $Mdocdate: December 17 2019 $ 37.Dd $Mdocdate: December 19 2019 $
38.Dt SSHD 8 38.Dt SSHD 8
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -253,13 +253,13 @@ Whenever a client connects, the daemon responds with its public
253host key. 253host key.
254The client compares the 254The client compares the
255host key against its own database to verify that it has not changed. 255host key against its own database to verify that it has not changed.
256Forward security is provided through a Diffie-Hellman key agreement. 256Forward secrecy is provided through a Diffie-Hellman key agreement.
257This key agreement results in a shared session key. 257This key agreement results in a shared session key.
258The rest of the session is encrypted using a symmetric cipher. 258The rest of the session is encrypted using a symmetric cipher.
259The client selects the encryption algorithm 259The client selects the encryption algorithm
260to use from those offered by the server. 260to use from those offered by the server.
261Additionally, session integrity is provided 261Additionally, session integrity is provided
262through a cryptographic message authentication code. 262through a cryptographic message authentication code (MAC).
263.Pp 263.Pp
264Finally, the server and the client enter an authentication dialog. 264Finally, the server and the client enter an authentication dialog.
265The client tries to authenticate itself using 265The client tries to authenticate itself using