summaryrefslogtreecommitdiff
path: root/sshd.8
diff options
context:
space:
mode:
authornaddy@openbsd.org <naddy@openbsd.org>2019-12-17 16:21:07 +0000
committerDarren Tucker <dtucker@dtucker.net>2019-12-20 14:25:08 +1100
commite905f7260d72bc0e33ef5f10a0db737ff6e77ba7 (patch)
tree02365802851f4fe68b28fb86d003530ef8be32d4 /sshd.8
parentf65cf1163ff01531ae02f3f9210391d0d692f699 (diff)
upstream: cut obsolete lists of crypto algorithms from outline of
how SSH works ok markus@ jmc@ OpenBSD-Commit-ID: 8e34973f232ab48c4d4f5d07df48d501708b9160
Diffstat (limited to 'sshd.8')
-rw-r--r--sshd.811
1 files changed, 4 insertions, 7 deletions
diff --git a/sshd.8 b/sshd.8
index 681f65714..c052b8005 100644
--- a/sshd.8
+++ b/sshd.8
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: sshd.8,v 1.308 2019/11/30 07:07:59 jmc Exp $ 36.\" $OpenBSD: sshd.8,v 1.309 2019/12/17 16:21:07 naddy Exp $
37.Dd $Mdocdate: November 30 2019 $ 37.Dd $Mdocdate: December 17 2019 $
38.Dt SSHD 8 38.Dt SSHD 8
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -255,14 +255,11 @@ The client compares the
255host key against its own database to verify that it has not changed. 255host key against its own database to verify that it has not changed.
256Forward security is provided through a Diffie-Hellman key agreement. 256Forward security is provided through a Diffie-Hellman key agreement.
257This key agreement results in a shared session key. 257This key agreement results in a shared session key.
258The rest of the session is encrypted using a symmetric cipher, currently 258The rest of the session is encrypted using a symmetric cipher.
259128-bit AES, Blowfish, 3DES, CAST128, Arcfour, 192-bit AES, or 256-bit AES.
260The client selects the encryption algorithm 259The client selects the encryption algorithm
261to use from those offered by the server. 260to use from those offered by the server.
262Additionally, session integrity is provided 261Additionally, session integrity is provided
263through a cryptographic message authentication code 262through a cryptographic message authentication code.
264(hmac-md5, hmac-sha1, umac-64, umac-128,
265hmac-sha2-256 or hmac-sha2-512).
266.Pp 263.Pp
267Finally, the server and the client enter an authentication dialog. 264Finally, the server and the client enter an authentication dialog.
268The client tries to authenticate itself using 265The client tries to authenticate itself using