summaryrefslogtreecommitdiff
path: root/sshd.8
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2006-02-01 22:05:25 +1100
committerDamien Miller <djm@mindrot.org>2006-02-01 22:05:25 +1100
commit8bbdf90f3333a148eb655993e47b0168d907693d (patch)
treeeb484b8d4c83186e887c5050ab4e9371275ba153 /sshd.8
parente682cb07803f71ec01e15394ac8445431cfda176 (diff)
- (djm) OpenBSD CVS Sync
- jmc@cvs.openbsd.org 2006/02/01 09:06:50 [sshd.8] - merge sections on protocols 1 and 2 into a single section - remove configuration file section ok markus
Diffstat (limited to 'sshd.8')
-rw-r--r--sshd.881
1 files changed, 35 insertions, 46 deletions
diff --git a/sshd.8 b/sshd.8
index 15c7651ba..0bc5f820a 100644
--- a/sshd.8
+++ b/sshd.8
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: sshd.8,v 1.213 2006/01/25 09:07:22 jmc Exp $ 37.\" $OpenBSD: sshd.8,v 1.214 2006/02/01 09:06:50 jmc Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSHD 8 39.Dt SSHD 8
40.Os 40.Os
@@ -227,20 +227,26 @@ USER@HOST pattern in
227or 227or
228.Cm DenyUsers . 228.Cm DenyUsers .
229.El 229.El
230.Pp 230.Sh AUTHENTICATION
231This implementation of 231The OpenSSH SSH daemon supports SSH protocols 1 and 2.
232.Nm 232Both protocols are supported by default,
233supports both SSH protocol version 1 and 2 simultaneously. 233though this can be changed via the
234.Nm 234.Cm Protocol
235works as follows: 235option in
236.Sh SSH PROTOCOL VERSION 1 236.Xr sshd_config 5 .
237Each host has a host-specific RSA key 237Protocol 2 supports both RSA and DSA keys;
238(normally 2048 bits) used to identify the host. 238protocol 1 only supports RSA keys.
239Additionally, when 239For both protocols,
240the daemon starts, it generates a server RSA key (normally 768 bits). 240each host has a host-specific key,
241normally 2048 bits,
242used to identify the host.
243.Pp
244Forward security for protocol 1 is provided through
245an additional server key,
246normally 768 bits,
247generated when the server starts.
241This key is normally regenerated every hour if it has been used, and 248This key is normally regenerated every hour if it has been used, and
242is never stored on disk. 249is never stored on disk.
243.Pp
244Whenever a client connects, the daemon responds with its public 250Whenever a client connects, the daemon responds with its public
245host and server keys. 251host and server keys.
246The client compares the 252The client compares the
@@ -258,12 +264,23 @@ being used by default.
258The client selects the encryption algorithm 264The client selects the encryption algorithm
259to use from those offered by the server. 265to use from those offered by the server.
260.Pp 266.Pp
261Next, the server and the client enter an authentication dialog. 267For protocol 2,
268forward security is provided through a Diffie-Hellman key agreement.
269This key agreement results in a shared session key.
270The rest of the session is encrypted using a symmetric cipher, currently
271128-bit AES, Blowfish, 3DES, CAST128, Arcfour, 192-bit AES, or 256-bit AES.
272The client selects the encryption algorithm
273to use from those offered by the server.
274Additionally, session integrity is provided
275through a cryptographic message authentication code
276(hmac-sha1 or hmac-md5).
277.Pp
278Finally, the server and the client enter an authentication dialog.
262The client tries to authenticate itself using 279The client tries to authenticate itself using
263.Em rhosts 280host-based authentication,
264authentication combined with RSA host 281public key authentication,
265authentication, RSA challenge-response authentication, or password 282challenge-response authentication,
266based authentication. 283or password authentication.
267.Pp 284.Pp
268Regardless of the authentication type, the account is checked to 285Regardless of the authentication type, the account is checked to
269ensure that it is accessible. An account is not accessible if it is 286ensure that it is accessible. An account is not accessible if it is
@@ -301,25 +318,6 @@ are disabled (thus completely disabling
301and 318and
302.Xr rsh 319.Xr rsh
303into the machine). 320into the machine).
304.Sh SSH PROTOCOL VERSION 2
305Version 2 works similarly:
306Each host has a host-specific key (RSA or DSA) used to identify the host.
307However, when the daemon starts, it does not generate a server key.
308Forward security is provided through a Diffie-Hellman key agreement.
309This key agreement results in a shared session key.
310.Pp
311The rest of the session is encrypted using a symmetric cipher, currently
312128-bit AES, Blowfish, 3DES, CAST128, Arcfour, 192-bit AES, or 256-bit AES.
313The client selects the encryption algorithm
314to use from those offered by the server.
315Additionally, session integrity is provided
316through a cryptographic message authentication code
317(hmac-sha1 or hmac-md5).
318.Pp
319Protocol version 2 provides a public key based
320user (PubkeyAuthentication) or
321client host (HostbasedAuthentication) authentication method,
322conventional password authentication and challenge response based methods.
323.Sh COMMAND EXECUTION AND DATA FORWARDING 321.Sh COMMAND EXECUTION AND DATA FORWARDING
324If the client successfully authenticates itself, a dialog for 322If the client successfully authenticates itself, a dialog for
325preparing the session is entered. 323preparing the session is entered.
@@ -337,15 +335,6 @@ command on the server side, and the user terminal in the client side.
337When the user program terminates and all forwarded X11 and other 335When the user program terminates and all forwarded X11 and other
338connections have been closed, the server sends command exit status to 336connections have been closed, the server sends command exit status to
339the client, and both sides exit. 337the client, and both sides exit.
340.Sh CONFIGURATION FILE
341.Nm
342reads configuration data from
343.Pa /etc/ssh/sshd_config
344(or the file specified with
345.Fl f
346on the command line).
347The file format and configuration options are described in
348.Xr sshd_config 5 .
349.Sh LOGIN PROCESS 338.Sh LOGIN PROCESS
350When a user successfully logs in, 339When a user successfully logs in,
351.Nm 340.Nm