summaryrefslogtreecommitdiff
path: root/sshd.8
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2000-03-09 21:27:49 +1100
committerDamien Miller <djm@mindrot.org>2000-03-09 21:27:49 +1100
commit98c7ad60ec5725d91da9f9f6d26cd9fe477398c0 (patch)
tree104c3e3474be8e308d05e22d79715c833c6cf837 /sshd.8
parent1a07ebd4d8d39c6814bbd84c1aec4ebf2bd005a2 (diff)
- OpenBSD CVS updates to v1.2.3
[ssh.h atomicio.c] - int atomicio -> ssize_t (for alpha). ok deraadt@ [auth-rsa.c] - delay MD5 computation until client sends response, free() early, cleanup. [cipher.c] - void* -> unsigned char*, ok niels@ [hostfile.c] - remove unused variable 'len'. fix comments. - remove unused variable [log-client.c log-server.c] - rename a cpp symbol, to avoid param.h collision [packet.c] - missing xfree() - getsockname() requires initialized tolen; andy@guildsoftware.com - use getpeername() in packet_connection_is_on_socket(), fixes sshd -i; from Holger.Trapp@Informatik.TU-Chemnitz.DE [pty.c pty.h] - register cleanup for pty earlier. move code for pty-owner handling to pty.c ok provos@, dugsong@ [readconf.c] - turn off x11-fwd for the client, too. [rsa.c] - PKCS#1 padding [scp.c] - allow '.' in usernames; from jedgar@fxp.org [servconf.c] - typo: ignore_user_known_hosts int->flag; naddy@mips.rhein-neckar.de - sync with sshd_config [ssh-keygen.c] - enable ssh-keygen -l -f ~/.ssh/known_hosts, ok deraadt@ [ssh.1] - Change invalid 'CHAT' loglevel to 'VERBOSE' [ssh.c] - suppress AAAA query host when '-4' is used; from shin@nd.net.fujitsu.co.jp - turn off x11-fwd for the client, too. [sshconnect.c] - missing xfree() - retry rresvport_af(), too. from sumikawa@ebina.hitachi.co.jp. - read error vs. "Connection closed by remote host" [sshd.8] - ie. -> i.e., - do not link to a commercial page.. - sync with sshd_config [sshd.c] - no need for poll.h; from bright@wintelcom.net - log with level log() not fatal() if peer behaves badly. - don't panic if client behaves strange. ok deraadt@ - make no-port-forwarding for RSA keys deny both -L and -R style fwding - delay close() of pty until the pty has been chowned back to root - oops, fix comment, too. - missing xfree() - move XAUTHORITY to subdir. ok dugsong@. fixes debian bug #57907, too. (http://cgi.debian.org/cgi-bin/bugreport.cgi?archive=no&bug=57907) - register cleanup for pty earlier. move code for pty-owner handling to pty.c ok provos@, dugsong@ - create x11 cookie file - fix pr 1113, fclose() -> pclose(), todo: remote popen() - version 1.2.3 - Cleaned up
Diffstat (limited to 'sshd.8')
-rw-r--r--sshd.837
1 files changed, 18 insertions, 19 deletions
diff --git a/sshd.8 b/sshd.8
index 4ad73bb77..c5497cf9f 100644
--- a/sshd.8
+++ b/sshd.8
@@ -9,7 +9,7 @@
9.\" 9.\"
10.\" Created: Sat Apr 22 21:55:14 1995 ylo 10.\" Created: Sat Apr 22 21:55:14 1995 ylo
11.\" 11.\"
12.\" $Id: sshd.8,v 1.12 2000/01/22 08:57:41 damien Exp $ 12.\" $Id: sshd.8,v 1.13 2000/03/09 10:27:53 damien Exp $
13.\" 13.\"
14.Dd September 25, 1999 14.Dd September 25, 1999
15.Dt SSHD 8 15.Dt SSHD 8
@@ -258,13 +258,16 @@ Note that
258.Nm 258.Nm
259does not start if this file is group/world-accessible. 259does not start if this file is group/world-accessible.
260.It Cm IgnoreRhosts 260.It Cm IgnoreRhosts
261Specifies that rhosts and shosts files will not be used in 261Specifies that
262authentication. 262.Pa .rhosts
263and
264.Pa .shosts
265files will not be used in authentication.
263.Pa /etc/hosts.equiv 266.Pa /etc/hosts.equiv
264and 267and
265.Pa /etc/shosts.equiv 268.Pa /etc/shosts.equiv
266are still used. The default is 269are still used. The default is
267.Dq no . 270.Dq yes .
268.It Cm IgnoreUserKnownHosts 271.It Cm IgnoreUserKnownHosts
269Specifies whether 272Specifies whether
270.Nm 273.Nm
@@ -352,7 +355,7 @@ The default is
352When password authentication is allowed, it specifies whether the 355When password authentication is allowed, it specifies whether the
353server allows login to accounts with empty password strings. The default 356server allows login to accounts with empty password strings. The default
354is 357is
355.Dq yes . 358.Dq no .
356.It Cm PermitRootLogin 359.It Cm PermitRootLogin
357Specifies whether the root can log in using 360Specifies whether the root can log in using
358.Xr ssh 1 . 361.Xr ssh 1 .
@@ -403,7 +406,7 @@ The default is
403.It Cm RhostsRSAAuthentication 406.It Cm RhostsRSAAuthentication
404Specifies whether rhosts or /etc/hosts.equiv authentication together 407Specifies whether rhosts or /etc/hosts.equiv authentication together
405with successful RSA host authentication is allowed. The default is 408with successful RSA host authentication is allowed. The default is
406.Dq yes . 409.Dq no .
407.It Cm RSAAuthentication 410.It Cm RSAAuthentication
408Specifies whether pure RSA authentication is allowed. The default is 411Specifies whether pure RSA authentication is allowed. The default is
409.Dq yes . 412.Dq yes .
@@ -442,9 +445,10 @@ Specifies the first display number available for
442X11 forwarding. This prevents 445X11 forwarding. This prevents
443.Nm 446.Nm
444from interfering with real X11 servers. 447from interfering with real X11 servers.
448The default is 10.
445.It Cm X11Forwarding 449.It Cm X11Forwarding
446Specifies whether X11 forwarding is permitted. The default is 450Specifies whether X11 forwarding is permitted. The default is
447.Dq yes . 451.Dq no .
448Note that disabling X11 forwarding does not improve security in any 452Note that disabling X11 forwarding does not improve security in any
449way, as users can always install their own forwarders. 453way, as users can always install their own forwarders.
450.El 454.El
@@ -762,18 +766,12 @@ This can be used to specify
762machine-specific login-time initializations globally. This file 766machine-specific login-time initializations globally. This file
763should be writable only by root, and should be world-readable. 767should be writable only by root, and should be world-readable.
764.Sh AUTHOR 768.Sh AUTHOR
765Tatu Ylonen <ylo@cs.hut.fi>
766.Pp
767Information about new releases, mailing lists, and other related
768issues can be found from the SSH WWW home page:
769.Pp
770.Dl http://www.cs.hut.fi/ssh.
771.Pp
772OpenSSH 769OpenSSH
773is a derivative of the original (free) ssh 1.2.12 release, but with bugs 770is a derivative of the original (free) ssh 1.2.12 release by Tatu Ylonen,
774removed and newer features re-added. Rapidly after the 1.2.12 release, 771but with bugs removed and newer features re-added. Rapidly after the
775newer versions bore successively more restrictive licenses. This version 7721.2.12 release, newer versions of the original ssh bore successively
776of OpenSSH 773more restrictive licenses, and thus demand for a free version was born.
774This version of OpenSSH
777.Bl -bullet 775.Bl -bullet
778.It 776.It
779has all components of a restrictive nature (i.e., patents, see 777has all components of a restrictive nature (i.e., patents, see
@@ -782,7 +780,8 @@ directly removed from the source code; any licensed or patented components
782are chosen from 780are chosen from
783external libraries. 781external libraries.
784.It 782.It
785has been updated to support ssh protocol 1.5. 783has been updated to support ssh protocol 1.5, making it compatible with
784all other ssh protocol 1 clients and servers.
786.It 785.It
787contains added support for 786contains added support for
788.Xr kerberos 8 787.Xr kerberos 8