summaryrefslogtreecommitdiff
path: root/sshd.8
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2010-08-31 22:41:14 +1000
committerDamien Miller <djm@mindrot.org>2010-08-31 22:41:14 +1000
commiteb8b60e320cdade9f4c07e2abacfb92c52e01348 (patch)
tree4e5bc25790566402e5b7ae00cefd2c57e867ef09 /sshd.8
parentda108ece6843f1268aa36d7c8ed0030dc53acd15 (diff)
- djm@cvs.openbsd.org 2010/08/31 11:54:45
[PROTOCOL PROTOCOL.agent PROTOCOL.certkeys auth2-jpake.c authfd.c] [authfile.c buffer.h dns.c kex.c kex.h key.c key.h monitor.c] [monitor_wrap.c myproposal.h packet.c packet.h pathnames.h readconf.c] [ssh-add.1 ssh-add.c ssh-agent.1 ssh-agent.c ssh-keygen.1 ssh-keygen.c] [ssh-keyscan.1 ssh-keyscan.c ssh-keysign.8 ssh.1 ssh.c ssh2.h] [ssh_config.5 sshconnect.c sshconnect2.c sshd.8 sshd.c sshd_config.5] [uuencode.c uuencode.h bufec.c kexecdh.c kexecdhc.c kexecdhs.c ssh-ecdsa.c] Implement Elliptic Curve Cryptography modes for key exchange (ECDH) and host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer better performance than plain DH and DSA at the same equivalent symmetric key length, as well as much shorter keys. Only the mandatory sections of RFC5656 are implemented, specifically the three REQUIRED curves nistp256, nistp384 and nistp521 and only ECDH and ECDSA. Point compression (optional in RFC5656 is NOT implemented). Certificate host and user keys using the new ECDSA key types are supported. Note that this code has not been tested for interoperability and may be subject to change. feedback and ok markus@
Diffstat (limited to 'sshd.8')
-rw-r--r--sshd.820
1 files changed, 14 insertions, 6 deletions
diff --git a/sshd.8 b/sshd.8
index bf9d6a2ec..9d2efc7e1 100644
--- a/sshd.8
+++ b/sshd.8
@@ -34,8 +34,8 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: sshd.8,v 1.258 2010/08/08 19:36:30 jmc Exp $ 37.\" $OpenBSD: sshd.8,v 1.259 2010/08/31 11:54:45 djm Exp $
38.Dd $Mdocdate: August 8 2010 $ 38.Dd $Mdocdate: August 31 2010 $
39.Dt SSHD 8 39.Dt SSHD 8
40.Os 40.Os
41.Sh NAME 41.Sh NAME
@@ -170,9 +170,10 @@ host key files are normally not readable by anyone but root).
170The default is 170The default is
171.Pa /etc/ssh/ssh_host_key 171.Pa /etc/ssh/ssh_host_key
172for protocol version 1, and 172for protocol version 1, and
173.Pa /etc/ssh/ssh_host_rsa_key 173.Pa /etc/ssh/ssh_host_dsa_key ,
174.Pa /etc/ssh/ssh_host_ecdsa_key
174and 175and
175.Pa /etc/ssh/ssh_host_dsa_key 176.Pa /etc/ssh/ssh_host_rsa_key
176for protocol version 2. 177for protocol version 2.
177It is possible to have multiple host key files for 178It is possible to have multiple host key files for
178the different protocol versions and host key algorithms. 179the different protocol versions and host key algorithms.
@@ -275,7 +276,7 @@ though this can be changed via the
275.Cm Protocol 276.Cm Protocol
276option in 277option in
277.Xr sshd_config 5 . 278.Xr sshd_config 5 .
278Protocol 2 supports both RSA and DSA keys; 279Protocol 2 supports DSA, ECDSA and RSA keys;
279protocol 1 only supports RSA keys. 280protocol 1 only supports RSA keys.
280For both protocols, 281For both protocols,
281each host has a host-specific key, 282each host has a host-specific key,
@@ -483,6 +484,9 @@ protocol version 1; the
483comment field is not used for anything (but may be convenient for the 484comment field is not used for anything (but may be convenient for the
484user to identify the key). 485user to identify the key).
485For protocol version 2 the keytype is 486For protocol version 2 the keytype is
487.Dq ecdsa-sha2-nistp256 ,
488.Dq ecdsa-sha2-nistp384 ,
489.Dq ecdsa-sha2-nistp521 ,
486.Dq ssh-dss 490.Dq ssh-dss
487or 491or
488.Dq ssh-rsa . 492.Dq ssh-rsa .
@@ -494,6 +498,7 @@ keys up to 16 kilobits.
494You don't want to type them in; instead, copy the 498You don't want to type them in; instead, copy the
495.Pa identity.pub , 499.Pa identity.pub ,
496.Pa id_dsa.pub , 500.Pa id_dsa.pub ,
501.Pa id_ecdsa.pub ,
497or the 502or the
498.Pa id_rsa.pub 503.Pa id_rsa.pub
499file and edit it. 504file and edit it.
@@ -792,7 +797,8 @@ secret, but the recommended permissions are read/write/execute for the user,
792and not accessible by others. 797and not accessible by others.
793.Pp 798.Pp
794.It Pa ~/.ssh/authorized_keys 799.It Pa ~/.ssh/authorized_keys
795Lists the public keys (RSA/DSA) that can be used for logging in as this user. 800Lists the public keys (DSA/ECDSA/RSA) that can be used for logging in
801as this user.
796The format of this file is described above. 802The format of this file is described above.
797The content of the file is not highly sensitive, but the recommended 803The content of the file is not highly sensitive, but the recommended
798permissions are read/write for the user, and not accessible by others. 804permissions are read/write for the user, and not accessible by others.
@@ -871,6 +877,7 @@ rlogin/rsh.
871.Pp 877.Pp
872.It Pa /etc/ssh/ssh_host_key 878.It Pa /etc/ssh/ssh_host_key
873.It Pa /etc/ssh/ssh_host_dsa_key 879.It Pa /etc/ssh/ssh_host_dsa_key
880.It Pa /etc/ssh/ssh_host_ecdsa_key
874.It Pa /etc/ssh/ssh_host_rsa_key 881.It Pa /etc/ssh/ssh_host_rsa_key
875These three files contain the private parts of the host keys. 882These three files contain the private parts of the host keys.
876These files should only be owned by root, readable only by root, and not 883These files should only be owned by root, readable only by root, and not
@@ -881,6 +888,7 @@ does not start if these files are group/world-accessible.
881.Pp 888.Pp
882.It Pa /etc/ssh/ssh_host_key.pub 889.It Pa /etc/ssh/ssh_host_key.pub
883.It Pa /etc/ssh/ssh_host_dsa_key.pub 890.It Pa /etc/ssh/ssh_host_dsa_key.pub
891.It Pa /etc/ssh/ssh_host_ecdsa_key.pub
884.It Pa /etc/ssh/ssh_host_rsa_key.pub 892.It Pa /etc/ssh/ssh_host_rsa_key.pub
885These three files contain the public parts of the host keys. 893These three files contain the public parts of the host keys.
886These files should be world-readable but writable only by 894These files should be world-readable but writable only by