summaryrefslogtreecommitdiff
path: root/sshd_config.0
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2011-09-06 14:56:29 +0100
committerColin Watson <cjwatson@debian.org>2011-09-06 14:56:29 +0100
commit978e62d6f14c60747bddef2cc72d66a9c8b83b54 (patch)
tree89400a44e42d84937deba7864e4964d6c7734da5 /sshd_config.0
parent87c685b8c6a49814fd782288097b3093f975aa72 (diff)
parent3a7e89697ca363de0f64e0d5704c57219294e41c (diff)
* New upstream release (http://www.openssh.org/txt/release-5.9).
- Introduce sandboxing of the pre-auth privsep child using an optional sshd_config(5) "UsePrivilegeSeparation=sandbox" mode that enables mandatory restrictions on the syscalls the privsep child can perform. - Add new SHA256-based HMAC transport integrity modes from http://www.ietf.org/id/draft-dbider-sha2-mac-for-ssh-02.txt. - The pre-authentication sshd(8) privilege separation slave process now logs via a socket shared with the master process, avoiding the need to maintain /dev/log inside the chroot (closes: #75043, #429243, #599240). - ssh(1) now warns when a server refuses X11 forwarding (closes: #504757). - sshd_config(5)'s AuthorizedKeysFile now accepts multiple paths, separated by whitespace (closes: #76312). The authorized_keys2 fallback is deprecated but documented (closes: #560156). - ssh(1) and sshd(8): set IPv6 traffic class from IPQoS, as well as IPv4 ToS/DSCP (closes: #498297). - ssh-add(1) now accepts keys piped from standard input. E.g. "ssh-add - < /path/to/key" (closes: #229124). - Clean up lost-passphrase text in ssh-keygen(1) (closes: #444691). - Say "required" rather than "recommended" in unprotected-private-key warning (LP: #663455).
Diffstat (limited to 'sshd_config.0')
-rw-r--r--sshd_config.015
1 files changed, 10 insertions, 5 deletions
diff --git a/sshd_config.0 b/sshd_config.0
index ab0d79be6..e19ca875b 100644
--- a/sshd_config.0
+++ b/sshd_config.0
@@ -81,8 +81,9 @@ DESCRIPTION
81 home directory of the user being authenticated, and %u is 81 home directory of the user being authenticated, and %u is
82 replaced by the username of that user. After expansion, 82 replaced by the username of that user. After expansion,
83 AuthorizedKeysFile is taken to be an absolute path or one 83 AuthorizedKeysFile is taken to be an absolute path or one
84 relative to the user's home directory. The default is 84 relative to the user's home directory. Multiple files may be
85 ``.ssh/authorized_keys''. 85 listed, separated by whitespace. The default is
86 ``.ssh/authorized_keys .ssh/authorized_keys2''.
86 87
87 AuthorizedPrincipalsFile 88 AuthorizedPrincipalsFile
88 Specifies a file that lists principal names that are accepted for 89 Specifies a file that lists principal names that are accepted for
@@ -375,7 +376,9 @@ DESCRIPTION
375 separated. The default is: 376 separated. The default is:
376 377
377 hmac-md5,hmac-sha1,umac-64@openssh.com, 378 hmac-md5,hmac-sha1,umac-64@openssh.com,
378 hmac-ripemd160,hmac-sha1-96,hmac-md5-96 379 hmac-ripemd160,hmac-sha1-96,hmac-md5-96,
380 hmac-sha2-256,hmac-sha256-96,hmac-sha2-512,
381 hmac-sha2-512-96
379 382
380 Match Introduces a conditional block. If all of the criteria on the 383 Match Introduces a conditional block. If all of the criteria on the
381 Match line are satisfied, the keywords on the following lines 384 Match line are satisfied, the keywords on the following lines
@@ -625,7 +628,9 @@ DESCRIPTION
625 that has the privilege of the authenticated user. The goal of 628 that has the privilege of the authenticated user. The goal of
626 privilege separation is to prevent privilege escalation by 629 privilege separation is to prevent privilege escalation by
627 containing any corruption within the unprivileged processes. The 630 containing any corruption within the unprivileged processes. The
628 default is ``yes''. 631 default is ``yes''. If UsePrivilegeSeparation is set to
632 ``sandbox'' then the pre-authentication unprivileged process is
633 subject to additional restrictions.
629 634
630 X11DisplayOffset 635 X11DisplayOffset
631 Specifies the first display number available for sshd(8)'s X11 636 Specifies the first display number available for sshd(8)'s X11
@@ -710,4 +715,4 @@ AUTHORS
710 versions 1.5 and 2.0. Niels Provos and Markus Friedl contributed support 715 versions 1.5 and 2.0. Niels Provos and Markus Friedl contributed support
711 for privilege separation. 716 for privilege separation.
712 717
713OpenBSD 4.9 December 8, 2010 OpenBSD 4.9 718OpenBSD 5.0 August 2, 2011 OpenBSD 5.0