diff options
author | Colin Watson <cjwatson@debian.org> | 2011-09-06 14:56:29 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2011-09-06 14:56:29 +0100 |
commit | 978e62d6f14c60747bddef2cc72d66a9c8b83b54 (patch) | |
tree | 89400a44e42d84937deba7864e4964d6c7734da5 /sshd_config.0 | |
parent | 87c685b8c6a49814fd782288097b3093f975aa72 (diff) | |
parent | 3a7e89697ca363de0f64e0d5704c57219294e41c (diff) |
* New upstream release (http://www.openssh.org/txt/release-5.9).
- Introduce sandboxing of the pre-auth privsep child using an optional
sshd_config(5) "UsePrivilegeSeparation=sandbox" mode that enables
mandatory restrictions on the syscalls the privsep child can perform.
- Add new SHA256-based HMAC transport integrity modes from
http://www.ietf.org/id/draft-dbider-sha2-mac-for-ssh-02.txt.
- The pre-authentication sshd(8) privilege separation slave process now
logs via a socket shared with the master process, avoiding the need to
maintain /dev/log inside the chroot (closes: #75043, #429243,
#599240).
- ssh(1) now warns when a server refuses X11 forwarding (closes:
#504757).
- sshd_config(5)'s AuthorizedKeysFile now accepts multiple paths,
separated by whitespace (closes: #76312). The authorized_keys2
fallback is deprecated but documented (closes: #560156).
- ssh(1) and sshd(8): set IPv6 traffic class from IPQoS, as well as IPv4
ToS/DSCP (closes: #498297).
- ssh-add(1) now accepts keys piped from standard input. E.g. "ssh-add
- < /path/to/key" (closes: #229124).
- Clean up lost-passphrase text in ssh-keygen(1) (closes: #444691).
- Say "required" rather than "recommended" in unprotected-private-key
warning (LP: #663455).
Diffstat (limited to 'sshd_config.0')
-rw-r--r-- | sshd_config.0 | 15 |
1 files changed, 10 insertions, 5 deletions
diff --git a/sshd_config.0 b/sshd_config.0 index ab0d79be6..e19ca875b 100644 --- a/sshd_config.0 +++ b/sshd_config.0 | |||
@@ -81,8 +81,9 @@ DESCRIPTION | |||
81 | home directory of the user being authenticated, and %u is | 81 | home directory of the user being authenticated, and %u is |
82 | replaced by the username of that user. After expansion, | 82 | replaced by the username of that user. After expansion, |
83 | AuthorizedKeysFile is taken to be an absolute path or one | 83 | AuthorizedKeysFile is taken to be an absolute path or one |
84 | relative to the user's home directory. The default is | 84 | relative to the user's home directory. Multiple files may be |
85 | ``.ssh/authorized_keys''. | 85 | listed, separated by whitespace. The default is |
86 | ``.ssh/authorized_keys .ssh/authorized_keys2''. | ||
86 | 87 | ||
87 | AuthorizedPrincipalsFile | 88 | AuthorizedPrincipalsFile |
88 | Specifies a file that lists principal names that are accepted for | 89 | Specifies a file that lists principal names that are accepted for |
@@ -375,7 +376,9 @@ DESCRIPTION | |||
375 | separated. The default is: | 376 | separated. The default is: |
376 | 377 | ||
377 | hmac-md5,hmac-sha1,umac-64@openssh.com, | 378 | hmac-md5,hmac-sha1,umac-64@openssh.com, |
378 | hmac-ripemd160,hmac-sha1-96,hmac-md5-96 | 379 | hmac-ripemd160,hmac-sha1-96,hmac-md5-96, |
380 | hmac-sha2-256,hmac-sha256-96,hmac-sha2-512, | ||
381 | hmac-sha2-512-96 | ||
379 | 382 | ||
380 | Match Introduces a conditional block. If all of the criteria on the | 383 | Match Introduces a conditional block. If all of the criteria on the |
381 | Match line are satisfied, the keywords on the following lines | 384 | Match line are satisfied, the keywords on the following lines |
@@ -625,7 +628,9 @@ DESCRIPTION | |||
625 | that has the privilege of the authenticated user. The goal of | 628 | that has the privilege of the authenticated user. The goal of |
626 | privilege separation is to prevent privilege escalation by | 629 | privilege separation is to prevent privilege escalation by |
627 | containing any corruption within the unprivileged processes. The | 630 | containing any corruption within the unprivileged processes. The |
628 | default is ``yes''. | 631 | default is ``yes''. If UsePrivilegeSeparation is set to |
632 | ``sandbox'' then the pre-authentication unprivileged process is | ||
633 | subject to additional restrictions. | ||
629 | 634 | ||
630 | X11DisplayOffset | 635 | X11DisplayOffset |
631 | Specifies the first display number available for sshd(8)'s X11 | 636 | Specifies the first display number available for sshd(8)'s X11 |
@@ -710,4 +715,4 @@ AUTHORS | |||
710 | versions 1.5 and 2.0. Niels Provos and Markus Friedl contributed support | 715 | versions 1.5 and 2.0. Niels Provos and Markus Friedl contributed support |
711 | for privilege separation. | 716 | for privilege separation. |
712 | 717 | ||
713 | OpenBSD 4.9 December 8, 2010 OpenBSD 4.9 | 718 | OpenBSD 5.0 August 2, 2011 OpenBSD 5.0 |