diff options
-rw-r--r-- | debian/changelog | 6 | ||||
-rw-r--r-- | ssh-vulnkey.1 | 36 |
2 files changed, 42 insertions, 0 deletions
diff --git a/debian/changelog b/debian/changelog index b61c9dc54..299842d51 100644 --- a/debian/changelog +++ b/debian/changelog | |||
@@ -1,3 +1,9 @@ | |||
1 | openssh (1:4.7p1-10) UNRELEASED; urgency=low | ||
2 | |||
3 | * Add a FILES section to ssh-vulnkey(1) (thanks, Hugh Daniel). | ||
4 | |||
5 | -- Colin Watson <cjwatson@debian.org> Wed, 14 May 2008 09:47:29 +0100 | ||
6 | |||
1 | openssh (1:4.7p1-9) unstable; urgency=critical | 7 | openssh (1:4.7p1-9) unstable; urgency=critical |
2 | 8 | ||
3 | * Fill in CVE identifier for security vulnerability fixed in 1:4.7p1-8. | 9 | * Fill in CVE identifier for security vulnerability fixed in 1:4.7p1-8. |
diff --git a/ssh-vulnkey.1 b/ssh-vulnkey.1 index 9286e73c0..41de104de 100644 --- a/ssh-vulnkey.1 +++ b/ssh-vulnkey.1 | |||
@@ -138,6 +138,42 @@ The key fingerprint may be generated using | |||
138 | .Pp | 138 | .Pp |
139 | This strict format is necessary to allow the blacklist file to be checked | 139 | This strict format is necessary to allow the blacklist file to be checked |
140 | quickly, using a binary-search algorithm. | 140 | quickly, using a binary-search algorithm. |
141 | .Sh FILES | ||
142 | .Bl -tag -width Ds | ||
143 | .It Pa ~/.ssh/id_rsa | ||
144 | If present, contains the protocol version 2 RSA authentication identity of | ||
145 | the user. | ||
146 | .It Pa ~/.ssh/id_dsa | ||
147 | If present, contains the protocol version 2 DSA authentication identity of | ||
148 | the user. | ||
149 | .It Pa ~/.ssh/identity | ||
150 | If present, contains the protocol version 1 RSA authentication identity of | ||
151 | the user. | ||
152 | .It Pa ~/.ssh/authorized_keys | ||
153 | If present, lists the public keys (RSA/DSA) that can be used for logging in | ||
154 | as this user. | ||
155 | .It Pa ~/.ssh/authorized_keys2 | ||
156 | Obsolete name for | ||
157 | .Pa ~/.ssh/authorized_keys . | ||
158 | This file may still be present on some old systems, but should not be | ||
159 | created if it is missing. | ||
160 | .It Pa /etc/ssh/ssh_host_rsa_key | ||
161 | If present, contains the protocol version 2 RSA identity of the system. | ||
162 | .It Pa /etc/ssh/ssh_host_dsa_key | ||
163 | If present, contains the protocol version 2 DSA identity of the system. | ||
164 | .It Pa /etc/ssh/ssh_host_key | ||
165 | If present, contains the protocol version 1 RSA identity of the system. | ||
166 | .It Pa /etc/ssh/blacklist. Ns Ar TYPE Ns Pa - Ns Ar LENGTH | ||
167 | If present, lists the blacklisted keys of type | ||
168 | .Ar TYPE | ||
169 | .Pf ( Dq RSA1 , | ||
170 | .Dq RSA , | ||
171 | or | ||
172 | .Dq DSA ) | ||
173 | and bit length | ||
174 | .Ar LENGTH . | ||
175 | The format of this file is described above. | ||
176 | .El | ||
141 | .Sh SEE ALSO | 177 | .Sh SEE ALSO |
142 | .Xr ssh-keygen 1 , | 178 | .Xr ssh-keygen 1 , |
143 | .Xr sshd 8 | 179 | .Xr sshd 8 |