diff options
-rw-r--r-- | moduli.5 | 4 | ||||
-rw-r--r-- | ssh-keygen.1 | 12 | ||||
-rw-r--r-- | ssh.1 | 4 | ||||
-rw-r--r-- | sshd.8 | 5 | ||||
-rw-r--r-- | sshd_config.5 | 3 |
5 files changed, 13 insertions, 15 deletions
@@ -21,7 +21,7 @@ | |||
21 | .Nd Diffie-Hellman moduli | 21 | .Nd Diffie-Hellman moduli |
22 | .Sh DESCRIPTION | 22 | .Sh DESCRIPTION |
23 | The | 23 | The |
24 | .Pa /etc/moduli | 24 | .Pa /etc/ssh/moduli |
25 | file contains prime numbers and generators for use by | 25 | file contains prime numbers and generators for use by |
26 | .Xr sshd 8 | 26 | .Xr sshd 8 |
27 | in the Diffie-Hellman Group Exchange key exchange method. | 27 | in the Diffie-Hellman Group Exchange key exchange method. |
@@ -110,7 +110,7 @@ first estimates the size of the modulus required to produce enough | |||
110 | Diffie-Hellman output to sufficiently key the selected symmetric cipher. | 110 | Diffie-Hellman output to sufficiently key the selected symmetric cipher. |
111 | .Xr sshd 8 | 111 | .Xr sshd 8 |
112 | then randomly selects a modulus from | 112 | then randomly selects a modulus from |
113 | .Fa /etc/moduli | 113 | .Fa /etc/ssh/moduli |
114 | that best meets the size requirement. | 114 | that best meets the size requirement. |
115 | .Sh SEE ALSO | 115 | .Sh SEE ALSO |
116 | .Xr ssh-keygen 1 , | 116 | .Xr ssh-keygen 1 , |
diff --git a/ssh-keygen.1 b/ssh-keygen.1 index 7af564297..d6a7870e0 100644 --- a/ssh-keygen.1 +++ b/ssh-keygen.1 | |||
@@ -196,9 +196,7 @@ key in | |||
196 | .Pa ~/.ssh/id_ed25519_sk | 196 | .Pa ~/.ssh/id_ed25519_sk |
197 | or | 197 | or |
198 | .Pa ~/.ssh/id_rsa . | 198 | .Pa ~/.ssh/id_rsa . |
199 | Additionally, the system administrator may use this to generate host keys, | 199 | Additionally, the system administrator may use this to generate host keys. |
200 | as seen in | ||
201 | .Pa /etc/rc . | ||
202 | .Pp | 200 | .Pp |
203 | Normally this program generates the key and asks for a file in which | 201 | Normally this program generates the key and asks for a file in which |
204 | to store the private key. | 202 | to store the private key. |
@@ -261,9 +259,7 @@ If | |||
261 | .Fl f | 259 | .Fl f |
262 | has also been specified, its argument is used as a prefix to the | 260 | has also been specified, its argument is used as a prefix to the |
263 | default path for the resulting host key files. | 261 | default path for the resulting host key files. |
264 | This is used by | 262 | This is used by system administration scripts to generate new host keys. |
265 | .Pa /etc/rc | ||
266 | to generate new host keys. | ||
267 | .It Fl a Ar rounds | 263 | .It Fl a Ar rounds |
268 | When saving a private key, this option specifies the number of KDF | 264 | When saving a private key, this option specifies the number of KDF |
269 | (key derivation function) rounds used. | 265 | (key derivation function) rounds used. |
@@ -783,7 +779,7 @@ option. | |||
783 | Valid generator values are 2, 3, and 5. | 779 | Valid generator values are 2, 3, and 5. |
784 | .Pp | 780 | .Pp |
785 | Screened DH groups may be installed in | 781 | Screened DH groups may be installed in |
786 | .Pa /etc/moduli . | 782 | .Pa /etc/ssh/moduli . |
787 | It is important that this file contains moduli of a range of bit lengths and | 783 | It is important that this file contains moduli of a range of bit lengths and |
788 | that both ends of a connection share common moduli. | 784 | that both ends of a connection share common moduli. |
789 | .Pp | 785 | .Pp |
@@ -1154,7 +1150,7 @@ on all machines | |||
1154 | where the user wishes to log in using public key authentication. | 1150 | where the user wishes to log in using public key authentication. |
1155 | There is no need to keep the contents of this file secret. | 1151 | There is no need to keep the contents of this file secret. |
1156 | .Pp | 1152 | .Pp |
1157 | .It Pa /etc/moduli | 1153 | .It Pa /etc/ssh/moduli |
1158 | Contains Diffie-Hellman groups used for DH-GEX. | 1154 | Contains Diffie-Hellman groups used for DH-GEX. |
1159 | The file format is described in | 1155 | The file format is described in |
1160 | .Xr moduli 5 . | 1156 | .Xr moduli 5 . |
@@ -887,6 +887,10 @@ implements public key authentication protocol automatically, | |||
887 | using one of the DSA, ECDSA, Ed25519 or RSA algorithms. | 887 | using one of the DSA, ECDSA, Ed25519 or RSA algorithms. |
888 | The HISTORY section of | 888 | The HISTORY section of |
889 | .Xr ssl 8 | 889 | .Xr ssl 8 |
890 | (on non-OpenBSD systems, see | ||
891 | .nh | ||
892 | http://www.openbsd.org/cgi\-bin/man.cgi?query=ssl&sektion=8#HISTORY) | ||
893 | .hy | ||
890 | contains a brief discussion of the DSA and RSA algorithms. | 894 | contains a brief discussion of the DSA and RSA algorithms. |
891 | .Pp | 895 | .Pp |
892 | The file | 896 | The file |
@@ -65,7 +65,7 @@ over an insecure network. | |||
65 | .Nm | 65 | .Nm |
66 | listens for connections from clients. | 66 | listens for connections from clients. |
67 | It is normally started at boot from | 67 | It is normally started at boot from |
68 | .Pa /etc/rc . | 68 | .Pa /etc/init.d/ssh . |
69 | It forks a new | 69 | It forks a new |
70 | daemon for each incoming connection. | 70 | daemon for each incoming connection. |
71 | The forked daemons handle | 71 | The forked daemons handle |
@@ -904,7 +904,7 @@ This file is for host-based authentication (see | |||
904 | .Xr ssh 1 ) . | 904 | .Xr ssh 1 ) . |
905 | It should only be writable by root. | 905 | It should only be writable by root. |
906 | .Pp | 906 | .Pp |
907 | .It Pa /etc/moduli | 907 | .It Pa /etc/ssh/moduli |
908 | Contains Diffie-Hellman groups used for the "Diffie-Hellman Group Exchange" | 908 | Contains Diffie-Hellman groups used for the "Diffie-Hellman Group Exchange" |
909 | key exchange method. | 909 | key exchange method. |
910 | The file format is described in | 910 | The file format is described in |
@@ -1002,7 +1002,6 @@ The content of this file is not sensitive; it can be world-readable. | |||
1002 | .Xr ssh-keyscan 1 , | 1002 | .Xr ssh-keyscan 1 , |
1003 | .Xr chroot 2 , | 1003 | .Xr chroot 2 , |
1004 | .Xr hosts_access 5 , | 1004 | .Xr hosts_access 5 , |
1005 | .Xr login.conf 5 , | ||
1006 | .Xr moduli 5 , | 1005 | .Xr moduli 5 , |
1007 | .Xr sshd_config 5 , | 1006 | .Xr sshd_config 5 , |
1008 | .Xr inetd 8 , | 1007 | .Xr inetd 8 , |
diff --git a/sshd_config.5 b/sshd_config.5 index c926f584c..25f4b8117 100644 --- a/sshd_config.5 +++ b/sshd_config.5 | |||
@@ -387,8 +387,7 @@ Certificates signed using other algorithms will not be accepted for | |||
387 | public key or host-based authentication. | 387 | public key or host-based authentication. |
388 | .It Cm ChallengeResponseAuthentication | 388 | .It Cm ChallengeResponseAuthentication |
389 | Specifies whether challenge-response authentication is allowed (e.g. via | 389 | Specifies whether challenge-response authentication is allowed (e.g. via |
390 | PAM or through authentication styles supported in | 390 | PAM). |
391 | .Xr login.conf 5 ) | ||
392 | The default is | 391 | The default is |
393 | .Cm yes . | 392 | .Cm yes . |
394 | .It Cm ChrootDirectory | 393 | .It Cm ChrootDirectory |