diff options
-rw-r--r-- | PROTOCOL | 33 |
1 files changed, 32 insertions, 1 deletions
@@ -458,4 +458,35 @@ respond with a SSH_FXP_STATUS message. | |||
458 | This extension is advertised in the SSH_FXP_VERSION hello with version | 458 | This extension is advertised in the SSH_FXP_VERSION hello with version |
459 | "1". | 459 | "1". |
460 | 460 | ||
461 | $OpenBSD: PROTOCOL,v 1.33 2018/08/10 00:27:15 djm Exp $ | 461 | 4. Miscellaneous changes |
462 | |||
463 | 4.1 Public key format | ||
464 | |||
465 | OpenSSH public keys, as generated by ssh-keygen(1) and appearing in | ||
466 | authorized_keys files, are formatted as a single line of text consisting | ||
467 | of the public key algorithm name followed by a base64-encoded key blob. | ||
468 | The public key blob (before base64 encoding) is the same format used | ||
469 | for the encoding of public keys sent on the wire, e.g. as described in | ||
470 | RFC4253 section 6.6 for RSA and DSA keys, RFC5656 section 3.1 for ECDSA | ||
471 | keys and the "New public key formats" section of PROTOCOL.certkeys for | ||
472 | the OpenSSH certificate formats. | ||
473 | |||
474 | 4.2 Private key format | ||
475 | |||
476 | OpenSSH private keys, as generated by ssh-keygen(1) use the format | ||
477 | described in PROTOCOL.key by default. As a legacy option, PEM format | ||
478 | (RFC7468) private keys are also supported for RSA, DSA and ECDSA keys | ||
479 | and were the default format before OpenSSH 7.8. | ||
480 | |||
481 | 4.3 KRL format | ||
482 | |||
483 | OpenSSH supports a compact format for Key Revocation Lists (KRLs). This | ||
484 | format is described in the PROTOCOL.krl file. | ||
485 | |||
486 | 4.4 Connection multiplexing | ||
487 | |||
488 | OpenSSH's connection multiplexing uses messages as described in | ||
489 | PROTOCOL.mux over a Unix domain socket for communications between a | ||
490 | master instance and later clients. | ||
491 | |||
492 | $OpenBSD: PROTOCOL,v 1.34 2018/08/10 00:42:29 djm Exp $ | ||