diff options
-rw-r--r-- | ChangeLog | 5 | ||||
-rw-r--r-- | sshd.8 | 7 |
2 files changed, 7 insertions, 5 deletions
@@ -165,6 +165,9 @@ | |||
165 | log functions should not be passed strings that end in newline as they | 165 | log functions should not be passed strings that end in newline as they |
166 | get passed on to syslog() and when logging to stderr, do_log() appends | 166 | get passed on to syslog() and when logging to stderr, do_log() appends |
167 | its own newline. | 167 | its own newline. |
168 | - deraadt@cvs.openbsd.org 2001/03/04 18:21:28 | ||
169 | [sshd.8] | ||
170 | list SSH2 ciphers | ||
168 | 171 | ||
169 | 20010304 | 172 | 20010304 |
170 | - (bal) Remove make-ssh-known-hosts.1 since it's no longer valid. | 173 | - (bal) Remove make-ssh-known-hosts.1 since it's no longer valid. |
@@ -4357,4 +4360,4 @@ | |||
4357 | - Wrote replacements for strlcpy and mkdtemp | 4360 | - Wrote replacements for strlcpy and mkdtemp |
4358 | - Released 1.0pre1 | 4361 | - Released 1.0pre1 |
4359 | 4362 | ||
4360 | $Id: ChangeLog,v 1.902 2001/03/05 07:47:23 mouring Exp $ | 4363 | $Id: ChangeLog,v 1.903 2001/03/05 07:48:45 mouring Exp $ |
@@ -34,7 +34,7 @@ | |||
34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
36 | .\" | 36 | .\" |
37 | .\" $OpenBSD: sshd.8,v 1.102 2001/03/04 12:54:04 stevesk Exp $ | 37 | .\" $OpenBSD: sshd.8,v 1.103 2001/03/04 18:21:28 deraadt Exp $ |
38 | .Dd September 25, 1999 | 38 | .Dd September 25, 1999 |
39 | .Dt SSHD 8 | 39 | .Dt SSHD 8 |
40 | .Os | 40 | .Os |
@@ -134,9 +134,8 @@ Each host has a host-specific DSA key used to identify the host. | |||
134 | However, when the daemon starts, it does not generate a server key. | 134 | However, when the daemon starts, it does not generate a server key. |
135 | Forward security is provided through a Diffie-Hellman key agreement. | 135 | Forward security is provided through a Diffie-Hellman key agreement. |
136 | This key agreement results in a shared session key. | 136 | This key agreement results in a shared session key. |
137 | The rest of the session is encrypted | 137 | The rest of the session is encrypted using a symmetric cipher, currently |
138 | using a symmetric cipher, currently | 138 | Blowfish, 3DES, CAST128, Arcfour, 128 bit AES, or 256 bit AES. |
139 | Blowfish, 3DES or CAST128 in CBC mode or Arcfour. | ||
140 | The client selects the encryption algorithm | 139 | The client selects the encryption algorithm |
141 | to use from those offered by the server. | 140 | to use from those offered by the server. |
142 | Additionally, session integrity is provided | 141 | Additionally, session integrity is provided |