summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ChangeLog8
-rw-r--r--sshd.836
2 files changed, 22 insertions, 22 deletions
diff --git a/ChangeLog b/ChangeLog
index 7ee586cbd..a830ce51a 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,9 @@
120010306
2 - (bal) OpenBSD CVS Sync
3 - deraadt@cvs.openbsd.org 2001/03/05 14:28:47
4 [sshd.8]
5 alpha order; jcs@rt.fm
6
120010305 720010305
2 - (bal) CVS ID touch up on sshpty.[ch] and sshlogin.[ch] 8 - (bal) CVS ID touch up on sshpty.[ch] and sshlogin.[ch]
3 - (bal) CVS ID touch up on sftp-int.c 9 - (bal) CVS ID touch up on sftp-int.c
@@ -4368,4 +4374,4 @@
4368 - Wrote replacements for strlcpy and mkdtemp 4374 - Wrote replacements for strlcpy and mkdtemp
4369 - Released 1.0pre1 4375 - Released 1.0pre1
4370 4376
4371$Id: ChangeLog,v 1.908 2001/03/05 19:50:57 stevesk Exp $ 4377$Id: ChangeLog,v 1.909 2001/03/06 01:00:03 mouring Exp $
diff --git a/sshd.8 b/sshd.8
index 52e902ef7..c924a438f 100644
--- a/sshd.8
+++ b/sshd.8
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: sshd.8,v 1.103 2001/03/04 18:21:28 deraadt Exp $ 37.\" $OpenBSD: sshd.8,v 1.104 2001/03/05 14:28:47 deraadt Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSHD 8 39.Dt SSHD 8
40.Os 40.Os
@@ -339,6 +339,15 @@ The contents of the specified file are sent to the remote user before
339authentication is allowed. 339authentication is allowed.
340This option is only available for protocol version 2. 340This option is only available for protocol version 2.
341.Pp 341.Pp
342.It Cm ChallengeResponseAuthentication
343Specifies whether
344challenge response
345authentication is allowed.
346Currently there is only support for
347.Xr skey 1
348authentication.
349The default is
350.Dq yes .
342.It Cm Ciphers 351.It Cm Ciphers
343Specifies the ciphers allowed for protocol version 2. 352Specifies the ciphers allowed for protocol version 2.
344Multiple ciphers must be comma-separated. 353Multiple ciphers must be comma-separated.
@@ -373,11 +382,6 @@ and
373can be used as wildcards in the patterns. 382can be used as wildcards in the patterns.
374Only user names are valid; a numerical user ID isn't recognized. 383Only user names are valid; a numerical user ID isn't recognized.
375By default login is allowed regardless of the user name. 384By default login is allowed regardless of the user name.
376.It Cm PubkeyAuthentication
377Specifies whether public key authentication is allowed.
378The default is
379.Dq yes .
380Note that this option applies to protocol version 2 only.
381.It Cm GatewayPorts 385.It Cm GatewayPorts
382Specifies whether remote hosts are allowed to connect to ports 386Specifies whether remote hosts are allowed to connect to ports
383forwarded for the client. 387forwarded for the client.
@@ -611,6 +615,11 @@ and
611Multiple versions must be comma-separated. 615Multiple versions must be comma-separated.
612The default is 616The default is
613.Dq 1 . 617.Dq 1 .
618.It Cm PubkeyAuthentication
619Specifies whether public key authentication is allowed.
620The default is
621.Dq yes .
622Note that this option applies to protocol version 2 only.
614.It Cm ReverseMappingCheck 623.It Cm ReverseMappingCheck
615Specifies whether 624Specifies whether
616.Nm 625.Nm
@@ -642,21 +651,6 @@ Note that this option applies to protocol version 1 only.
642.It Cm ServerKeyBits 651.It Cm ServerKeyBits
643Defines the number of bits in the server key. 652Defines the number of bits in the server key.
644The minimum value is 512, and the default is 768. 653The minimum value is 512, and the default is 768.
645.It Cm ChallengeResponseAuthentication
646Specifies whether
647challenge response
648authentication is allowed.
649Currently there is support for
650.Xr skey 1
651and PAM authentication.
652The default is
653.Dq yes .
654Note that enabling ChallengeResponseAuthentication for PAM bypasses
655OpenSSH's password checking code, thus rendering options such as
656.Cm PasswordAuthentication
657and
658.Cm PermitEmptyPasswords
659ineffective.
660.It Cm StrictModes 654.It Cm StrictModes
661Specifies whether 655Specifies whether
662.Nm 656.Nm