summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ChangeLog5
-rw-r--r--ssh.170
-rw-r--r--sshd.821
3 files changed, 44 insertions, 52 deletions
diff --git a/ChangeLog b/ChangeLog
index 9cf5c0313..08f910264 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -16,6 +16,9 @@
16 - dtucker@cvs.openbsd.org 2004/08/23 14:29:23 16 - dtucker@cvs.openbsd.org 2004/08/23 14:29:23
17 [ssh-keysign.c] 17 [ssh-keysign.c]
18 Remove duplicate getuid(), suggested by & ok markus@ 18 Remove duplicate getuid(), suggested by & ok markus@
19 - markus@cvs.openbsd.org 2004/08/26 16:00:55
20 [ssh.1 sshd.8]
21 get rid of references to rhosts authentication; with jmc@
19 22
2020040828 2320040828
21 - (dtucker) [openbsd-compat/mktemp.c] Remove superfluous Cygwin #ifdef; from 24 - (dtucker) [openbsd-compat/mktemp.c] Remove superfluous Cygwin #ifdef; from
@@ -1683,4 +1686,4 @@
1683 - (djm) Trim deprecated options from INSTALL. Mention UsePAM 1686 - (djm) Trim deprecated options from INSTALL. Mention UsePAM
1684 - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu 1687 - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
1685 1688
1686$Id: ChangeLog,v 1.3526 2004/08/29 06:32:59 dtucker Exp $ 1689$Id: ChangeLog,v 1.3527 2004/08/29 06:37:24 dtucker Exp $
diff --git a/ssh.1 b/ssh.1
index 0ff77ea29..b9ee4c62b 100644
--- a/ssh.1
+++ b/ssh.1
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: ssh.1,v 1.194 2004/08/12 21:41:13 jakob Exp $ 37.\" $OpenBSD: ssh.1,v 1.195 2004/08/26 16:00:55 markus Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSH 1 39.Dt SSH 1
40.Os 40.Os
@@ -103,35 +103,25 @@ is specified,
103.Ar command 103.Ar command
104is executed on the remote host instead of a login shell. 104is executed on the remote host instead of a login shell.
105.Ss SSH protocol version 1 105.Ss SSH protocol version 1
106First, if the machine the user logs in from is listed in 106The first authentication method is the
107.Em rhosts
108or
109.Em hosts.equiv
110method combined with RSA-based host authentication.
111If the machine the user logs in from is listed in
107.Pa /etc/hosts.equiv 112.Pa /etc/hosts.equiv
108or 113or
109.Pa /etc/shosts.equiv 114.Pa /etc/shosts.equiv
110on the remote machine, and the user names are 115on the remote machine, and the user names are
111the same on both sides, the user is immediately permitted to log in. 116the same on both sides, or if the files
112Second, if 117.Pa $HOME/.rhosts
113.Pa .rhosts
114or 118or
115.Pa .shosts 119.Pa $HOME/.shosts
116exists in the user's home directory on the 120exist in the user's home directory on the
117remote machine and contains a line containing the name of the client 121remote machine and contain a line containing the name of the client
118machine and the name of the user on that machine, the user is 122machine and the name of the user on that machine, the user is
119permitted to log in. 123considered for log in.
120This form of authentication alone is normally not 124Additionally, if the server can verify the client's
121allowed by the server because it is not secure.
122.Pp
123The second authentication method is the
124.Em rhosts
125or
126.Em hosts.equiv
127method combined with RSA-based host authentication.
128It means that if the login would be permitted by
129.Pa $HOME/.rhosts ,
130.Pa $HOME/.shosts ,
131.Pa /etc/hosts.equiv ,
132or
133.Pa /etc/shosts.equiv ,
134and if additionally the server can verify the client's
135host key (see 125host key (see
136.Pa /etc/ssh/ssh_known_hosts 126.Pa /etc/ssh/ssh_known_hosts
137and 127and
@@ -147,7 +137,7 @@ spoofing, DNS spoofing and routing spoofing.
147and the rlogin/rsh protocol in general, are inherently insecure and should be 137and the rlogin/rsh protocol in general, are inherently insecure and should be
148disabled if security is desired.] 138disabled if security is desired.]
149.Pp 139.Pp
150As a third authentication method, 140As a second authentication method,
151.Nm 141.Nm
152supports RSA based authentication. 142supports RSA based authentication.
153The scheme is based on public-key cryptography: there are cryptosystems 143The scheme is based on public-key cryptography: there are cryptosystems
@@ -195,9 +185,6 @@ file corresponds to the conventional
195file, and has one key 185file, and has one key
196per line, though the lines can be very long). 186per line, though the lines can be very long).
197After this, the user can log in without giving the password. 187After this, the user can log in without giving the password.
198RSA authentication is much more secure than
199.Em rhosts
200authentication.
201.Pp 188.Pp
202The most convenient way to use RSA authentication may be with an 189The most convenient way to use RSA authentication may be with an
203authentication agent. 190authentication agent.
@@ -1012,7 +999,9 @@ By default
1012is not setuid root. 999is not setuid root.
1013.It Pa $HOME/.rhosts 1000.It Pa $HOME/.rhosts
1014This file is used in 1001This file is used in
1015.Em rhosts 1002.Cm RhostsRSAAuthentication
1003and
1004.Cm HostbasedAuthentication
1016authentication to list the 1005authentication to list the
1017host/user pairs that are permitted to log in. 1006host/user pairs that are permitted to log in.
1018(Note that this file is 1007(Note that this file is
@@ -1031,12 +1020,10 @@ The recommended
1031permission for most machines is read/write for the user, and not 1020permission for most machines is read/write for the user, and not
1032accessible by others. 1021accessible by others.
1033.Pp 1022.Pp
1034Note that by default 1023Note that
1035.Xr sshd 8 1024.Xr sshd 8
1036will be installed so that it requires successful RSA host 1025allows authentication only in combination with client host key
1037authentication before permitting 1026authentication before permitting log in.
1038.Em rhosts
1039authentication.
1040If the server machine does not have the client's host key in 1027If the server machine does not have the client's host key in
1041.Pa /etc/ssh/ssh_known_hosts , 1028.Pa /etc/ssh/ssh_known_hosts ,
1042it can be stored in 1029it can be stored in
@@ -1049,15 +1036,19 @@ will automatically add the host key to
1049This file is used exactly the same way as 1036This file is used exactly the same way as
1050.Pa .rhosts . 1037.Pa .rhosts .
1051The purpose for 1038The purpose for
1052having this file is to be able to use rhosts authentication with 1039having this file is to be able to use
1053.Nm 1040.Cm RhostsRSAAuthentication
1054without permitting login with 1041and
1042.Cm HostbasedAuthentication
1043authentication without permitting login with
1055.Xr rlogin 1044.Xr rlogin
1056or 1045or
1057.Xr rsh 1 . 1046.Xr rsh 1 .
1058.It Pa /etc/hosts.equiv 1047.It Pa /etc/hosts.equiv
1059This file is used during 1048This file is used during
1060.Em rhosts 1049.Cm RhostsRSAAuthentication
1050and
1051.Cm HostbasedAuthentication
1061authentication. 1052authentication.
1062It contains 1053It contains
1063canonical hosts names, one per line (the full format is described in the 1054canonical hosts names, one per line (the full format is described in the
@@ -1066,8 +1057,7 @@ manual page).
1066If the client host is found in this file, login is 1057If the client host is found in this file, login is
1067automatically permitted provided client and server user names are the 1058automatically permitted provided client and server user names are the
1068same. 1059same.
1069Additionally, successful RSA host authentication is normally 1060Additionally, successful client host key authentication is required.
1070required.
1071This file should only be writable by root. 1061This file should only be writable by root.
1072.It Pa /etc/shosts.equiv 1062.It Pa /etc/shosts.equiv
1073This file is processed exactly as 1063This file is processed exactly as
diff --git a/sshd.8 b/sshd.8
index 233b00037..83d0f48d2 100644
--- a/sshd.8
+++ b/sshd.8
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: sshd.8,v 1.201 2004/05/02 11:54:31 dtucker Exp $ 37.\" $OpenBSD: sshd.8,v 1.202 2004/08/26 16:00:55 markus Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSHD 8 39.Dt SSHD 8
40.Os 40.Os
@@ -106,8 +106,6 @@ to use from those offered by the server.
106Next, the server and the client enter an authentication dialog. 106Next, the server and the client enter an authentication dialog.
107The client tries to authenticate itself using 107The client tries to authenticate itself using
108.Em .rhosts 108.Em .rhosts
109authentication,
110.Em .rhosts
111authentication combined with RSA host 109authentication combined with RSA host
112authentication, RSA challenge-response authentication, or password 110authentication, RSA challenge-response authentication, or password
113based authentication. 111based authentication.
@@ -135,11 +133,6 @@ or
135.Ql \&*NP\&* 133.Ql \&*NP\&*
136). 134).
137.Pp 135.Pp
138.Em rhosts
139authentication is normally disabled
140because it is fundamentally insecure, but can be enabled in the server
141configuration file if desired.
142System security is not improved unless
143.Nm rshd , 136.Nm rshd ,
144.Nm rlogind , 137.Nm rlogind ,
145and 138and
@@ -670,7 +663,11 @@ Access controls that should be enforced by tcp-wrappers are defined here.
670Further details are described in 663Further details are described in
671.Xr hosts_access 5 . 664.Xr hosts_access 5 .
672.It Pa $HOME/.rhosts 665.It Pa $HOME/.rhosts
673This file contains host-username pairs, separated by a space, one per 666This file is used during
667.Cm RhostsRSAAuthentication
668and
669.Cm HostbasedAuthentication
670and contains host-username pairs, separated by a space, one per
674line. 671line.
675The given user on the corresponding host is permitted to log in 672The given user on the corresponding host is permitted to log in
676without a password. 673without a password.
@@ -691,7 +688,9 @@ However, this file is
691not used by rlogin and rshd, so using this permits access using SSH only. 688not used by rlogin and rshd, so using this permits access using SSH only.
692.It Pa /etc/hosts.equiv 689.It Pa /etc/hosts.equiv
693This file is used during 690This file is used during
694.Em rhosts 691.Cm RhostsRSAAuthentication
692and
693.Cm HostbasedAuthentication
695authentication. 694authentication.
696In the simplest form, this file contains host names, one per line. 695In the simplest form, this file contains host names, one per line.
697Users on 696Users on
@@ -710,7 +709,7 @@ Negated entries start with
710If the client host/user is successfully matched in this file, login is 709If the client host/user is successfully matched in this file, login is
711automatically permitted provided the client and server user names are the 710automatically permitted provided the client and server user names are the
712same. 711same.
713Additionally, successful RSA host authentication is normally required. 712Additionally, successful client host key authentication is required.
714This file must be writable only by root; it is recommended 713This file must be writable only by root; it is recommended
715that it be world-readable. 714that it be world-readable.
716.Pp 715.Pp