=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/PROTOCOL.certkeys,v retrieving revision 1.15 retrieving revision 1.17 diff -u -r1.15 -r1.17 --- src/usr.bin/ssh/PROTOCOL.certkeys 2018/07/03 11:39:54 1.15 +++ src/usr.bin/ssh/PROTOCOL.certkeys 2019/11/25 00:57:51 1.17 @@ -36,6 +36,7 @@ ecdsa-sha2-nistp256-cert-v01@openssh.com ecdsa-sha2-nistp384-cert-v01@openssh.com ecdsa-sha2-nistp521-cert-v01@openssh.com + ssh-ed25519-cert-v01@openssh.com Two additional types exist for RSA certificates to force use of SHA-2 signatures (SHA-256 and SHA-512 respectively): @@ -279,6 +280,13 @@ Name Format Description ----------------------------------------------------------------------------- +no-presence-required empty Flag indicating that signatures made + with this certificate need not assert + user presence. This option only make + sense for the U2F/FIDO security key + types that support this feature in + their signature formats. + permit-X11-forwarding empty Flag indicating that X11 forwarding should be permitted. X11 forwarding will be refused if this option is absent. @@ -303,4 +311,4 @@ of this script will not be permitted if this option is not present. -$OpenBSD: PROTOCOL.certkeys,v 1.15 2018/07/03 11:39:54 djm Exp $ +$OpenBSD: PROTOCOL.certkeys,v 1.17 2019/11/25 00:57:51 djm Exp $