[BACK]Return to ssh.1 CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Diff for /src/usr.bin/ssh/ssh.1 between version 1.116 and 1.117

version 1.116, 2001/06/23 02:34:31 version 1.117, 2001/06/23 17:48:19
Line 269 
Line 269 
 .Ss Escape Characters  .Ss Escape Characters
 .Pp  .Pp
 When a pseudo terminal has been requested, ssh supports a number of functions  When a pseudo terminal has been requested, ssh supports a number of functions
 through the use of an escape character.  through the use of an escape character.
 .Pp  .Pp
 A single tilde character can be sent as  A single tilde character can be sent as
 .Ic ~~  .Ic ~~
Line 278 
Line 278 
 special.  special.
 The escape character can be changed in configuration files using the  The escape character can be changed in configuration files using the
 .Cm EscapeChar  .Cm EscapeChar
 configuration directive or on the command line by the  configuration directive or on the command line by the
 .Fl e  .Fl e
 option.  option.
 .Pp  .Pp
Line 510 
Line 510 
 Causes all warning and diagnostic messages to be suppressed.  Causes all warning and diagnostic messages to be suppressed.
 Only fatal errors are displayed.  Only fatal errors are displayed.
 .It Fl s  .It Fl s
 May be used to request invocation of a subsystem on the remote system. Subsystems are a feature of the SSH2 protocol which facilitate the use  May be used to request invocation of a subsystem on the remote system. Subsystems are a feature of the SSH2 protocol which facilitate the use
 of SSH as a secure transport for other applications (eg. sftp). The  of SSH as a secure transport for other applications (eg. sftp). The
 subsystem is specified as the remote command.  subsystem is specified as the remote command.
 .It Fl t  .It Fl t
 Force pseudo-tty allocation.  Force pseudo-tty allocation.
Line 698 
Line 698 
 Specifies the cipher to use for encrypting the session  Specifies the cipher to use for encrypting the session
 in protocol version 1.  in protocol version 1.
 Currently,  Currently,
 .Dq blowfish  .Dq blowfish
 and  and
 .Dq 3des  .Dq 3des
 are supported.  are supported.
Line 883 
Line 883 
 QUIET, FATAL, ERROR, INFO, VERBOSE and DEBUG.  QUIET, FATAL, ERROR, INFO, VERBOSE and DEBUG.
 The default is INFO.  The default is INFO.
 .It Cm MACs  .It Cm MACs
 Specifies the MAC (message authentication code) algorithms  Specifies the MAC (message authentication code) algorithms
 in order of preference.  in order of preference.
 The MAC algorithm is used in protocol version 2  The MAC algorithm is used in protocol version 2
 for data integrity protection.  for data integrity protection.
Line 906 
Line 906 
 Specifies the port number to connect on the remote host.  Specifies the port number to connect on the remote host.
 Default is 22.  Default is 22.
 .It Cm PreferredAuthentications  .It Cm PreferredAuthentications
 Specifies the order in which the client should try protocol 2  Specifies the order in which the client should try protocol 2
 authentication methods. This allows a client to prefer one method (e.g.  authentication methods. This allows a client to prefer one method (e.g.
 .Cm keyboard-interactive )  .Cm keyboard-interactive )
 over another method (e.g.  over another method (e.g.
 .Cm password )  .Cm password )
Line 979 
Line 979 
 authentication time on slow connections when rhosts authentication is  authentication time on slow connections when rhosts authentication is
 not used.  not used.
 Most servers do not permit RhostsAuthentication because it  Most servers do not permit RhostsAuthentication because it
 is not secure (see  is not secure (see
 .Cm RhostsRSAAuthentication ) .  .Cm RhostsRSAAuthentication ) .
 The argument to this keyword must be  The argument to this keyword must be
 .Dq yes  .Dq yes

Legend:
Removed from v.1.116  
changed lines
  Added in v.1.117