[BACK]Return to ssh_config.5 CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Diff for /src/usr.bin/ssh/ssh_config.5 between version 1.298 and 1.299

version 1.298, 2019/08/09 04:24:03 version 1.299, 2019/08/16 11:16:32
Line 422 
Line 422 
 .It Cm Ciphers  .It Cm Ciphers
 Specifies the ciphers allowed and their order of preference.  Specifies the ciphers allowed and their order of preference.
 Multiple ciphers must be comma-separated.  Multiple ciphers must be comma-separated.
 If the specified value begins with a  If the specified list begins with a
 .Sq +  .Sq +
 character, then the specified ciphers will be appended to the default set  character, then the specified ciphers will be appended to the default set
 instead of replacing them.  instead of replacing them.
 If the specified value begins with a  If the specified list begins with a
 .Sq -  .Sq -
 character, then the specified ciphers (including wildcards) will be removed  character, then the specified ciphers (including wildcards) will be removed
 from the default set instead of replacing them.  from the default set instead of replacing them.
Line 1044 
Line 1044 
 .It Cm KexAlgorithms  .It Cm KexAlgorithms
 Specifies the available KEX (Key Exchange) algorithms.  Specifies the available KEX (Key Exchange) algorithms.
 Multiple algorithms must be comma-separated.  Multiple algorithms must be comma-separated.
 Alternately if the specified value begins with a  If the specified list begins with a
 .Sq +  .Sq +
 character, then the specified methods will be appended to the default set  character, then the specified methods will be appended to the default set
 instead of replacing them.  instead of replacing them.
 If the specified value begins with a  If the specified list begins with a
 .Sq -  .Sq -
 character, then the specified methods (including wildcards) will be removed  character, then the specified methods (including wildcards) will be removed
 from the default set instead of replacing them.  from the default set instead of replacing them.
Line 1125 
Line 1125 
 in order of preference.  in order of preference.
 The MAC algorithm is used for data integrity protection.  The MAC algorithm is used for data integrity protection.
 Multiple algorithms must be comma-separated.  Multiple algorithms must be comma-separated.
 If the specified value begins with a  If the specified list begins with a
 .Sq +  .Sq +
 character, then the specified algorithms will be appended to the default set  character, then the specified algorithms will be appended to the default set
 instead of replacing them.  instead of replacing them.
 If the specified value begins with a  If the specified list begins with a
 .Sq -  .Sq -
 character, then the specified algorithms (including wildcards) will be removed  character, then the specified algorithms (including wildcards) will be removed
 from the default set instead of replacing them.  from the default set instead of replacing them.
Line 1282 
Line 1282 
 .It Cm PubkeyAcceptedKeyTypes  .It Cm PubkeyAcceptedKeyTypes
 Specifies the key types that will be used for public key authentication  Specifies the key types that will be used for public key authentication
 as a comma-separated list of patterns.  as a comma-separated list of patterns.
 Alternately if the specified value begins with a  If the specified list begins with a
 .Sq +  .Sq +
 character, then the key types after it will be appended to the default  character, then the key types after it will be appended to the default
 instead of replacing it.  instead of replacing it.
 If the specified value begins with a  If the specified list begins with a
 .Sq -  .Sq -
 character, then the specified key types (including wildcards) will be removed  character, then the specified key types (including wildcards) will be removed
 from the default set instead of replacing them.  from the default set instead of replacing them.

Legend:
Removed from v.1.298  
changed lines
  Added in v.1.299