[BACK]Return to sshd.8 CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Diff for /src/usr.bin/ssh/sshd.8 between version 1.4 and 1.5

version 1.4, 1999/10/01 22:23:48 version 1.5, 1999/10/02 13:10:26
Line 59 
Line 59 
 the encrypted number to the server.  Both sides then start to use this  the encrypted number to the server.  Both sides then start to use this
 random number as a session key which is used to encrypt all further  random number as a session key which is used to encrypt all further
 communications in the session.  The rest of the session is encrypted  communications in the session.  The rest of the session is encrypted
 using a conventional cipher.  Currently,  using a conventional cipher, currently Blowfish and 3DES, with 3DES
 Blowfish, IDEA, DES, and 3DES.  being is used by default.  The client selects the encryption algorithm
 3DES  to use from those offered by the server.
 is used by default.  The client selects the encryption algorithm to use  
 from those offered by the server.  
 .Pp  .Pp
 Next, the server and the client enter an authentication dialog.  The  Next, the server and the client enter an authentication dialog.  The
 client tries to authenticate itself using  client tries to authenticate itself using
Line 663 
Line 661 
 This can be used to specify  This can be used to specify
 machine-specific login-time initializations globally.  This file  machine-specific login-time initializations globally.  This file
 should be writable only by root, and should be world-readable.  should be writable only by root, and should be world-readable.
 .Sh INSTALLATION  
 .Nm  
 is normally run as root.  If it is not run as root, it can  
 only log in as the user it is running as, and password authentication  
 may not work if the system uses shadow passwords.  An alternative  
 host key file must also be used.  
 .Pp  
 .Nm  
 is normally started from  
 .Pa /etc/rc  
 or equivalent at system boot.  
 .Pp  
 Considerable work has been put to making  
 .Nm  
 secure.  However, if you find a security problem, please report it  
 immediately to <ssh-bugs@cs.hut.fi>.  
 .Sh AUTHOR  .Sh AUTHOR
 Tatu Ylonen <ylo@cs.hut.fi>  Tatu Ylonen <ylo@cs.hut.fi>
 .Pp  .Pp
Line 686 
Line 668 
 issues can be found from the SSH WWW home page:  issues can be found from the SSH WWW home page:
 .Pp  .Pp
 .Dl http://www.cs.hut.fi/ssh.  .Dl http://www.cs.hut.fi/ssh.
   .Pp
   This version of
   .Nm
   is a derivative of the original 1.2.12 release, but with bugs removed and
   newer features re-added.   Rapidly after the 1.2.12 release, newer versions
   bore successively more restrictive licenses.  In this version, all components
   of a restrictive nature (ie. patents) have been directly removed from the
   source code; any licensed or patented components are chosen from external
   libraries.  The libraries described in
   .Xr ssl 8
   are required for proper operation.
 .Sh SEE ALSO  .Sh SEE ALSO
 .Xr make-ssh-known-hosts 1 ,  
 .Xr rlogin 1 ,  .Xr rlogin 1 ,
 .Xr rsh 1 ,  .Xr rsh 1 ,
 .Xr scp 1 ,  .Xr scp 1 ,
 .Xr ssh 1 ,  .Xr ssh 1 ,
 .Xr ssh-add x 1 ,  .Xr ssh-add 1 ,
 .Xr ssh-agent 1 ,  .Xr ssh-agent 1 ,
 .Xr ssh-keygen 1  .Xr ssh-keygen 1 ,
   .Xr ssl 8

Legend:
Removed from v.1.4  
changed lines
  Added in v.1.5