[BACK]Return to sshd.8 CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Diff for /src/usr.bin/ssh/sshd.8 between version 1.57 and 1.58

version 1.57, 2000/07/22 09:14:36 version 1.58, 2000/08/01 17:46:10
Line 104 
Line 104 
 .Pp  .Pp
 .Ss SSH protocol version 2  .Ss SSH protocol version 2
 .Pp  .Pp
 Version 2 works similar:  Version 2 works similarly:
 Each host has a host-specific DSA key used to identify the host.  Each host has a host-specific DSA key used to identify the host.
 However, when the daemon starts, it does not generate a server key.  However, when the daemon starts, it does not generate a server key.
 Forward security is provided through a Diffie-Hellman key agreement.  Forward security is provided through a Diffie-Hellman key agreement.
Line 257 
Line 257 
 .Ql ?  .Ql ?
 can be used as  can be used as
 wildcards in the patterns.  wildcards in the patterns.
 Only group names are valid, a numerical group ID isn't recognized.  Only group names are valid; a numerical group ID isn't recognized.
 By default login is allowed regardless of the primary group.  By default login is allowed regardless of the primary group.
 .Pp  .Pp
 .It Cm AllowUsers  .It Cm AllowUsers
Line 270 
Line 270 
 .Ql ?  .Ql ?
 can be used as  can be used as
 wildcards in the patterns.  wildcards in the patterns.
 Only user names are valid, a numerical user ID isn't recognized.  Only user names are valid; a numerical user ID isn't recognized.
 By default login is allowed regardless of the user name.  By default login is allowed regardless of the user name.
 .Pp  .Pp
 .It Cm Ciphers  .It Cm Ciphers
Line 294 
Line 294 
 .Ql ?  .Ql ?
 can be used as  can be used as
 wildcards in the patterns.  wildcards in the patterns.
 Only group names are valid, a numerical group ID isn't recognized.  Only group names are valid; a numerical group ID isn't recognized.
 By default login is allowed regardless of the primary group.  By default login is allowed regardless of the primary group.
 .Pp  .Pp
 .It Cm DenyUsers  .It Cm DenyUsers
Line 305 
Line 305 
 and  and
 .Ql ?  .Ql ?
 can be used as wildcards in the patterns.  can be used as wildcards in the patterns.
 Only user names are valid, a numerical user ID isn't recognized.  Only user names are valid; a numerical user ID isn't recognized.
 By default login is allowed regardless of the user name.  By default login is allowed regardless of the user name.
 .It Cm DSAAuthentication  .It Cm DSAAuthentication
 Specifies whether DSA authentication is allowed.  Specifies whether DSA authentication is allowed.
Line 321 
Line 321 
 .Dq no .  .Dq no .
 The default is  The default is
 .Dq no .  .Dq no .
 .It Cm HostDsaKey  .It Cm HostDSAKey
 Specifies the file containing the private DSA host key (default  Specifies the file containing the private DSA host key (default
 .Pa /etc/ssh_host_dsa_key )  .Pa /etc/ssh_host_dsa_key )
 used by SSH protocol 2.0.  used by SSH protocol 2.0.
Line 464 
Line 464 
 Specifies whether password authentication is allowed.  Specifies whether password authentication is allowed.
 The default is  The default is
 .Dq yes .  .Dq yes .
 Note that this option applies to both protocol version 1 and 2.  Note that this option applies to both protocol versions 1 and 2.
 .It Cm PermitEmptyPasswords  .It Cm PermitEmptyPasswords
 When password authentication is allowed, it specifies whether the  When password authentication is allowed, it specifies whether the
 server allows login to accounts with empty password strings.  server allows login to accounts with empty password strings.
Line 585 
Line 585 
 is used for interactive login sessions.  is used for interactive login sessions.
 Note that  Note that
 .Xr login 1  .Xr login 1
 is not never for remote command execution.  is never used for remote command execution.
 The default is  The default is
 .Dq no .  .Dq no .
 .It Cm X11DisplayOffset  .It Cm X11DisplayOffset
Line 683 
Line 683 
 .Pa identity.pub  .Pa identity.pub
 file and edit it.  file and edit it.
 .Pp  .Pp
 The options (if present) consists of comma-separated option  The options (if present) consist of comma-separated option
 specifications.  specifications.
 No spaces are permitted, except within double quotes.  No spaces are permitted, except within double quotes.
 The following option specifications are supported:  The following option specifications are supported:
Line 757 
Line 757 
 files contain host public keys for all known hosts.  files contain host public keys for all known hosts.
 The global file should  The global file should
 be prepared by the administrator (optional), and the per-user file is  be prepared by the administrator (optional), and the per-user file is
 maintained automatically: whenever the user connects an unknown host  maintained automatically: whenever the user connects from an unknown host
 its key is added to the per-user file.  its key is added to the per-user file.
 .Pp  .Pp
 Each line in these files contains the following fields: hostnames,  Each line in these files contains the following fields: hostnames,
Line 832 
Line 832 
 listening for connections (if there are several daemons running  listening for connections (if there are several daemons running
 concurrently for different ports, this contains the pid of the one  concurrently for different ports, this contains the pid of the one
 started last).  started last).
 The contents of this file are not sensitive; it can be world-readable.  The content of this file is not sensitive; it can be world-readable.
 .It Pa $HOME/.ssh/authorized_keys  .It Pa $HOME/.ssh/authorized_keys
 Lists the RSA keys that can be used to log into the user's account.  Lists the RSA keys that can be used to log into the user's account.
 This file must be readable by root (which may on some machines imply  This file must be readable by root (which may on some machines imply
Line 860 
Line 860 
 authentication to check the public key of the host.  authentication to check the public key of the host.
 The key must be listed in one of these files to be accepted.  The key must be listed in one of these files to be accepted.
 The client uses the same files  The client uses the same files
 to verify that the remote host is the one we intended to connect.  to verify that the remote host is the one it intended to connect.
 These files should be writable only by root/the owner.  These files should be writable only by root/the owner.
 .Pa /etc/ssh_known_hosts  .Pa /etc/ssh_known_hosts
 should be world-readable, and  should be world-readable, and
Line 899 
Line 899 
 .Pa .rhosts .  .Pa .rhosts .
 However, this file is  However, this file is
 not used by rlogin and rshd, so using this permits access using SSH only.  not used by rlogin and rshd, so using this permits access using SSH only.
 .Pa /etc/hosts.equiv  .It Pa /etc/hosts.equiv
 This file is used during  This file is used during
 .Pa .rhosts  .Pa .rhosts
 authentication.  authentication.

Legend:
Removed from v.1.57  
changed lines
  Added in v.1.58