=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/sshd.8,v retrieving revision 1.50 retrieving revision 1.51 diff -u -r1.50 -r1.51 --- src/usr.bin/ssh/sshd.8 2000/05/08 17:12:16 1.50 +++ src/usr.bin/ssh/sshd.8 2000/05/08 17:42:31 1.51 @@ -9,7 +9,7 @@ .\" .\" Created: Sat Apr 22 21:55:14 1995 ylo .\" -.\" $Id: sshd.8,v 1.50 2000/05/08 17:12:16 markus Exp $ +.\" $Id: sshd.8,v 1.51 2000/05/08 17:42:31 hugh Exp $ .\" .Dd September 25, 1999 .Dt SSHD 8 @@ -115,7 +115,7 @@ The client selects the encryption algorithm to use from those offered by the server. Additionally, session integrity is provided -through a crytographic message authentication code +through a cryptographic message authentication code (hmac-sha1 or hmac-md5). .Pp Protocol version 2 provides a public key based @@ -327,14 +327,14 @@ used by SSH protocol 2.0. Note that .Nm -disables protcol 2.0 if this file is group/world-accessible. +disables protocol 2.0 if this file is group/world-accessible. .It Cm HostKey Specifies the file containing the private RSA host key (default .Pa /etc/ssh_host_key ) used by SSH protocols 1.3 and 1.5. Note that .Nm -disables protcols 1.3 and 1.5 if this file is group/world-accessible. +disables protocols 1.3 and 1.5 if this file is group/world-accessible. .It Cm IgnoreRhosts Specifies that .Pa .rhosts @@ -364,7 +364,7 @@ However, this means that connections will die if the route is down temporarily, and some people find it annoying. -On the other hand, if keepalives are not send, +On the other hand, if keepalives are not sent, sessions may hang indefinitely on the server, leaving .Dq ghost users and consuming server resources. @@ -620,7 +620,7 @@ .Pa $HOME/.ssh/authorized_keys file lists the RSA keys that are permitted for RSA authentication in SSH protocols 1.3 and 1.5 -Similarily, the +Similarly, the .Pa $HOME/.ssh/authorized_keys2 file lists the DSA keys that are permitted for DSA authentication in SSH protocol 2.0. @@ -679,8 +679,8 @@ This option might be useful to restrict certain RSA keys to perform just a specific operation. An example might be a key that permits remote backups but nothing else. -Notice that the client may specify TCP/IP and/or X11 -forwardings unless they are explicitly prohibited. +Note that the client may specify TCP/IP and/or X11 +forwarding unless they are explicitly prohibited. .It Cm environment="NAME=value" Specifies that the string is to be added to the environment when logging in using this key.