version 1.151, 2012/12/03 08:33:03 |
version 1.152, 2012/12/11 22:31:18 |
|
|
The MAC algorithm is used in protocol version 2 |
The MAC algorithm is used in protocol version 2 |
for data integrity protection. |
for data integrity protection. |
Multiple algorithms must be comma-separated. |
Multiple algorithms must be comma-separated. |
|
The algorithms that contain |
|
.Dq -etm |
|
calculate the MAC after encryption (encrypt-then-mac). |
|
These are considered safer and their use recommended. |
The default is: |
The default is: |
.Bd -literal -offset indent |
.Bd -literal -offset indent |
|
hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com, |
|
umac-64-etm@openssh.com,umac-128-etm@openssh.com, |
|
hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com, |
|
hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com, |
|
hmac-md5-96-etm@openssh.com, |
hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com, |
hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com, |
hmac-sha2-256,hmac-sha2-512,hmac-ripemd160, |
hmac-sha2-256,hmac-sha2-512,hmac-ripemd160, |
hmac-sha1-96,hmac-md5-96 |
hmac-sha1-96,hmac-md5-96 |