[BACK]Return to sshd_config.5 CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Diff for /src/usr.bin/ssh/sshd_config.5 between version 1.316 and 1.317

version 1.316, 2020/10/03 04:15:06 version 1.317, 2020/10/16 13:26:13
Line 1030 
Line 1030 
 DEBUG and DEBUG1 are equivalent.  DEBUG and DEBUG1 are equivalent.
 DEBUG2 and DEBUG3 each specify higher levels of debugging output.  DEBUG2 and DEBUG3 each specify higher levels of debugging output.
 Logging with a DEBUG level violates the privacy of users and is not recommended.  Logging with a DEBUG level violates the privacy of users and is not recommended.
   .It Cm LogVerbose
   Specify one or more overrides to LogLevel.
   An override consists of a pattern lists that matches the source file, function
   and line number to force detailed logging for.
   For example, an override pattern of:
   .Bd -literal -offset indent
   kex.c:*:1000,*:kex_exchange_identification():*,packet.c:*
   .Ed
   .Pp
   would enable detailed logging for line 1000 of
   .Pa kex.c,
   everything in the
   .Fn kex_exchange_identification
   function, and all code in the
   .Pa packet.c
   file.
   This option is intended for debugging and no overrides are enabled by default.
 .It Cm MACs  .It Cm MACs
 Specifies the available MAC (message authentication code) algorithms.  Specifies the available MAC (message authentication code) algorithms.
 The MAC algorithm is used for data integrity protection.  The MAC algorithm is used for data integrity protection.

Legend:
Removed from v.1.316  
changed lines
  Added in v.1.317