- (djm) OpenBSD CVS Sync
- jmc@cvs.openbsd.org 2005/12/31 10:46:17 [ssh.1] merge the "LOGIN SESSION AND REMOTE EXECUTION" and "SERVER AUTHENTICATION" sections into "AUTHENTICATION"; some rewording done to make the text read better, plus some improvements from djm; ok djm
This commit is contained in:
parent
90cd1c549b
commit
48c94abf5b
10
ChangeLog
10
ChangeLog
|
@ -1,5 +1,13 @@
|
||||||
20060102
|
20060102
|
||||||
- (djm) [README.tun] Add README.tun, missed during sync of tun(4) support
|
- (djm) [README.tun] Add README.tun, missed during sync of tun(4) support
|
||||||
|
- (djm) OpenBSD CVS Sync
|
||||||
|
- jmc@cvs.openbsd.org 2005/12/31 10:46:17
|
||||||
|
[ssh.1]
|
||||||
|
merge the "LOGIN SESSION AND REMOTE EXECUTION" and "SERVER
|
||||||
|
AUTHENTICATION" sections into "AUTHENTICATION";
|
||||||
|
some rewording done to make the text read better, plus some
|
||||||
|
improvements from djm;
|
||||||
|
ok djm
|
||||||
|
|
||||||
20060101
|
20060101
|
||||||
- (djm) [Makefile.in configure.ac includes.h misc.c]
|
- (djm) [Makefile.in configure.ac includes.h misc.c]
|
||||||
|
@ -3590,4 +3598,4 @@
|
||||||
- (djm) Trim deprecated options from INSTALL. Mention UsePAM
|
- (djm) Trim deprecated options from INSTALL. Mention UsePAM
|
||||||
- (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
|
- (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
|
||||||
|
|
||||||
$Id: ChangeLog,v 1.4063 2006/01/02 09:23:18 djm Exp $
|
$Id: ChangeLog,v 1.4064 2006/01/02 12:38:00 djm Exp $
|
||||||
|
|
63
ssh.1
63
ssh.1
|
@ -34,7 +34,7 @@
|
||||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.\" $OpenBSD: ssh.1,v 1.231 2005/12/31 01:38:45 stevesk Exp $
|
.\" $OpenBSD: ssh.1,v 1.232 2005/12/31 10:46:17 jmc Exp $
|
||||||
.Dd September 25, 1999
|
.Dd September 25, 1999
|
||||||
.Dt SSH 1
|
.Dt SSH 1
|
||||||
.Os
|
.Os
|
||||||
|
@ -788,7 +788,36 @@ prompts the user for a password.
|
||||||
The password is sent to the remote
|
The password is sent to the remote
|
||||||
host for checking; however, since all communications are encrypted,
|
host for checking; however, since all communications are encrypted,
|
||||||
the password cannot be seen by someone listening on the network.
|
the password cannot be seen by someone listening on the network.
|
||||||
.Sh LOGIN SESSION AND REMOTE EXECUTION
|
.Pp
|
||||||
|
.Nm
|
||||||
|
automatically maintains and checks a database containing
|
||||||
|
identification for all hosts it has ever been used with.
|
||||||
|
Host keys are stored in
|
||||||
|
.Pa ~/.ssh/known_hosts
|
||||||
|
in the user's home directory.
|
||||||
|
Additionally, the file
|
||||||
|
.Pa /etc/ssh/ssh_known_hosts
|
||||||
|
is automatically checked for known hosts.
|
||||||
|
Any new hosts are automatically added to the user's file.
|
||||||
|
If a host's identification ever changes,
|
||||||
|
.Nm
|
||||||
|
warns about this and disables password authentication to prevent
|
||||||
|
server spoofing or man-in-the-middle attacks,
|
||||||
|
which could otherwise be used to circumvent the encryption.
|
||||||
|
The
|
||||||
|
.Cm StrictHostKeyChecking
|
||||||
|
option can be used to control logins to machines whose
|
||||||
|
host key is not known or has changed.
|
||||||
|
.Pp
|
||||||
|
.Nm
|
||||||
|
can be configured to verify host identification using fingerprint resource
|
||||||
|
records (SSHFP) published in DNS.
|
||||||
|
The
|
||||||
|
.Cm VerifyHostKeyDNS
|
||||||
|
option can be used to control how DNS lookups are performed.
|
||||||
|
SSHFP resource records can be generated using
|
||||||
|
.Xr ssh-keygen 1 .
|
||||||
|
.Pp
|
||||||
When the user's identity has been accepted by the server, the server
|
When the user's identity has been accepted by the server, the server
|
||||||
either executes the given command, or logs into the machine and gives
|
either executes the given command, or logs into the machine and gives
|
||||||
the user a normal shell on the remote machine.
|
the user a normal shell on the remote machine.
|
||||||
|
@ -924,36 +953,6 @@ Forwarding of arbitrary TCP/IP connections over the secure channel can
|
||||||
be specified either on the command line or in a configuration file.
|
be specified either on the command line or in a configuration file.
|
||||||
One possible application of TCP/IP forwarding is a secure connection to an
|
One possible application of TCP/IP forwarding is a secure connection to an
|
||||||
electronic purse; another is going through firewalls.
|
electronic purse; another is going through firewalls.
|
||||||
.Sh SERVER AUTHENTICATION
|
|
||||||
.Nm
|
|
||||||
automatically maintains and checks a database containing
|
|
||||||
identifications for all hosts it has ever been used with.
|
|
||||||
Host keys are stored in
|
|
||||||
.Pa ~/.ssh/known_hosts
|
|
||||||
in the user's home directory.
|
|
||||||
Additionally, the file
|
|
||||||
.Pa /etc/ssh/ssh_known_hosts
|
|
||||||
is automatically checked for known hosts.
|
|
||||||
Any new hosts are automatically added to the user's file.
|
|
||||||
If a host's identification ever changes,
|
|
||||||
.Nm
|
|
||||||
warns about this and disables password authentication to prevent a
|
|
||||||
trojan horse from getting the user's password.
|
|
||||||
Another purpose of this mechanism is to prevent man-in-the-middle attacks
|
|
||||||
which could otherwise be used to circumvent the encryption.
|
|
||||||
The
|
|
||||||
.Cm StrictHostKeyChecking
|
|
||||||
option can be used to prevent logins to machines whose
|
|
||||||
host key is not known or has changed.
|
|
||||||
.Pp
|
|
||||||
.Nm
|
|
||||||
can be configured to verify host identification using fingerprint resource
|
|
||||||
records (SSHFP) published in DNS.
|
|
||||||
The
|
|
||||||
.Cm VerifyHostKeyDNS
|
|
||||||
option can be used to control how DNS lookups are performed.
|
|
||||||
SSHFP resource records can be generated using
|
|
||||||
.Xr ssh-keygen 1 .
|
|
||||||
.Sh ENVIRONMENT
|
.Sh ENVIRONMENT
|
||||||
.Nm
|
.Nm
|
||||||
will normally set the following environment variables:
|
will normally set the following environment variables:
|
||||||
|
|
Loading…
Reference in New Issue