[scp.1 sftp.1 ssh.1 ssh-agent.1 sshd.8 ssh-keygen.1 ssh-keyscan.1]
     avoid first person in manual pages
This commit is contained in:
Ben Lindstrom 2001-09-12 18:35:30 +00:00
parent edc0cf26d1
commit 594e203894
8 changed files with 60 additions and 57 deletions

View File

@ -80,6 +80,9 @@
- stevesk@cvs.openbsd.org 2001/09/03 20:58:33 - stevesk@cvs.openbsd.org 2001/09/03 20:58:33
[readconf.c readconf.h ssh.c] [readconf.c readconf.h ssh.c]
fatal() for nonexistent -Fssh_config. ok markus@ fatal() for nonexistent -Fssh_config. ok markus@
- deraadt@cvs.openbsd.org 2001/09/05 06:23:07
[scp.1 sftp.1 ssh.1 ssh-agent.1 sshd.8 ssh-keygen.1 ssh-keyscan.1]
avoid first person in manual pages
20010815 20010815
- (bal) Fixed stray code in readconf.c that went in by mistake. - (bal) Fixed stray code in readconf.c that went in by mistake.
@ -6403,4 +6406,4 @@
- Wrote replacements for strlcpy and mkdtemp - Wrote replacements for strlcpy and mkdtemp
- Released 1.0pre1 - Released 1.0pre1
$Id: ChangeLog,v 1.1508 2001/09/12 18:32:20 mouring Exp $ $Id: ChangeLog,v 1.1509 2001/09/12 18:35:30 mouring Exp $

6
scp.1
View File

@ -9,7 +9,7 @@
.\" .\"
.\" Created: Sun May 7 00:14:37 1995 ylo .\" Created: Sun May 7 00:14:37 1995 ylo
.\" .\"
.\" $OpenBSD: scp.1,v 1.17 2001/08/14 17:54:29 stevesk Exp $ .\" $OpenBSD: scp.1,v 1.18 2001/09/05 06:23:07 deraadt Exp $
.\" .\"
.Dd September 25, 1999 .Dd September 25, 1999
.Dt SCP 1 .Dt SCP 1
@ -115,8 +115,8 @@ in the format used in the
configuration file. This is useful for specifying options configuration file. This is useful for specifying options
for which there is no separate for which there is no separate
.Nm scp .Nm scp
command-line flag. For example, to force the use of protocol command-line flag. For example, forcing the use of protocol
version 1 you may specify version 1 is specified using
.Ic scp -oProtocol=1 . .Ic scp -oProtocol=1 .
.It Fl 4 .It Fl 4
Forces Forces

6
sftp.1
View File

@ -1,4 +1,4 @@
.\" $OpenBSD: sftp.1,v 1.23 2001/08/14 17:54:29 stevesk Exp $ .\" $OpenBSD: sftp.1,v 1.24 2001/09/05 06:23:07 deraadt Exp $
.\" .\"
.\" Copyright (c) 2001 Damien Miller. All rights reserved. .\" Copyright (c) 2001 Damien Miller. All rights reserved.
.\" .\"
@ -85,8 +85,8 @@ in the format used in the
configuration file. This is useful for specifying options configuration file. This is useful for specifying options
for which there is no separate for which there is no separate
.Nm sftp .Nm sftp
command-line flag. For example, to force the use of protocol command-line flag. For example, forcing the use of protocol
version 1 you may specify version 1 is specified using
.Ic sftp -oProtocol=1 . .Ic sftp -oProtocol=1 .
.It Fl v .It Fl v
Raise logging level. This option is also passed to ssh. Raise logging level. This option is also passed to ssh.

View File

@ -1,4 +1,4 @@
.\" $OpenBSD: ssh-agent.1,v 1.27 2001/08/23 18:02:48 stevesk Exp $ .\" $OpenBSD: ssh-agent.1,v 1.28 2001/09/05 06:23:07 deraadt Exp $
.\" .\"
.\" Author: Tatu Ylonen <ylo@cs.hut.fi> .\" Author: Tatu Ylonen <ylo@cs.hut.fi>
.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@ -116,9 +116,9 @@ remote logins, and the user can thus use the privileges given by the
identities anywhere in the network in a secure way. identities anywhere in the network in a secure way.
.Pp .Pp
There are two main ways to get an agent setup: There are two main ways to get an agent setup:
Either you let the agent Either the agent starts a new subcommand into which some environment
start a new subcommand into which some environment variables are exported, or variables are exported, or the agent prints the needed shell commands
you let the agent print the needed shell commands (either (either
.Xr sh 1 .Xr sh 1
or or
.Xr csh 1 .Xr csh 1

View File

@ -1,4 +1,4 @@
.\" $OpenBSD: ssh-keygen.1,v 1.48 2001/08/02 15:07:23 jakob Exp $ .\" $OpenBSD: ssh-keygen.1,v 1.49 2001/09/05 06:23:07 deraadt Exp $
.\" .\"
.\" -*- nroff -*- .\" -*- nroff -*-
.\" .\"
@ -89,7 +89,7 @@ generates, manages and converts authentication keys for
defaults to generating a RSA1 key for use by SSH protocol version 1. defaults to generating a RSA1 key for use by SSH protocol version 1.
Specifying the Specifying the
.Fl t .Fl t
option allows you to create a key for use by SSH protocol version 2. option instead creates a key for use by SSH protocol version 2.
.Pp .Pp
Normally each user wishing to use SSH Normally each user wishing to use SSH
with RSA or DSA authentication runs this once to create the authentication with RSA or DSA authentication runs this once to create the authentication
@ -121,7 +121,7 @@ option.
.Pp .Pp
There is no way to recover a lost passphrase. There is no way to recover a lost passphrase.
If the passphrase is If the passphrase is
lost or forgotten, you will have to generate a new key and copy the lost or forgotten, a new key must be generated and copied to the
corresponding public key to other machines. corresponding public key to other machines.
.Pp .Pp
For RSA1 keys, For RSA1 keys,
@ -228,7 +228,7 @@ Contains the protocol version 1 RSA public key for authentication.
The contents of this file should be added to The contents of this file should be added to
.Pa $HOME/.ssh/authorized_keys .Pa $HOME/.ssh/authorized_keys
on all machines on all machines
where you wish to log in using RSA authentication. where the user wishes to log in using RSA authentication.
There is no need to keep the contents of this file secret. There is no need to keep the contents of this file secret.
.It Pa $HOME/.ssh/id_dsa .It Pa $HOME/.ssh/id_dsa
Contains the protocol version 2 DSA authentication identity of the user. Contains the protocol version 2 DSA authentication identity of the user.
@ -246,7 +246,7 @@ Contains the protocol version 2 DSA public key for authentication.
The contents of this file should be added to The contents of this file should be added to
.Pa $HOME/.ssh/authorized_keys .Pa $HOME/.ssh/authorized_keys
on all machines on all machines
where you wish to log in using public key authentication. where the user wishes to log in using public key authentication.
There is no need to keep the contents of this file secret. There is no need to keep the contents of this file secret.
.It Pa $HOME/.ssh/id_rsa .It Pa $HOME/.ssh/id_rsa
Contains the protocol version 2 RSA authentication identity of the user. Contains the protocol version 2 RSA authentication identity of the user.
@ -264,7 +264,7 @@ Contains the protocol version 2 RSA public key for authentication.
The contents of this file should be added to The contents of this file should be added to
.Pa $HOME/.ssh/authorized_keys .Pa $HOME/.ssh/authorized_keys
on all machines on all machines
where you wish to log in using public key authentication. where the user wishes to log in using public key authentication.
There is no need to keep the contents of this file secret. There is no need to keep the contents of this file secret.
.El .El
.Sh AUTHORS .Sh AUTHORS

View File

@ -1,4 +1,4 @@
.\" $OpenBSD: ssh-keyscan.1,v 1.11 2001/08/23 18:08:59 stevesk Exp $ .\" $OpenBSD: ssh-keyscan.1,v 1.12 2001/09/05 06:23:07 deraadt Exp $
.\" .\"
.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. .\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>.
.\" .\"
@ -35,9 +35,9 @@ scripts.
uses non-blocking socket I/O to contact as many hosts as possible in uses non-blocking socket I/O to contact as many hosts as possible in
parallel, so it is very efficient. The keys from a domain of 1,000 parallel, so it is very efficient. The keys from a domain of 1,000
hosts can be collected in tens of seconds, even when some of those hosts can be collected in tens of seconds, even when some of those
hosts are down or do not run ssh. You do not need login access to the hosts are down or do not run ssh. For scanning, one does not need
machines you are scanning, nor does the scanning process involve login access to the machines that are being scanned, nor does the
any encryption. scanning process involve any encryption.
.Pp .Pp
The options are as follows: The options are as follows:
.Bl -tag -width Ds .Bl -tag -width Ds
@ -88,15 +88,15 @@ Forces
to use IPv6 addresses only. to use IPv6 addresses only.
.El .El
.Sh SECURITY .Sh SECURITY
If you make an ssh_known_hosts file using If a ssh_known_hosts file is constructed using
.Nm .Nm
without verifying the keys, you will be vulnerable to without verifying the keys, users will be vulnerable to
.I man in the middle .I man in the middle
attacks. attacks.
On the other hand, if your security model allows such a risk, On the other hand, if the security model allows such a risk,
.Nm .Nm
can help you detect tampered keyfiles or man in the middle attacks which can help in the detection of tampered keyfiles or man in the middle
have begun after you created your ssh_known_hosts file. attacks which have begun after the ssh_known_hosts file was created.
.Sh EXAMPLES .Sh EXAMPLES
.Pp .Pp
Print the Print the

36
ssh.1
View File

@ -34,7 +34,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\" .\"
.\" $OpenBSD: ssh.1,v 1.136 2001/08/30 16:04:35 stevesk Exp $ .\" $OpenBSD: ssh.1,v 1.137 2001/09/05 06:23:07 deraadt Exp $
.Dd September 25, 1999 .Dd September 25, 1999
.Dt SSH 1 .Dt SSH 1
.Os .Os
@ -495,7 +495,7 @@ needs to ask for a password or passphrase; see also the
option.) option.)
.It Fl N .It Fl N
Do not execute a remote command. Do not execute a remote command.
This is useful if you just want to forward ports This is useful for just forwarding ports
(protocol version 2 only). (protocol version 2 only).
.It Fl o Ar option .It Fl o Ar option
Can be used to give options in the format used in the configuration file. Can be used to give options in the format used in the configuration file.
@ -507,7 +507,7 @@ This can be specified on a
per-host basis in the configuration file. per-host basis in the configuration file.
.It Fl P .It Fl P
Use a non-privileged port for outgoing connections. Use a non-privileged port for outgoing connections.
This can be used if your firewall does This can be used if a firewall does
not permit connections from privileged ports. not permit connections from privileged ports.
Note that this option turns off Note that this option turns off
.Cm RhostsAuthentication .Cm RhostsAuthentication
@ -711,8 +711,8 @@ This option applies to protocol version 1 only.
If set to If set to
.Dq yes , .Dq yes ,
passphrase/password querying will be disabled. passphrase/password querying will be disabled.
This option is useful in scripts and other batch jobs where you have no This option is useful in scripts and other batch jobs where no user
user to supply the password. is present to supply the password.
The argument must be The argument must be
.Dq yes .Dq yes
or or
@ -890,7 +890,7 @@ Specifies an alias that should be used instead of the
real host name when looking up or saving the host key real host name when looking up or saving the host key
in the host key database files. in the host key database files.
This option is useful for tunneling ssh connections This option is useful for tunneling ssh connections
or if you have multiple servers running on a single host. or for multiple servers running on a single host.
.It Cm HostName .It Cm HostName
Specifies the real host name to log into. Specifies the real host name to log into.
This can be used to specify nicknames or abbreviations for hosts. This can be used to specify nicknames or abbreviations for hosts.
@ -1109,11 +1109,11 @@ If this flag is set to
will never automatically add host keys to the will never automatically add host keys to the
.Pa $HOME/.ssh/known_hosts .Pa $HOME/.ssh/known_hosts
file, and refuses to connect to hosts whose host key has changed. file, and refuses to connect to hosts whose host key has changed.
This provides maximum protection against trojan horse attacks. This provides maximum protection against trojan horse attacks,
However, it can be somewhat annoying if you don't have good however, can be annoying when the
.Pa /etc/ssh_known_hosts .Pa /etc/ssh_known_hosts
files installed and frequently file is poorly maintained, or connections to new hosts are
connect to new hosts. frequently made.
This option forces the user to manually This option forces the user to manually
add all new hosts. add all new hosts.
If this flag is set to If this flag is set to
@ -1145,16 +1145,16 @@ or
.Dq no . .Dq no .
The default is The default is
.Dq no . .Dq no .
Note that you need to set this option to Note that this option must be set to
.Dq yes .Dq yes
if you want to use if
.Cm RhostsAuthentication .Cm RhostsAuthentication
and and
.Cm RhostsRSAAuthentication .Cm RhostsRSAAuthentication
with older servers. authentications are needed with older servers.
.It Cm User .It Cm User
Specifies the user to log in as. Specifies the user to log in as.
This can be useful if you have a different user name on different machines. This can be useful when a different user name is used on different machines.
This saves the trouble of This saves the trouble of
having to remember to give the user name on the command line. having to remember to give the user name on the command line.
.It Cm UserKnownHostsFile .It Cm UserKnownHostsFile
@ -1302,7 +1302,7 @@ The contents of the
file should be added to file should be added to
.Pa $HOME/.ssh/authorized_keys .Pa $HOME/.ssh/authorized_keys
on all machines on all machines
where you wish to log in using protocol version 1 RSA authentication. where the user wishes to log in using protocol version 1 RSA authentication.
The contents of the The contents of the
.Pa $HOME/.ssh/id_dsa.pub .Pa $HOME/.ssh/id_dsa.pub
and and
@ -1310,7 +1310,7 @@ and
file should be added to file should be added to
.Pa $HOME/.ssh/authorized_keys .Pa $HOME/.ssh/authorized_keys
on all machines on all machines
where you wish to log in using protocol version 2 DSA/RSA authentication. where the user wishes to log in using protocol version 2 DSA/RSA authentication.
These files are not These files are not
sensitive and can (but need not) be readable by anyone. sensitive and can (but need not) be readable by anyone.
These files are These files are
@ -1388,9 +1388,9 @@ Note that by default
.Xr sshd 8 .Xr sshd 8
will be installed so that it requires successful RSA host will be installed so that it requires successful RSA host
authentication before permitting \s+2.\s0rhosts authentication. authentication before permitting \s+2.\s0rhosts authentication.
If your server machine does not have the client's host key in If the server machine does not have the client's host key in
.Pa /etc/ssh_known_hosts , .Pa /etc/ssh_known_hosts ,
you can store it in it can be stored in
.Pa $HOME/.ssh/known_hosts . .Pa $HOME/.ssh/known_hosts .
The easiest way to do this is to The easiest way to do this is to
connect back to the client from the server machine using ssh; this connect back to the client from the server machine using ssh; this

26
sshd.8
View File

@ -34,7 +34,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\" .\"
.\" $OpenBSD: sshd.8,v 1.146 2001/08/30 20:36:34 stevesk Exp $ .\" $OpenBSD: sshd.8,v 1.147 2001/09/05 06:23:07 deraadt Exp $
.Dd September 25, 1999 .Dd September 25, 1999
.Dt SSHD 8 .Dt SSHD 8
.Os .Os
@ -325,7 +325,7 @@ and
.Ql ? .Ql ?
can be used as can be used as
wildcards in the patterns. wildcards in the patterns.
Only group names are valid; a numerical group ID isn't recognized. Only group names are valid; a numerical group ID is not recognized.
By default login is allowed regardless of the group list. By default login is allowed regardless of the group list.
.Pp .Pp
.It Cm AllowTcpForwarding .It Cm AllowTcpForwarding
@ -346,10 +346,10 @@ and
.Ql ? .Ql ?
can be used as can be used as
wildcards in the patterns. wildcards in the patterns.
Only user names are valid; a numerical user ID isn't recognized. Only user names are valid; a numerical user ID is not recognized.
By default login is allowed regardless of the user name. By default login is allowed regardless of the user name.
If the pattern takes the form USER@HOST then USER and HOST If the pattern takes the form USER@HOST then USER and HOST
are separately checked, allowing you to restrict logins to particular are separately checked, restricting logins to particular
users from particular hosts. users from particular hosts.
.Pp .Pp
.It Cm AuthorizedKeysFile .It Cm AuthorizedKeysFile
@ -408,13 +408,13 @@ to note that the use of client alive messages is very different from
encrypted channel and therefore will not be spoofable. The TCP keepalive encrypted channel and therefore will not be spoofable. The TCP keepalive
option enabled by option enabled by
.Cm Keepalive .Cm Keepalive
is spoofable. You want to use the client is spoofable. The client alive mechanism is valuable when the client or
alive mechanism when you are basing something important on server depend on knowing when a connection has become inactive.
clients having an active connection to the server.
.Pp .Pp
The default value is 3. If you set The default value is 3. If
.Cm ClientAliveInterval .Cm ClientAliveInterval
(above) to 15, and leave this value at the default, unresponsive ssh clients (above) is set to 15, and
.Cm Keepalive is left at the default, unresponsive ssh clients
will be disconnected after approximately 45 seconds. will be disconnected after approximately 45 seconds.
.It Cm DenyGroups .It Cm DenyGroups
This keyword can be followed by a number of group names, separated This keyword can be followed by a number of group names, separated
@ -426,7 +426,7 @@ and
.Ql ? .Ql ?
can be used as can be used as
wildcards in the patterns. wildcards in the patterns.
Only group names are valid; a numerical group ID isn't recognized. Only group names are valid; a numerical group ID is not recognized.
By default login is allowed regardless of the group list. By default login is allowed regardless of the group list.
.Pp .Pp
.It Cm DenyUsers .It Cm DenyUsers
@ -437,7 +437,7 @@ Login is disallowed for user names that match one of the patterns.
and and
.Ql ? .Ql ?
can be used as wildcards in the patterns. can be used as wildcards in the patterns.
Only user names are valid; a numerical user ID isn't recognized. Only user names are valid; a numerical user ID is not recognized.
By default login is allowed regardless of the user name. By default login is allowed regardless of the user name.
.It Cm GatewayPorts .It Cm GatewayPorts
Specifies whether remote hosts are allowed to connect to ports Specifies whether remote hosts are allowed to connect to ports
@ -998,8 +998,8 @@ authentication.
The command supplied by the user (if any) is ignored. The command supplied by the user (if any) is ignored.
The command is run on a pty if the connection requests a pty; The command is run on a pty if the connection requests a pty;
otherwise it is run without a tty. otherwise it is run without a tty.
Note that if you want a 8-bit clean channel, If a 8-bit clean channel is required,
you must not request a pty or should specify one must not request a pty or should specify
.Cm no-pty . .Cm no-pty .
A quote may be included in the command by quoting it with a backslash. A quote may be included in the command by quoting it with a backslash.
This option might be useful This option might be useful