- (djm) OpenBSD CVS Sync
- jmc@cvs.openbsd.org 2006/02/01 09:06:50 [sshd.8] - merge sections on protocols 1 and 2 into a single section - remove configuration file section ok markus
This commit is contained in:
parent
e682cb0780
commit
8bbdf90f33
|
@ -2,6 +2,12 @@
|
||||||
- (djm) [regress/test-exec.sh] Try 'logname' as well as 'whoami' to
|
- (djm) [regress/test-exec.sh] Try 'logname' as well as 'whoami' to
|
||||||
determine the user's login name - needed for regress tests on Solaris
|
determine the user's login name - needed for regress tests on Solaris
|
||||||
10 and OpenSolaris
|
10 and OpenSolaris
|
||||||
|
- (djm) OpenBSD CVS Sync
|
||||||
|
- jmc@cvs.openbsd.org 2006/02/01 09:06:50
|
||||||
|
[sshd.8]
|
||||||
|
- merge sections on protocols 1 and 2 into a single section
|
||||||
|
- remove configuration file section
|
||||||
|
ok markus
|
||||||
|
|
||||||
20060131
|
20060131
|
||||||
- (djm) OpenBSD CVS Sync
|
- (djm) OpenBSD CVS Sync
|
||||||
|
@ -3803,4 +3809,4 @@
|
||||||
- (djm) Trim deprecated options from INSTALL. Mention UsePAM
|
- (djm) Trim deprecated options from INSTALL. Mention UsePAM
|
||||||
- (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
|
- (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
|
||||||
|
|
||||||
$Id: ChangeLog,v 1.4113 2006/02/01 00:21:01 djm Exp $
|
$Id: ChangeLog,v 1.4114 2006/02/01 11:05:25 djm Exp $
|
||||||
|
|
79
sshd.8
79
sshd.8
|
@ -34,7 +34,7 @@
|
||||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.\" $OpenBSD: sshd.8,v 1.213 2006/01/25 09:07:22 jmc Exp $
|
.\" $OpenBSD: sshd.8,v 1.214 2006/02/01 09:06:50 jmc Exp $
|
||||||
.Dd September 25, 1999
|
.Dd September 25, 1999
|
||||||
.Dt SSHD 8
|
.Dt SSHD 8
|
||||||
.Os
|
.Os
|
||||||
|
@ -227,20 +227,26 @@ USER@HOST pattern in
|
||||||
or
|
or
|
||||||
.Cm DenyUsers .
|
.Cm DenyUsers .
|
||||||
.El
|
.El
|
||||||
|
.Sh AUTHENTICATION
|
||||||
|
The OpenSSH SSH daemon supports SSH protocols 1 and 2.
|
||||||
|
Both protocols are supported by default,
|
||||||
|
though this can be changed via the
|
||||||
|
.Cm Protocol
|
||||||
|
option in
|
||||||
|
.Xr sshd_config 5 .
|
||||||
|
Protocol 2 supports both RSA and DSA keys;
|
||||||
|
protocol 1 only supports RSA keys.
|
||||||
|
For both protocols,
|
||||||
|
each host has a host-specific key,
|
||||||
|
normally 2048 bits,
|
||||||
|
used to identify the host.
|
||||||
.Pp
|
.Pp
|
||||||
This implementation of
|
Forward security for protocol 1 is provided through
|
||||||
.Nm
|
an additional server key,
|
||||||
supports both SSH protocol version 1 and 2 simultaneously.
|
normally 768 bits,
|
||||||
.Nm
|
generated when the server starts.
|
||||||
works as follows:
|
|
||||||
.Sh SSH PROTOCOL VERSION 1
|
|
||||||
Each host has a host-specific RSA key
|
|
||||||
(normally 2048 bits) used to identify the host.
|
|
||||||
Additionally, when
|
|
||||||
the daemon starts, it generates a server RSA key (normally 768 bits).
|
|
||||||
This key is normally regenerated every hour if it has been used, and
|
This key is normally regenerated every hour if it has been used, and
|
||||||
is never stored on disk.
|
is never stored on disk.
|
||||||
.Pp
|
|
||||||
Whenever a client connects, the daemon responds with its public
|
Whenever a client connects, the daemon responds with its public
|
||||||
host and server keys.
|
host and server keys.
|
||||||
The client compares the
|
The client compares the
|
||||||
|
@ -258,12 +264,23 @@ being used by default.
|
||||||
The client selects the encryption algorithm
|
The client selects the encryption algorithm
|
||||||
to use from those offered by the server.
|
to use from those offered by the server.
|
||||||
.Pp
|
.Pp
|
||||||
Next, the server and the client enter an authentication dialog.
|
For protocol 2,
|
||||||
|
forward security is provided through a Diffie-Hellman key agreement.
|
||||||
|
This key agreement results in a shared session key.
|
||||||
|
The rest of the session is encrypted using a symmetric cipher, currently
|
||||||
|
128-bit AES, Blowfish, 3DES, CAST128, Arcfour, 192-bit AES, or 256-bit AES.
|
||||||
|
The client selects the encryption algorithm
|
||||||
|
to use from those offered by the server.
|
||||||
|
Additionally, session integrity is provided
|
||||||
|
through a cryptographic message authentication code
|
||||||
|
(hmac-sha1 or hmac-md5).
|
||||||
|
.Pp
|
||||||
|
Finally, the server and the client enter an authentication dialog.
|
||||||
The client tries to authenticate itself using
|
The client tries to authenticate itself using
|
||||||
.Em rhosts
|
host-based authentication,
|
||||||
authentication combined with RSA host
|
public key authentication,
|
||||||
authentication, RSA challenge-response authentication, or password
|
challenge-response authentication,
|
||||||
based authentication.
|
or password authentication.
|
||||||
.Pp
|
.Pp
|
||||||
Regardless of the authentication type, the account is checked to
|
Regardless of the authentication type, the account is checked to
|
||||||
ensure that it is accessible. An account is not accessible if it is
|
ensure that it is accessible. An account is not accessible if it is
|
||||||
|
@ -301,25 +318,6 @@ are disabled (thus completely disabling
|
||||||
and
|
and
|
||||||
.Xr rsh
|
.Xr rsh
|
||||||
into the machine).
|
into the machine).
|
||||||
.Sh SSH PROTOCOL VERSION 2
|
|
||||||
Version 2 works similarly:
|
|
||||||
Each host has a host-specific key (RSA or DSA) used to identify the host.
|
|
||||||
However, when the daemon starts, it does not generate a server key.
|
|
||||||
Forward security is provided through a Diffie-Hellman key agreement.
|
|
||||||
This key agreement results in a shared session key.
|
|
||||||
.Pp
|
|
||||||
The rest of the session is encrypted using a symmetric cipher, currently
|
|
||||||
128-bit AES, Blowfish, 3DES, CAST128, Arcfour, 192-bit AES, or 256-bit AES.
|
|
||||||
The client selects the encryption algorithm
|
|
||||||
to use from those offered by the server.
|
|
||||||
Additionally, session integrity is provided
|
|
||||||
through a cryptographic message authentication code
|
|
||||||
(hmac-sha1 or hmac-md5).
|
|
||||||
.Pp
|
|
||||||
Protocol version 2 provides a public key based
|
|
||||||
user (PubkeyAuthentication) or
|
|
||||||
client host (HostbasedAuthentication) authentication method,
|
|
||||||
conventional password authentication and challenge response based methods.
|
|
||||||
.Sh COMMAND EXECUTION AND DATA FORWARDING
|
.Sh COMMAND EXECUTION AND DATA FORWARDING
|
||||||
If the client successfully authenticates itself, a dialog for
|
If the client successfully authenticates itself, a dialog for
|
||||||
preparing the session is entered.
|
preparing the session is entered.
|
||||||
|
@ -337,15 +335,6 @@ command on the server side, and the user terminal in the client side.
|
||||||
When the user program terminates and all forwarded X11 and other
|
When the user program terminates and all forwarded X11 and other
|
||||||
connections have been closed, the server sends command exit status to
|
connections have been closed, the server sends command exit status to
|
||||||
the client, and both sides exit.
|
the client, and both sides exit.
|
||||||
.Sh CONFIGURATION FILE
|
|
||||||
.Nm
|
|
||||||
reads configuration data from
|
|
||||||
.Pa /etc/ssh/sshd_config
|
|
||||||
(or the file specified with
|
|
||||||
.Fl f
|
|
||||||
on the command line).
|
|
||||||
The file format and configuration options are described in
|
|
||||||
.Xr sshd_config 5 .
|
|
||||||
.Sh LOGIN PROCESS
|
.Sh LOGIN PROCESS
|
||||||
When a user successfully logs in,
|
When a user successfully logs in,
|
||||||
.Nm
|
.Nm
|
||||||
|
|
Loading…
Reference in New Issue