Print this page
Update OpenSSH to 7.1p1

*** 1,9 **** ! diff -ru openssh-6.7p1-orig/Makefile.in openssh-6.7p1/Makefile.in ! --- openssh-6.7p1-orig/Makefile.in Sat Aug 30 02:23:07 2014 ! +++ openssh-6.7p1/Makefile.in Fri Feb 27 15:50:37 2015 ! @@ -282,8 +282,8 @@ $(srcdir)/mkinstalldirs $(DESTDIR)$(sbindir) $(srcdir)/mkinstalldirs $(DESTDIR)$(mandir) $(srcdir)/mkinstalldirs $(DESTDIR)$(mandir)/$(mansubdir)1 - $(srcdir)/mkinstalldirs $(DESTDIR)$(mandir)/$(mansubdir)5 - $(srcdir)/mkinstalldirs $(DESTDIR)$(mandir)/$(mansubdir)8 --- 1,9 ---- ! diff -ru openssh-7.1p1.orig/Makefile.in openssh-7.1p1/Makefile.in ! --- openssh-7.1p1.orig/Makefile.in Fri Aug 21 00:49:03 2015 ! +++ openssh-7.1p1/Makefile.in Wed Sep 2 08:54:44 2015 ! @@ -298,8 +298,8 @@ $(srcdir)/mkinstalldirs $(DESTDIR)$(sbindir) $(srcdir)/mkinstalldirs $(DESTDIR)$(mandir) $(srcdir)/mkinstalldirs $(DESTDIR)$(mandir)/$(mansubdir)1 - $(srcdir)/mkinstalldirs $(DESTDIR)$(mandir)/$(mansubdir)5 - $(srcdir)/mkinstalldirs $(DESTDIR)$(mandir)/$(mansubdir)8
*** 10,20 **** + $(srcdir)/mkinstalldirs $(DESTDIR)$(mandir)/$(mansubdir)1m + $(srcdir)/mkinstalldirs $(DESTDIR)$(mandir)/$(mansubdir)4 $(srcdir)/mkinstalldirs $(DESTDIR)$(libexecdir) (umask 022 ; $(srcdir)/mkinstalldirs $(DESTDIR)$(PRIVSEP_PATH)) $(INSTALL) -m 0755 $(STRIP_OPT) ssh$(EXEEXT) $(DESTDIR)$(bindir)/ssh$(EXEEXT) ! @@ -303,14 +303,14 @@ $(INSTALL) -m 644 ssh-agent.1.out $(DESTDIR)$(mandir)/$(mansubdir)1/ssh-agent.1 $(INSTALL) -m 644 ssh-keygen.1.out $(DESTDIR)$(mandir)/$(mansubdir)1/ssh-keygen.1 $(INSTALL) -m 644 ssh-keyscan.1.out $(DESTDIR)$(mandir)/$(mansubdir)1/ssh-keyscan.1 - $(INSTALL) -m 644 moduli.5.out $(DESTDIR)$(mandir)/$(mansubdir)5/moduli.5 - $(INSTALL) -m 644 sshd_config.5.out $(DESTDIR)$(mandir)/$(mansubdir)5/sshd_config.5 --- 10,20 ---- + $(srcdir)/mkinstalldirs $(DESTDIR)$(mandir)/$(mansubdir)1m + $(srcdir)/mkinstalldirs $(DESTDIR)$(mandir)/$(mansubdir)4 $(srcdir)/mkinstalldirs $(DESTDIR)$(libexecdir) (umask 022 ; $(srcdir)/mkinstalldirs $(DESTDIR)$(PRIVSEP_PATH)) $(INSTALL) -m 0755 $(STRIP_OPT) ssh$(EXEEXT) $(DESTDIR)$(bindir)/ssh$(EXEEXT) ! @@ -319,14 +319,14 @@ $(INSTALL) -m 644 ssh-agent.1.out $(DESTDIR)$(mandir)/$(mansubdir)1/ssh-agent.1 $(INSTALL) -m 644 ssh-keygen.1.out $(DESTDIR)$(mandir)/$(mansubdir)1/ssh-keygen.1 $(INSTALL) -m 644 ssh-keyscan.1.out $(DESTDIR)$(mandir)/$(mansubdir)1/ssh-keyscan.1 - $(INSTALL) -m 644 moduli.5.out $(DESTDIR)$(mandir)/$(mansubdir)5/moduli.5 - $(INSTALL) -m 644 sshd_config.5.out $(DESTDIR)$(mandir)/$(mansubdir)5/sshd_config.5
*** 32,46 **** + $(INSTALL) -m 644 ssh-keysign.8.out $(DESTDIR)$(mandir)/$(mansubdir)1m/ssh-keysign.1m + $(INSTALL) -m 644 ssh-pkcs11-helper.8.out $(DESTDIR)$(mandir)/$(mansubdir)1m/ssh-pkcs11-helper.1m -rm -f $(DESTDIR)$(bindir)/slogin ln -s ./ssh$(EXEEXT) $(DESTDIR)$(bindir)/slogin -rm -f $(DESTDIR)$(mandir)/$(mansubdir)1/slogin.1 ! Only in openssh-6.7p1: Makefile.in.orig ! Common subdirectories: openssh-6.7p1-orig/contrib and openssh-6.7p1/contrib ! diff -ru openssh-6.7p1-orig/moduli.5 openssh-6.7p1/moduli.5 ! --- openssh-6.7p1-orig/moduli.5 Tue Nov 6 16:36:01 2012 ! +++ openssh-6.7p1/moduli.5 Fri Feb 27 15:50:37 2015 @@ -14,7 +14,7 @@ .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .Dd $Mdocdate: September 26 2012 $ -.Dt MODULI 5 --- 32,44 ---- + $(INSTALL) -m 644 ssh-keysign.8.out $(DESTDIR)$(mandir)/$(mansubdir)1m/ssh-keysign.1m + $(INSTALL) -m 644 ssh-pkcs11-helper.8.out $(DESTDIR)$(mandir)/$(mansubdir)1m/ssh-pkcs11-helper.1m -rm -f $(DESTDIR)$(bindir)/slogin ln -s ./ssh$(EXEEXT) $(DESTDIR)$(bindir)/slogin -rm -f $(DESTDIR)$(mandir)/$(mansubdir)1/slogin.1 ! diff -ru openssh-7.1p1.orig/moduli.5 openssh-7.1p1/moduli.5 ! --- openssh-7.1p1.orig/moduli.5 Fri Aug 21 00:49:03 2015 ! +++ openssh-7.1p1/moduli.5 Wed Sep 2 08:54:44 2015 @@ -14,7 +14,7 @@ .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .Dd $Mdocdate: September 26 2012 $ -.Dt MODULI 5
*** 93,108 **** -.Xr sshd 8 +.Xr sshd 1M .Sh STANDARDS .Rs .%A M. Friedl ! Common subdirectories: openssh-6.7p1-orig/openbsd-compat and openssh-6.7p1/openbsd-compat ! Common subdirectories: openssh-6.7p1-orig/regress and openssh-6.7p1/regress ! Common subdirectories: openssh-6.7p1-orig/scard and openssh-6.7p1/scard ! diff -ru openssh-6.7p1-orig/scp.1 openssh-6.7p1/scp.1 ! --- openssh-6.7p1-orig/scp.1 Sat Apr 19 23:02:58 2014 ! +++ openssh-6.7p1/scp.1 Fri Feb 27 15:50:37 2015 @@ -116,13 +116,13 @@ Can be used to pass options to .Nm ssh in the format used in -.Xr ssh_config 5 . --- 91,103 ---- -.Xr sshd 8 +.Xr sshd 1M .Sh STANDARDS .Rs .%A M. Friedl ! diff -ru openssh-7.1p1.orig/scp.1 openssh-7.1p1/scp.1 ! --- openssh-7.1p1.orig/scp.1 Fri Aug 21 00:49:03 2015 ! +++ openssh-7.1p1/scp.1 Wed Sep 2 08:54:44 2015 @@ -116,13 +116,13 @@ Can be used to pass options to .Nm ssh in the format used in -.Xr ssh_config 5 .
*** 115,125 **** -.Xr ssh_config 5 . +.Xr ssh_config 4 . .Pp .Bl -tag -width Ds -offset indent -compact .It AddressFamily ! @@ -227,8 +227,8 @@ .Xr ssh-add 1 , .Xr ssh-agent 1 , .Xr ssh-keygen 1 , -.Xr ssh_config 5 , -.Xr sshd 8 --- 110,120 ---- -.Xr ssh_config 5 . +.Xr ssh_config 4 . .Pp .Bl -tag -width Ds -offset indent -compact .It AddressFamily ! @@ -230,8 +230,8 @@ .Xr ssh-add 1 , .Xr ssh-agent 1 , .Xr ssh-keygen 1 , -.Xr ssh_config 5 , -.Xr sshd 8
*** 126,143 **** +.Xr ssh_config 4 , +.Xr sshd 1M .Sh HISTORY .Nm is based on the rcp program in ! Only in openssh-6.7p1: scp.1.orig ! diff -ru openssh-6.7p1-orig/sftp-server.8 openssh-6.7p1/sftp-server.8 ! --- openssh-6.7p1-orig/sftp-server.8 Tue Jul 29 22:33:21 2014 ! +++ openssh-6.7p1/sftp-server.8 Fri Feb 27 15:51:27 2015 @@ -23,7 +23,7 @@ .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" ! .Dd $Mdocdate: July 28 2014 $ -.Dt SFTP-SERVER 8 +.Dt SFTP-SERVER 1M .Os .Sh NAME .Nm sftp-server --- 121,137 ---- +.Xr ssh_config 4 , +.Xr sshd 1M .Sh HISTORY .Nm is based on the rcp program in ! diff -ru openssh-7.1p1.orig/sftp-server.8 openssh-7.1p1/sftp-server.8 ! --- openssh-7.1p1.orig/sftp-server.8 Fri Aug 21 00:49:03 2015 ! +++ openssh-7.1p1/sftp-server.8 Wed Sep 2 09:02:44 2015 @@ -23,7 +23,7 @@ .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" ! .Dd $Mdocdate: December 11 2014 $ -.Dt SFTP-SERVER 8 +.Dt SFTP-SERVER 1M .Os .Sh NAME .Nm sftp-server
*** 157,166 **** --- 151,169 ---- -.Xr sshd_config 5 +.Xr sshd_config 4 for more information. .Pp Valid options are: + @@ -71,7 +71,7 @@ + and %u is replaced by the username of that user. + The default is to use the user's home directory. + This option is useful in conjunction with the + -.Xr sshd_config 5 + +.Xr sshd_config 4 + .Cm ChrootDirectory + option. + .It Fl e @@ -147,13 +147,13 @@ for logging to work, and use of .Nm in a chroot configuration therefore requires that -.Xr syslogd 8
*** 174,186 **** +.Xr sshd_config 4 , +.Xr sshd 1M .Rs .%A T. Ylonen .%A S. Lehtinen ! diff -ru openssh-6.7p1-orig/sftp.1 openssh-6.7p1/sftp.1 ! --- openssh-6.7p1-orig/sftp.1 Wed May 14 23:47:37 2014 ! +++ openssh-6.7p1/sftp.1 Fri Feb 27 15:50:37 2015 @@ -85,7 +85,7 @@ option. In such cases, it is necessary to configure non-interactive authentication to obviate the need to enter a password at connection time (see -.Xr sshd 8 --- 177,189 ---- +.Xr sshd_config 4 , +.Xr sshd 1M .Rs .%A T. Ylonen .%A S. Lehtinen ! diff -ru openssh-7.1p1.orig/sftp.1 openssh-7.1p1/sftp.1 ! --- openssh-7.1p1.orig/sftp.1 Fri Aug 21 00:49:03 2015 ! +++ openssh-7.1p1/sftp.1 Wed Sep 2 08:54:44 2015 @@ -85,7 +85,7 @@ option. In such cases, it is necessary to configure non-interactive authentication to obviate the need to enter a password at connection time (see -.Xr sshd 8
*** 204,223 **** -.Xr ssh_config 5 . +.Xr ssh_config 4 . .Pp .Bl -tag -width Ds -offset indent -compact .It AddressFamily ! @@ -280,7 +280,7 @@ A path is useful for using .Nm over protocol version 1, or when the remote -.Xr sshd 8 +.Xr sshd 1M does not have an sftp subsystem configured. .It Fl v Raise logging level. ! @@ -610,9 +610,9 @@ .Xr ssh-add 1 , .Xr ssh-keygen 1 , .Xr glob 3 , -.Xr ssh_config 5 , -.Xr sftp-server 8 , --- 207,226 ---- -.Xr ssh_config 5 . +.Xr ssh_config 4 . .Pp .Bl -tag -width Ds -offset indent -compact .It AddressFamily ! @@ -282,7 +282,7 @@ A path is useful for using .Nm over protocol version 1, or when the remote -.Xr sshd 8 +.Xr sshd 1M does not have an sftp subsystem configured. .It Fl v Raise logging level. ! @@ -612,9 +612,9 @@ .Xr ssh-add 1 , .Xr ssh-keygen 1 , .Xr glob 3 , -.Xr ssh_config 5 , -.Xr sftp-server 8 ,
*** 226,306 **** +.Xr sftp-server 1M , +.Xr sshd 1M .Rs .%A T. Ylonen .%A S. Lehtinen ! Only in openssh-6.7p1: sftp.1.orig ! diff -ru openssh-6.7p1-orig/ssh-add.1 openssh-6.7p1/ssh-add.1 ! --- openssh-6.7p1-orig/ssh-add.1 Wed Dec 18 01:46:28 2013 ! +++ openssh-6.7p1/ssh-add.1 Fri Feb 27 15:50:37 2015 ! @@ -126,7 +126,7 @@ Set a maximum lifetime when adding identities to an agent. The lifetime may be specified in seconds or in a time format specified in -.Xr sshd_config 5 . +.Xr sshd_config 4 . .It Fl X Unlock the agent. .It Fl x ! @@ -189,7 +189,7 @@ ! .Xr ssh 1 , .Xr ssh-agent 1 , .Xr ssh-keygen 1 , -.Xr sshd 8 +.Xr sshd 1M .Sh AUTHORS OpenSSH is a derivative of the original and free ssh 1.2.12 release by Tatu Ylonen. ! diff -ru openssh-6.7p1-orig/ssh-keygen.1 openssh-6.7p1/ssh-keygen.1 ! --- openssh-6.7p1-orig/ssh-keygen.1 Sat Apr 19 23:23:04 2014 ! +++ openssh-6.7p1/ssh-keygen.1 Fri Feb 27 15:50:37 2015 ! @@ -433,7 +433,7 @@ Disable execution of .Pa ~/.ssh/rc by -.Xr sshd 8 +.Xr sshd 1M (permitted by default). .It Ic no-x11-forwarding Disable X11 forwarding (permitted by default). ! @@ -449,7 +449,7 @@ Allows execution of .Pa ~/.ssh/rc by -.Xr sshd 8 . +.Xr sshd 1M . .It Ic permit-x11-forwarding Allows X11 forwarding. .It Ic source-address Ns = Ns Ar address_list ! @@ -540,7 +540,7 @@ in YYYYMMDDHHMMSS format or a relative time (to the current time) consisting of a minus sign followed by a relative time in the format described in the TIME FORMATS section of -.Xr sshd_config 5 . +.Xr sshd_config 4 . The end time may be specified as a YYYYMMDD date, a YYYYMMDDHHMMSS time or a relative time starting with a plus character. .Pp ! @@ -642,7 +642,7 @@ on a certificate rather than trusting many user/host keys. Note that OpenSSH certificates are a different, and much simpler, format to the X.509 certificates used in -.Xr ssl 8 . +.Xr ssl 1M . .Pp .Nm supports two types of certificates: user and host. ! @@ -706,7 +706,7 @@ .Pp For certificates to be used for user or host authentication, the CA public key must be trusted by -.Xr sshd 8 +.Xr sshd 1M or .Xr ssh 1 . Please refer to those manual pages for details. ! @@ -830,14 +830,14 @@ .It Pa /etc/moduli Contains Diffie-Hellman groups used for DH-GEX. The file format is described in -.Xr moduli 5 . +.Xr moduli 4 . --- 229,329 ---- +.Xr sftp-server 1M , +.Xr sshd 1M .Rs .%A T. Ylonen .%A S. Lehtinen ! diff -ru openssh-7.1p1.orig/ssh-add.1 openssh-7.1p1/ssh-add.1 ! --- openssh-7.1p1.orig/ssh-add.1 Fri Aug 21 00:49:03 2015 ! +++ openssh-7.1p1/ssh-add.1 Wed Sep 2 08:54:44 2015 ! @@ -134,7 +134,7 @@ Set a maximum lifetime when adding identities to an agent. The lifetime may be specified in seconds or in a time format specified in -.Xr sshd_config 5 . +.Xr sshd_config 4 . .It Fl X Unlock the agent. .It Fl x ! @@ -200,7 +200,7 @@ .Xr ssh-agent 1 , + .Xr ssh-askpass 1 , .Xr ssh-keygen 1 , -.Xr sshd 8 +.Xr sshd 1M .Sh AUTHORS OpenSSH is a derivative of the original and free ssh 1.2.12 release by Tatu Ylonen. ! diff -ru openssh-7.1p1.orig/ssh-agent.1 openssh-7.1p1/ssh-agent.1 ! --- openssh-7.1p1.orig/ssh-agent.1 Fri Aug 21 00:49:03 2015 ! +++ openssh-7.1p1/ssh-agent.1 Wed Sep 2 09:02:52 2015 ! @@ -123,7 +123,7 @@ ! .It Fl t Ar life ! Set a default value for the maximum lifetime of identities added to the agent. ! The lifetime may be specified in seconds or in a time format specified in ! -.Xr sshd_config 5 . ! +.Xr sshd_config 4 . ! A lifetime specified for an identity with ! .Xr ssh-add 1 ! overrides this value. ! @@ -198,7 +198,7 @@ ! .Xr ssh 1 , ! .Xr ssh-add 1 , ! .Xr ssh-keygen 1 , ! -.Xr sshd 8 ! +.Xr sshd 1M ! .Sh AUTHORS ! OpenSSH is a derivative of the original and free ! ssh 1.2.12 release by Tatu Ylonen. ! diff -ru openssh-7.1p1.orig/ssh-keygen.1 openssh-7.1p1/ssh-keygen.1 ! --- openssh-7.1p1.orig/ssh-keygen.1 Fri Aug 21 00:49:03 2015 ! +++ openssh-7.1p1/ssh-keygen.1 Wed Sep 2 08:54:44 2015 ! @@ -443,7 +443,7 @@ Disable execution of .Pa ~/.ssh/rc by -.Xr sshd 8 +.Xr sshd 1M (permitted by default). .It Ic no-x11-forwarding Disable X11 forwarding (permitted by default). ! @@ -459,7 +459,7 @@ Allows execution of .Pa ~/.ssh/rc by -.Xr sshd 8 . +.Xr sshd 1M . .It Ic permit-x11-forwarding Allows X11 forwarding. .It Ic source-address Ns = Ns Ar address_list ! @@ -550,7 +550,7 @@ in YYYYMMDDHHMMSS format or a relative time (to the current time) consisting of a minus sign followed by a relative time in the format described in the TIME FORMATS section of -.Xr sshd_config 5 . +.Xr sshd_config 4 . The end time may be specified as a YYYYMMDD date, a YYYYMMDDHHMMSS time or a relative time starting with a plus character. .Pp ! @@ -652,7 +652,7 @@ on a certificate rather than trusting many user/host keys. Note that OpenSSH certificates are a different, and much simpler, format to the X.509 certificates used in -.Xr ssl 8 . +.Xr ssl 1M . .Pp .Nm supports two types of certificates: user and host. ! @@ -716,7 +716,7 @@ .Pp For certificates to be used for user or host authentication, the CA public key must be trusted by -.Xr sshd 8 +.Xr sshd 1M or .Xr ssh 1 . Please refer to those manual pages for details. ! @@ -840,14 +840,14 @@ .It Pa /etc/moduli Contains Diffie-Hellman groups used for DH-GEX. The file format is described in -.Xr moduli 5 . +.Xr moduli 4 .
*** 314,326 **** +.Xr moduli 4 , +.Xr sshd 1M .Rs .%R RFC 4716 .%T "The Secure Shell (SSH) Public Key File Format" ! diff -ru openssh-6.7p1-orig/ssh-keysign.8 openssh-6.7p1/ssh-keysign.8 ! --- openssh-6.7p1-orig/ssh-keysign.8 Wed Dec 18 01:46:28 2013 ! +++ openssh-6.7p1/ssh-keysign.8 Fri Feb 27 15:50:37 2015 @@ -23,7 +23,7 @@ .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" .Dd $Mdocdate: December 7 2013 $ -.Dt SSH-KEYSIGN 8 --- 337,361 ---- +.Xr moduli 4 , +.Xr sshd 1M .Rs .%R RFC 4716 .%T "The Secure Shell (SSH) Public Key File Format" ! diff -ru openssh-7.1p1.orig/ssh-keyscan.1 openssh-7.1p1/ssh-keyscan.1 ! --- openssh-7.1p1.orig/ssh-keyscan.1 Fri Aug 21 00:49:03 2015 ! +++ openssh-7.1p1/ssh-keyscan.1 Wed Sep 2 09:01:30 2015 ! @@ -164,7 +164,7 @@ ! .Ed ! .Sh SEE ALSO ! .Xr ssh 1 , ! -.Xr sshd 8 ! +.Xr sshd 1M ! .Sh AUTHORS ! .An -nosplit ! .An David Mazieres Aq Mt dm@lcs.mit.edu ! diff -ru openssh-7.1p1.orig/ssh-keysign.8 openssh-7.1p1/ssh-keysign.8 ! --- openssh-7.1p1.orig/ssh-keysign.8 Fri Aug 21 00:49:03 2015 ! +++ openssh-7.1p1/ssh-keysign.8 Wed Sep 2 08:54:44 2015 @@ -23,7 +23,7 @@ .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" .Dd $Mdocdate: December 7 2013 $ -.Dt SSH-KEYSIGN 8
*** 346,569 **** +.Xr ssh_config 4 , +.Xr sshd 1M .Sh HISTORY .Nm first appeared in ! diff -ru openssh-6.7p1-orig/ssh-pkcs11-helper.8 openssh-6.7p1/ssh-pkcs11-helper.8 ! --- openssh-6.7p1-orig/ssh-pkcs11-helper.8 Thu Jul 18 02:14:14 2013 ! +++ openssh-6.7p1/ssh-pkcs11-helper.8 Fri Feb 27 15:50:37 2015 @@ -15,7 +15,7 @@ .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" .Dd $Mdocdate: July 16 2013 $ -.Dt SSH-PKCS11-HELPER 8 +.Dt SSH-PKCS11-HELPER 1M .Os .Sh NAME .Nm ssh-pkcs11-helper ! diff -ru openssh-6.7p1-orig/ssh.1 openssh-6.7p1/ssh.1 ! --- openssh-6.7p1-orig/ssh.1 Tue Jul 29 22:32:28 2014 ! +++ openssh-6.7p1/ssh.1 Fri Feb 27 15:52:48 2015 ! @@ -164,7 +164,7 @@ See the .Cm Ciphers keyword in -.Xr ssh_config 5 +.Xr ssh_config 4 for more information. .It Fl D Xo ! .Sm off ! @@ -343,7 +343,7 @@ Refer to the description of .Cm ControlMaster in -.Xr ssh_config 5 +.Xr ssh_config 4 for details. .It Fl m Ar mac_spec ! Additionally, for protocol version 2 a comma-separated list of MAC ! @@ -399,7 +399,7 @@ This is useful for specifying options for which there is no separate command-line flag. For full details of the options listed below, and their possible values, see -.Xr ssh_config 5 . +.Xr ssh_config 4 . .Pp .Bl -tag -width Ds -offset indent -compact .It AddressFamily ! @@ -541,7 +541,7 @@ will only succeed if the server's .Cm GatewayPorts option is enabled (see -.Xr sshd_config 5 ) . +.Xr sshd_config 4 ) . .Pp If the .Ar port ! @@ -562,7 +562,7 @@ and .Cm ControlMaster in -.Xr ssh_config 5 +.Xr ssh_config 4 for details. .It Fl s ! May be used to request invocation of a subsystem on the remote system. ! @@ -632,7 +632,7 @@ and .Cm TunnelDevice directives in -.Xr ssh_config 5 . +.Xr ssh_config 4 . If the .Cm Tunnel directive is unset, it is set to the default tunnel mode, which is ! @@ -655,7 +655,7 @@ option and the .Cm ForwardX11Trusted directive in -.Xr ssh_config 5 +.Xr ssh_config 4 for more information. .It Fl x ! Disables X11 forwarding. ! @@ -674,7 +674,7 @@ may additionally obtain configuration data from a per-user configuration file and a system-wide configuration file. The file format and configuration options are described in -.Xr ssh_config 5 . +.Xr ssh_config 4 . .Sh AUTHENTICATION The OpenSSH SSH client supports SSH protocols 1 and 2. The default is to use protocol 2 only, ! @@ -681,7 +681,7 @@ though this can be changed via the .Cm Protocol option in -.Xr ssh_config 5 +.Xr ssh_config 4 or the .Fl 1 and ! @@ -941,7 +941,7 @@ allows the user to execute a local command if the .Ic PermitLocalCommand option is enabled in -.Xr ssh_config 5 . +.Xr ssh_config 4 . Basic help is available, using the .Fl h option. ! @@ -1138,7 +1138,7 @@ See the .Cm VerifyHostKeyDNS option in -.Xr ssh_config 5 +.Xr ssh_config 4 for more information. .Sh SSH-BASED VIRTUAL PRIVATE NETWORKS .Nm ! @@ -1148,7 +1148,7 @@ network pseudo-device, allowing two networks to be joined securely. The -.Xr sshd_config 5 +.Xr sshd_config 4 configuration option .Cm PermitTunnel controls whether the server supports this, ! @@ -1298,7 +1298,7 @@ For more information, see the .Cm PermitUserEnvironment option in -.Xr sshd_config 5 . +.Xr sshd_config 4 . .Sh FILES .Bl -tag -width Ds -compact .It Pa ~/.rhosts ! @@ -1306,7 +1306,7 @@ On some machines this file may need to be world-readable if the user's home directory is on an NFS partition, because -.Xr sshd 8 +.Xr sshd 1M reads it as root. Additionally, this file must be owned by the user, and must not have write permissions for anyone else. ! @@ -1331,7 +1331,7 @@ ! Lists the public keys (DSA, ECDSA, ED25519, RSA) that can be used for logging in as this user. The format of this file is described in the -.Xr sshd 8 +.Xr sshd 1M manual page. This file is not highly sensitive, but the recommended permissions are read/write for the user, and not accessible by others. ! @@ -1339,7 +1339,7 @@ .It Pa ~/.ssh/config This is the per-user configuration file. The file format and configuration options are described in -.Xr ssh_config 5 . +.Xr ssh_config 4 . Because of the potential for abuse, this file must have strict permissions: read/write for the user, and not writable by others. .Pp ! @@ -1376,7 +1376,7 @@ Contains a list of host keys for all hosts the user has logged into that are not already in the systemwide list of known host keys. See -.Xr sshd 8 +.Xr sshd 1M for further details of the format of this file. .Pp .It Pa ~/.ssh/rc ! @@ -1385,7 +1385,7 @@ when the user logs in, just before the user's shell (or command) is started. See the -.Xr sshd 8 +.Xr sshd 1M manual page for more information. .Pp .It Pa /etc/hosts.equiv ! @@ -1401,7 +1401,7 @@ .It Pa /etc/ssh/ssh_config Systemwide configuration file. The file format and configuration options are described in -.Xr ssh_config 5 . +.Xr ssh_config 4 . .Pp .It Pa /etc/ssh/ssh_host_key .It Pa /etc/ssh/ssh_host_dsa_key ! @@ -1416,7 +1416,7 @@ For protocol version 2, .Nm uses -.Xr ssh-keysign 8 +.Xr ssh-keysign 1M to access the host keys, eliminating the requirement that .Nm ! @@ -1432,7 +1432,7 @@ organization. It should be world-readable. See -.Xr sshd 8 +.Xr sshd 1M for further details of the format of this file. .Pp .It Pa /etc/ssh/sshrc ! @@ -1440,7 +1440,7 @@ .Nm when the user logs in, just before the user's shell (or command) is started. See the -.Xr sshd 8 +.Xr sshd 1M manual page for more information. .El .Sh EXIT STATUS ! @@ -1455,9 +1455,9 @@ .Xr ssh-keygen 1 , .Xr ssh-keyscan 1 , .Xr tun 4 , -.Xr ssh_config 5 , -.Xr ssh-keysign 8 , --- 381,604 ---- +.Xr ssh_config 4 , +.Xr sshd 1M .Sh HISTORY .Nm first appeared in ! diff -ru openssh-7.1p1.orig/ssh-pkcs11-helper.8 openssh-7.1p1/ssh-pkcs11-helper.8 ! --- openssh-7.1p1.orig/ssh-pkcs11-helper.8 Fri Aug 21 00:49:03 2015 ! +++ openssh-7.1p1/ssh-pkcs11-helper.8 Wed Sep 2 08:54:44 2015 @@ -15,7 +15,7 @@ .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" .Dd $Mdocdate: July 16 2013 $ -.Dt SSH-PKCS11-HELPER 8 +.Dt SSH-PKCS11-HELPER 1M .Os .Sh NAME .Nm ssh-pkcs11-helper ! diff -ru openssh-7.1p1.orig/ssh.1 openssh-7.1p1/ssh.1 ! --- openssh-7.1p1.orig/ssh.1 Fri Aug 21 00:49:03 2015 ! +++ openssh-7.1p1/ssh.1 Wed Sep 2 08:54:44 2015 ! @@ -173,7 +173,7 @@ See the .Cm Ciphers keyword in -.Xr ssh_config 5 +.Xr ssh_config 4 for more information. + .Pp .It Fl D Xo ! @@ -396,7 +396,7 @@ Refer to the description of .Cm ControlMaster in -.Xr ssh_config 5 +.Xr ssh_config 4 for details. + .Pp .It Fl m Ar mac_spec ! @@ -457,7 +457,7 @@ This is useful for specifying options for which there is no separate command-line flag. For full details of the options listed below, and their possible values, see -.Xr ssh_config 5 . +.Xr ssh_config 4 . .Pp .Bl -tag -width Ds -offset indent -compact .It AddressFamily ! @@ -629,7 +629,7 @@ will only succeed if the server's .Cm GatewayPorts option is enabled (see -.Xr sshd_config 5 ) . +.Xr sshd_config 4 ) . .Pp If the .Ar port ! @@ -651,7 +651,7 @@ and .Cm ControlMaster in -.Xr ssh_config 5 +.Xr ssh_config 4 for details. + .Pp .It Fl s ! @@ -728,7 +728,7 @@ and .Cm TunnelDevice directives in -.Xr ssh_config 5 . +.Xr ssh_config 4 . If the .Cm Tunnel directive is unset, it is set to the default tunnel mode, which is ! @@ -752,7 +752,7 @@ option and the .Cm ForwardX11Trusted directive in -.Xr ssh_config 5 +.Xr ssh_config 4 for more information. + .Pp .It Fl x ! @@ -774,7 +774,7 @@ may additionally obtain configuration data from a per-user configuration file and a system-wide configuration file. The file format and configuration options are described in -.Xr ssh_config 5 . +.Xr ssh_config 4 . .Sh AUTHENTICATION The OpenSSH SSH client supports SSH protocols 1 and 2. The default is to use protocol 2 only, ! @@ -781,7 +781,7 @@ though this can be changed via the .Cm Protocol option in -.Xr ssh_config 5 +.Xr ssh_config 4 or the .Fl 1 and ! @@ -1052,7 +1052,7 @@ allows the user to execute a local command if the .Ic PermitLocalCommand option is enabled in -.Xr ssh_config 5 . +.Xr ssh_config 4 . Basic help is available, using the .Fl h option. ! @@ -1254,7 +1254,7 @@ See the .Cm VerifyHostKeyDNS option in -.Xr ssh_config 5 +.Xr ssh_config 4 for more information. .Sh SSH-BASED VIRTUAL PRIVATE NETWORKS .Nm ! @@ -1264,7 +1264,7 @@ network pseudo-device, allowing two networks to be joined securely. The -.Xr sshd_config 5 +.Xr sshd_config 4 configuration option .Cm PermitTunnel controls whether the server supports this, ! @@ -1414,7 +1414,7 @@ For more information, see the .Cm PermitUserEnvironment option in -.Xr sshd_config 5 . +.Xr sshd_config 4 . .Sh FILES .Bl -tag -width Ds -compact .It Pa ~/.rhosts ! @@ -1422,7 +1422,7 @@ On some machines this file may need to be world-readable if the user's home directory is on an NFS partition, because -.Xr sshd 8 +.Xr sshd 1M reads it as root. Additionally, this file must be owned by the user, and must not have write permissions for anyone else. ! @@ -1447,7 +1447,7 @@ ! Lists the public keys (DSA, ECDSA, Ed25519, RSA) that can be used for logging in as this user. The format of this file is described in the -.Xr sshd 8 +.Xr sshd 1M manual page. This file is not highly sensitive, but the recommended permissions are read/write for the user, and not accessible by others. ! @@ -1455,7 +1455,7 @@ .It Pa ~/.ssh/config This is the per-user configuration file. The file format and configuration options are described in -.Xr ssh_config 5 . +.Xr ssh_config 4 . Because of the potential for abuse, this file must have strict permissions: read/write for the user, and not writable by others. .Pp ! @@ -1492,7 +1492,7 @@ Contains a list of host keys for all hosts the user has logged into that are not already in the systemwide list of known host keys. See -.Xr sshd 8 +.Xr sshd 1M for further details of the format of this file. .Pp .It Pa ~/.ssh/rc ! @@ -1501,7 +1501,7 @@ when the user logs in, just before the user's shell (or command) is started. See the -.Xr sshd 8 +.Xr sshd 1M manual page for more information. .Pp .It Pa /etc/hosts.equiv ! @@ -1517,7 +1517,7 @@ .It Pa /etc/ssh/ssh_config Systemwide configuration file. The file format and configuration options are described in -.Xr ssh_config 5 . +.Xr ssh_config 4 . .Pp .It Pa /etc/ssh/ssh_host_key .It Pa /etc/ssh/ssh_host_dsa_key ! @@ -1532,7 +1532,7 @@ For protocol version 2, .Nm uses -.Xr ssh-keysign 8 +.Xr ssh-keysign 1M to access the host keys, eliminating the requirement that .Nm ! @@ -1548,7 +1548,7 @@ organization. It should be world-readable. See -.Xr sshd 8 +.Xr sshd 1M for further details of the format of this file. .Pp .It Pa /etc/ssh/sshrc ! @@ -1556,7 +1556,7 @@ .Nm when the user logs in, just before the user's shell (or command) is started. See the -.Xr sshd 8 +.Xr sshd 1M manual page for more information. .El .Sh EXIT STATUS ! @@ -1571,9 +1571,9 @@ .Xr ssh-keygen 1 , .Xr ssh-keyscan 1 , .Xr tun 4 , -.Xr ssh_config 5 , -.Xr ssh-keysign 8 ,
*** 572,588 **** +.Xr ssh-keysign 1M , +.Xr sshd 1M .Sh STANDARDS .Rs .%A S. Lehtinen ! diff -ru openssh-6.7p1-orig/sshd.8 openssh-6.7p1/sshd.8 ! --- openssh-6.7p1-orig/sshd.8 Thu Jul 3 19:00:04 2014 ! +++ openssh-6.7p1/sshd.8 Fri Feb 27 15:54:50 2015 @@ -35,7 +35,7 @@ .\" ! .\" $OpenBSD: sshd.8,v 1.276 2014/07/03 22:40:43 djm Exp $ ! .Dd $Mdocdate: July 3 2014 $ -.Dt SSHD 8 +.Dt SSHD 1M .Os .Sh NAME .Nm sshd --- 607,698 ---- +.Xr ssh-keysign 1M , +.Xr sshd 1M .Sh STANDARDS .Rs .%A S. Lehtinen ! diff -ru openssh-7.1p1.orig/ssh_config.5 openssh-7.1p1/ssh_config.5 ! --- openssh-7.1p1.orig/ssh_config.5 Fri Aug 21 00:49:03 2015 ! +++ openssh-7.1p1/ssh_config.5 Wed Sep 2 09:02:37 2015 ! @@ -568,7 +568,7 @@ ! .Dq Fl O No exit ! option). ! If set to a time in seconds, or a time in any of the formats documented in ! -.Xr sshd_config 5 , ! +.Xr sshd_config 4 , ! then the backgrounded master connection will automatically terminate ! after it has remained idle (with no client connections) for the ! specified time. ! @@ -695,7 +695,7 @@ ! Specify a timeout for untrusted X11 forwarding ! using the format described in the ! TIME FORMATS section of ! -.Xr sshd_config 5 . ! +.Xr sshd_config 4 . ! X11 connections received by ! .Xr ssh 1 ! after this time will be refused. ! @@ -762,7 +762,7 @@ ! These hashed names may be used normally by ! .Xr ssh 1 ! and ! -.Xr sshd 8 , ! +.Xr sshd 1M , ! but they do not reveal identifying information should the file's contents ! be disclosed. ! The default is ! @@ -1206,7 +1206,7 @@ ! The command can be basically anything, ! and should read from its standard input and write to its standard output. ! It should eventually connect an ! -.Xr sshd 8 ! +.Xr sshd 1M ! server running on some machine, or execute ! .Ic sshd -i ! somewhere. ! @@ -1286,7 +1286,7 @@ ! The optional second value is specified in seconds and may use any of the ! units documented in the ! TIME FORMATS section of ! -.Xr sshd_config 5 . ! +.Xr sshd_config 4 . ! The default value for ! .Cm RekeyLimit ! is ! @@ -1330,7 +1330,7 @@ ! will only succeed if the server's ! .Cm GatewayPorts ! option is enabled (see ! -.Xr sshd_config 5 ) . ! +.Xr sshd_config 4 ) . ! .It Cm RequestTTY ! Specifies whether to request a pseudo-tty for the session. ! The argument may be one of: ! @@ -1396,7 +1396,7 @@ ! Refer to ! .Cm AcceptEnv ! in ! -.Xr sshd_config 5 ! +.Xr sshd_config 4 ! for how to configure the server. ! Variables are specified by name, which may contain wildcard characters. ! Multiple environment variables may be separated by whitespace or spread ! @@ -1586,7 +1586,7 @@ ! and will be disabled if it is enabled. ! .Pp ! Presently, only ! -.Xr sshd 8 ! +.Xr sshd 1M ! from OpenSSH 6.8 and greater support the ! .Dq hostkeys@openssh.com ! protocol extension used to inform the client of all the server's hostkeys. ! diff -ru openssh-7.1p1.orig/sshd.8 openssh-7.1p1/sshd.8 ! --- openssh-7.1p1.orig/sshd.8 Fri Aug 21 00:49:03 2015 ! +++ openssh-7.1p1/sshd.8 Wed Sep 2 08:59:06 2015 @@ -35,7 +35,7 @@ .\" ! .\" $OpenBSD: sshd.8,v 1.280 2015/07/03 03:49:45 djm Exp $ ! .Dd $Mdocdate: July 3 2015 $ -.Dt SSHD 8 +.Dt SSHD 1M .Os .Sh NAME .Nm sshd
*** 599,657 **** Specifies that .Nm is being run from -.Xr inetd 8 . +.Xr inetd 1M . .Nm ! is normally not run ! from inetd because it needs to generate the server key before it can ! @@ -207,7 +207,7 @@ This is useful for specifying options for which there is no separate command-line flag. For full details of the options, and their values, see -.Xr sshd_config 5 . +.Xr sshd_config 4 . .It Fl p Ar port Specifies the port on which the server listens for connections (default 22). ! @@ -277,7 +277,7 @@ though this can be changed via the .Cm Protocol option in -.Xr sshd_config 5 . +.Xr sshd_config 4 . ! Protocol 2 supports DSA, ECDSA, ED25519 and RSA keys; protocol 1 only supports RSA keys. For both protocols, ! @@ -402,7 +402,7 @@ See the .Cm PermitUserEnvironment option in -.Xr sshd_config 5 . +.Xr sshd_config 4 . .It Changes to user's home directory. .It ! @@ -550,7 +550,7 @@ environment variable. Note that this option applies to shell, command or subsystem execution. Also note that this command may be superseded by either a -.Xr sshd_config 5 +.Xr sshd_config 4 .Cm ForceCommand directive or a command embedded in a certificate. .It Cm environment="NAME=value" ! @@ -571,7 +571,7 @@ name of the remote host or its IP address must be present in the comma-separated list of patterns. See PATTERNS in -.Xr ssh_config 5 +.Xr ssh_config 4 for more information on patterns. .Pp In addition to the wildcard matching that may be applied to hostnames or ! @@ -859,11 +859,11 @@ .It Pa /etc/moduli Contains Diffie-Hellman groups used for the "Diffie-Hellman Group Exchange". The file format is described in -.Xr moduli 5 . +.Xr moduli 4 . --- 709,776 ---- Specifies that .Nm is being run from -.Xr inetd 8 . +.Xr inetd 1M . + If SSH protocol 1 is enabled, .Nm ! should not normally be run ! @@ -204,7 +204,7 @@ This is useful for specifying options for which there is no separate command-line flag. For full details of the options, and their values, see -.Xr sshd_config 5 . +.Xr sshd_config 4 . .It Fl p Ar port Specifies the port on which the server listens for connections (default 22). ! @@ -274,7 +274,7 @@ though this can be changed via the .Cm Protocol option in -.Xr sshd_config 5 . +.Xr sshd_config 4 . ! Protocol 2 supports DSA, ECDSA, Ed25519 and RSA keys; protocol 1 only supports RSA keys. For both protocols, ! @@ -399,7 +399,7 @@ See the .Cm PermitUserEnvironment option in -.Xr sshd_config 5 . +.Xr sshd_config 4 . .It Changes to user's home directory. .It ! @@ -406,7 +406,7 @@ ! If ! .Pa ~/.ssh/rc ! exists and the ! -.Xr sshd_config 5 ! +.Xr sshd_config 4 ! .Cm PermitUserRC ! option is set, runs it; else if ! .Pa /etc/ssh/sshrc ! @@ -549,7 +549,7 @@ environment variable. Note that this option applies to shell, command or subsystem execution. Also note that this command may be superseded by either a -.Xr sshd_config 5 +.Xr sshd_config 4 .Cm ForceCommand directive or a command embedded in a certificate. .It Cm environment="NAME=value" ! @@ -570,7 +570,7 @@ name of the remote host or its IP address must be present in the comma-separated list of patterns. See PATTERNS in -.Xr ssh_config 5 +.Xr ssh_config 4 for more information on patterns. .Pp In addition to the wildcard matching that may be applied to hostnames or ! @@ -858,11 +858,11 @@ .It Pa /etc/moduli Contains Diffie-Hellman groups used for the "Diffie-Hellman Group Exchange". The file format is described in -.Xr moduli 5 . +.Xr moduli 4 .
*** 661,680 **** -.Xr motd 5 . +.Xr motd 4 . .Pp .It Pa /etc/nologin If this file exists, ! @@ -920,7 +920,7 @@ Contains configuration data for .Nm sshd . The file format and configuration options are described in -.Xr sshd_config 5 . +.Xr sshd_config 4 . .Pp .It Pa /etc/ssh/sshrc Similar to ! @@ -954,11 +954,11 @@ .Xr ssh-keygen 1 , .Xr ssh-keyscan 1 , .Xr chroot 2 , -.Xr login.conf 5 , -.Xr moduli 5 , --- 780,799 ---- -.Xr motd 5 . +.Xr motd 4 . .Pp .It Pa /etc/nologin If this file exists, ! @@ -919,7 +919,7 @@ Contains configuration data for .Nm sshd . The file format and configuration options are described in -.Xr sshd_config 5 . +.Xr sshd_config 4 . .Pp .It Pa /etc/ssh/sshrc Similar to ! @@ -953,11 +953,11 @@ .Xr ssh-keygen 1 , .Xr ssh-keyscan 1 , .Xr chroot 2 , -.Xr login.conf 5 , -.Xr moduli 5 ,
*** 687,703 **** +.Xr inetd 1M , +.Xr sftp-server 1M .Sh AUTHORS OpenSSH is a derivative of the original and free ssh 1.2.12 release by Tatu Ylonen. ! diff -ru openssh-6.7p1-orig/sshd_config.5 openssh-6.7p1/sshd_config.5 ! --- openssh-6.7p1-orig/sshd_config.5 Thu Oct 2 19:24:57 2014 ! +++ openssh-6.7p1/sshd_config.5 Fri Feb 27 15:56:01 2015 @@ -35,7 +35,7 @@ .\" ! .\" $OpenBSD: sshd_config.5,v 1.176 2014/07/28 15:40:08 schwarze Exp $ ! .Dd $Mdocdate: July 28 2014 $ -.Dt SSHD_CONFIG 5 +.Dt SSHD_CONFIG 4 .Os .Sh NAME .Nm sshd_config --- 806,822 ---- +.Xr inetd 1M , +.Xr sftp-server 1M .Sh AUTHORS OpenSSH is a derivative of the original and free ssh 1.2.12 release by Tatu Ylonen. ! diff -ru openssh-7.1p1.orig/sshd_config.5 openssh-7.1p1/sshd_config.5 ! --- openssh-7.1p1.orig/sshd_config.5 Fri Aug 21 00:49:03 2015 ! +++ openssh-7.1p1/sshd_config.5 Wed Sep 2 09:00:14 2015 @@ -35,7 +35,7 @@ .\" ! .\" $OpenBSD: sshd_config.5,v 1.211 2015/08/14 15:32:41 jmc Exp $ ! .Dd $Mdocdate: August 14 2015 $ -.Dt SSHD_CONFIG 5 +.Dt SSHD_CONFIG 4 .Os .Sh NAME .Nm sshd_config
*** 715,1015 **** .Cm SendEnv in -.Xr ssh_config 5 +.Xr ssh_config 4 for how to configure the client. ! Note that environment passing is only supported for protocol 2. ! Variables are specified by name, which may contain the wildcard characters ! @@ -85,7 +85,7 @@ The default is not to accept any environment variables. .It Cm AddressFamily Specifies which address family should be used by -.Xr sshd 8 . +.Xr sshd 1M . Valid arguments are .Dq any , .Dq inet ! @@ -118,7 +118,7 @@ .Cm AllowGroups . .Pp See PATTERNS in -.Xr ssh_config 5 +.Xr ssh_config 4 for more information on patterns. .It Cm AllowTcpForwarding Specifies whether TCP forwarding is permitted. ! @@ -178,7 +178,7 @@ .Cm AllowGroups . .Pp See PATTERNS in -.Xr ssh_config 5 +.Xr ssh_config 4 for more information on patterns. .It Cm AuthenticationMethods Specifies the authentication methods that must be successfully completed ! @@ -222,7 +222,7 @@ ! It will be invoked with a single argument of the username ! being authenticated, and should produce on standard output zero or more lines of authorized_keys output (see AUTHORIZED_KEYS in -.Xr sshd 8 ) . +.Xr sshd 1M ) . If a key supplied by AuthorizedKeysCommand does not successfully authenticate and authorize the user then public key authentication continues using the usual .Cm AuthorizedKeysFile ! @@ -238,7 +238,7 @@ The format is described in the AUTHORIZED_KEYS FILE FORMAT section of -.Xr sshd 8 . +.Xr sshd 1M . .Cm AuthorizedKeysFile may contain tokens of the form %T which are substituted during connection setup. ! @@ -261,7 +261,7 @@ to be accepted for authentication. Names are listed one per line preceded by key options (as described in AUTHORIZED_KEYS FILE FORMAT in -.Xr sshd 8 ) . +.Xr sshd 1M ) . Empty lines and comments starting with .Ql # are ignored. ! @@ -291,7 +291,7 @@ though the .Cm principals= key option offers a similar facility (see -.Xr sshd 8 +.Xr sshd 1M for details). .It Cm Banner The contents of the specified file are sent to the remote user before ! @@ -304,7 +304,7 @@ .It Cm ChallengeResponseAuthentication Specifies whether challenge-response authentication is allowed (e.g. via PAM or through authentication styles supported in -.Xr login.conf 5 ) +.Xr login.conf 4 ) The default is .Dq yes . .It Cm ChrootDirectory ! @@ -314,7 +314,7 @@ ! All components of the pathname must be root-owned directories that are ! not writable by any other user or group. After the chroot, -.Xr sshd 8 +.Xr sshd 1M changes the working directory to the user's home directory. .Pp The pathname may contain the following tokens that are expanded at runtime once ! @@ -347,7 +347,7 @@ though sessions which use logging may require .Pa /dev/log inside the chroot directory on some operating systems (see -.Xr sftp-server 8 +.Xr sftp-server 1M for details). .Pp The default is not to ! @@ -404,7 +404,7 @@ .It Cm ClientAliveCountMax Sets the number of client alive messages (see below) which may be sent without -.Xr sshd 8 +.Xr sshd 1M receiving any messages back from the client. If this threshold is reached while client alive messages are being sent, sshd will disconnect the client, terminating the session. ! @@ -431,7 +431,7 @@ .It Cm ClientAliveInterval Sets a timeout interval in seconds after which if no data has been received from the client, -.Xr sshd 8 +.Xr sshd 1M will send a message through the encrypted channel to request a response from the client. The default ! @@ -462,7 +462,7 @@ .Cm AllowGroups . .Pp See PATTERNS in -.Xr ssh_config 5 +.Xr ssh_config 4 for more information on patterns. .It Cm DenyUsers This keyword can be followed by a list of user name patterns, separated ! @@ -481,7 +481,7 @@ .Cm AllowGroups . .Pp See PATTERNS in -.Xr ssh_config 5 +.Xr ssh_config 4 for more information on patterns. ! .It Cm ForceCommand ! Forces the execution of the command specified by ! @@ -506,7 +506,7 @@ Specifies whether remote hosts are allowed to connect to ports forwarded for the client. By default, -.Xr sshd 8 +.Xr sshd 1M binds remote port forwardings to the loopback address. This prevents other remote hosts from connecting to forwarded ports. .Cm GatewayPorts ! @@ -554,7 +554,7 @@ A setting of .Dq yes means that -.Xr sshd 8 +.Xr sshd 1M uses the name supplied by the client rather than attempting to resolve the name from the TCP connection itself. The default is ! @@ -565,7 +565,7 @@ by .Cm HostKey . The default behaviour of -.Xr sshd 8 +.Xr sshd 1M is not to load any certificates. .It Cm HostKey Specifies a file containing a private host key ! @@ -580,7 +580,7 @@ ! .Pa /etc/ssh/ssh_host_rsa_key for protocol version 2. Note that -.Xr sshd 8 +.Xr sshd 1M ! will refuse to use a file if it is group/world-accessible. It is possible to have multiple host key files. .Dq rsa1 ! @@ -621,7 +621,7 @@ .Dq yes . .It Cm IgnoreUserKnownHosts Specifies whether -.Xr sshd 8 +.Xr sshd 1M should ignore the user's .Pa ~/.ssh/known_hosts during ! @@ -745,7 +745,7 @@ The default is 3600 (seconds). .It Cm ListenAddress Specifies the local addresses -.Xr sshd 8 +.Xr sshd 1M should listen on. The following forms may be used: .Pp ! @@ -788,7 +788,7 @@ The default is 120 seconds. .It Cm LogLevel Gives the verbosity level that is used when logging messages from -.Xr sshd 8 . +.Xr sshd 1M . The possible values are: QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2, and DEBUG3. The default is INFO. ! @@ -881,7 +881,7 @@ The match patterns may consist of single entries or comma-separated lists and may use the wildcard and negation operators described in the PATTERNS section of -.Xr ssh_config 5 . +.Xr ssh_config 4 . .Pp The patterns in an .Cm Address ! @@ -962,7 +962,7 @@ the three colon separated values .Dq start:rate:full (e.g. "10:30:60"). -.Xr sshd 8 +.Xr sshd 1M will refuse connection attempts with a probability of .Dq rate/100 (30%) ! @@ -1075,7 +1075,7 @@ options in .Pa ~/.ssh/authorized_keys are processed by -.Xr sshd 8 . +.Xr sshd 1M . The default is .Dq no . Enabling environment processing may enable users to bypass access ! @@ -1094,7 +1094,7 @@ .Pa /var/run/sshd.pid . .It Cm Port Specifies the port number that -.Xr sshd 8 +.Xr sshd 1M listens on. The default is 22. Multiple options of this type are permitted. ! @@ -1102,7 +1102,7 @@ .Cm ListenAddress . .It Cm PrintLastLog Specifies whether -.Xr sshd 8 +.Xr sshd 1M should print the date and time of the last user login when a user logs in interactively. The default is ! @@ -1109,7 +1109,7 @@ .Dq yes . .It Cm PrintMotd Specifies whether -.Xr sshd 8 +.Xr sshd 1M should print .Pa /etc/motd when a user logs in interactively. ! @@ -1120,7 +1120,7 @@ .Dq yes . .It Cm Protocol Specifies the protocol versions -.Xr sshd 8 +.Xr sshd 1M supports. The possible values are .Sq 1 ! @@ -1220,7 +1220,7 @@ .Dq no . .It Cm StrictModes Specifies whether -.Xr sshd 8 +.Xr sshd 1M should check file modes and ownership of the user's files and home directory before accepting login. This is normally desirable because novices sometimes accidentally leave their ! @@ -1236,7 +1236,7 @@ to execute upon subsystem request. .Pp The command -.Xr sftp-server 8 +.Xr sftp-server 1M implements the .Dq sftp file transfer subsystem. ! @@ -1254,7 +1254,7 @@ Note that this option applies to protocol version 2 only. .It Cm SyslogFacility Gives the facility code that is used when logging messages from -.Xr sshd 8 . +.Xr sshd 1M . The possible values are: DAEMON, USER, AUTH, LOCAL0, LOCAL1, LOCAL2, LOCAL3, LOCAL4, LOCAL5, LOCAL6, LOCAL7. The default is AUTH. ! @@ -1295,7 +1295,7 @@ .Xr ssh-keygen 1 . .It Cm UseDNS Specifies whether -.Xr sshd 8 +.Xr sshd 1M ! should look up the remote host name and check that the resolved host name for the remote IP address maps back to the very same IP address. ! @@ -1340,13 +1340,13 @@ If .Cm UsePAM is enabled, you will not be able to run -.Xr sshd 8 +.Xr sshd 1M --- 834,1181 ---- .Cm SendEnv in -.Xr ssh_config 5 +.Xr ssh_config 4 for how to configure the client. ! Note that environment passing is only supported for protocol 2, and ! that the ! @@ -89,7 +89,7 @@ The default is not to accept any environment variables. .It Cm AddressFamily Specifies which address family should be used by -.Xr sshd 8 . +.Xr sshd 1M . Valid arguments are .Dq any , .Dq inet ! @@ -122,7 +122,7 @@ .Cm AllowGroups . .Pp See PATTERNS in -.Xr ssh_config 5 +.Xr ssh_config 4 for more information on patterns. .It Cm AllowTcpForwarding Specifies whether TCP forwarding is permitted. ! @@ -182,7 +182,7 @@ .Cm AllowGroups . .Pp See PATTERNS in -.Xr ssh_config 5 +.Xr ssh_config 4 for more information on patterns. .It Cm AuthenticationMethods Specifies the authentication methods that must be successfully completed ! @@ -217,7 +217,7 @@ ! If the ! .Dq publickey ! method is listed more than once, ! -.Xr sshd 8 ! +.Xr sshd 1M ! verifies that keys that have been used successfully are not reused for ! subsequent authentications. ! For example, an ! @@ -250,7 +250,7 @@ ! .Pp ! The program should produce on standard output zero or more lines of authorized_keys output (see AUTHORIZED_KEYS in -.Xr sshd 8 ) . +.Xr sshd 1M ) . If a key supplied by AuthorizedKeysCommand does not successfully authenticate and authorize the user then public key authentication continues using the usual .Cm AuthorizedKeysFile ! @@ -265,7 +265,7 @@ ! is specified but ! .Cm AuthorizedKeysCommandUser ! is not, then ! -.Xr sshd 8 ! +.Xr sshd 1M ! will refuse to start. ! .It Cm AuthorizedKeysFile ! Specifies the file that contains the public keys that can be used ! @@ -273,7 +273,7 @@ The format is described in the AUTHORIZED_KEYS FILE FORMAT section of -.Xr sshd 8 . +.Xr sshd 1M . .Cm AuthorizedKeysFile may contain tokens of the form %T which are substituted during connection setup. ! @@ -321,7 +321,7 @@ ! is specified but ! .Cm AuthorizedPrincipalsCommandUser ! is not, then ! -.Xr sshd 8 ! +.Xr sshd 1M ! will refuse to start. ! .It Cm AuthorizedPrincipalsFile ! Specifies a file that lists principal names that are accepted for ! @@ -332,7 +332,7 @@ to be accepted for authentication. Names are listed one per line preceded by key options (as described in AUTHORIZED_KEYS FILE FORMAT in -.Xr sshd 8 ) . +.Xr sshd 1M ) . Empty lines and comments starting with .Ql # are ignored. ! @@ -362,7 +362,7 @@ though the .Cm principals= key option offers a similar facility (see -.Xr sshd 8 +.Xr sshd 1M for details). .It Cm Banner The contents of the specified file are sent to the remote user before ! @@ -375,7 +375,7 @@ .It Cm ChallengeResponseAuthentication Specifies whether challenge-response authentication is allowed (e.g. via PAM or through authentication styles supported in -.Xr login.conf 5 ) +.Xr login.conf 4 ) The default is .Dq yes . .It Cm ChrootDirectory ! @@ -383,11 +383,11 @@ ! .Xr chroot 2 ! to after authentication. ! At session startup ! -.Xr sshd 8 ! +.Xr sshd 1M ! checks that all components of the pathname are root-owned directories ! which are not writable by any other user or group. After the chroot, -.Xr sshd 8 +.Xr sshd 1M changes the working directory to the user's home directory. .Pp The pathname may contain the following tokens that are expanded at runtime once ! @@ -419,7 +419,7 @@ though sessions which use logging may require .Pa /dev/log inside the chroot directory on some operating systems (see -.Xr sftp-server 8 +.Xr sftp-server 1M for details). .Pp + For safety, it is very important that the directory hierarchy be + @@ -426,7 +426,7 @@ + prevented from modification by other processes on the system (especially + those outside the jail). + Misconfiguration can lead to unsafe environments which + -.Xr sshd 8 + +.Xr sshd 1M + cannot detect. + .Pp The default is not to ! @@ -490,7 +490,7 @@ .It Cm ClientAliveCountMax Sets the number of client alive messages (see below) which may be sent without -.Xr sshd 8 +.Xr sshd 1M receiving any messages back from the client. If this threshold is reached while client alive messages are being sent, sshd will disconnect the client, terminating the session. ! @@ -517,7 +517,7 @@ .It Cm ClientAliveInterval Sets a timeout interval in seconds after which if no data has been received from the client, -.Xr sshd 8 +.Xr sshd 1M will send a message through the encrypted channel to request a response from the client. The default ! @@ -548,7 +548,7 @@ .Cm AllowGroups . .Pp See PATTERNS in -.Xr ssh_config 5 +.Xr ssh_config 4 for more information on patterns. .It Cm DenyUsers This keyword can be followed by a list of user name patterns, separated ! @@ -567,7 +567,7 @@ .Cm AllowGroups . .Pp See PATTERNS in -.Xr ssh_config 5 +.Xr ssh_config 4 for more information on patterns. ! .It Cm FingerprintHash ! Specifies the hash algorithm used when logging key fingerprints. ! @@ -600,7 +600,7 @@ Specifies whether remote hosts are allowed to connect to ports forwarded for the client. By default, -.Xr sshd 8 +.Xr sshd 1M binds remote port forwardings to the loopback address. This prevents other remote hosts from connecting to forwarded ports. .Cm GatewayPorts ! @@ -686,7 +686,7 @@ A setting of .Dq yes means that -.Xr sshd 8 +.Xr sshd 1M uses the name supplied by the client rather than attempting to resolve the name from the TCP connection itself. The default is ! @@ -697,7 +697,7 @@ by .Cm HostKey . The default behaviour of -.Xr sshd 8 +.Xr sshd 1M is not to load any certificates. .It Cm HostKey Specifies a file containing a private host key ! @@ -713,12 +713,12 @@ for protocol version 2. + .Pp Note that -.Xr sshd 8 +.Xr sshd 1M ! will refuse to use a file if it is group/world-accessible ! and that the ! .Cm HostKeyAlgorithms ! option restricts which of the keys are actually used by ! -.Xr sshd 8 . ! +.Xr sshd 1M . ! .Pp It is possible to have multiple host key files. .Dq rsa1 ! @@ -779,7 +779,7 @@ .Dq yes . .It Cm IgnoreUserKnownHosts Specifies whether -.Xr sshd 8 +.Xr sshd 1M should ignore the user's .Pa ~/.ssh/known_hosts during ! @@ -914,7 +914,7 @@ The default is 3600 (seconds). .It Cm ListenAddress Specifies the local addresses -.Xr sshd 8 +.Xr sshd 1M should listen on. The following forms may be used: .Pp ! @@ -954,7 +954,7 @@ The default is 120 seconds. .It Cm LogLevel Gives the verbosity level that is used when logging messages from -.Xr sshd 8 . +.Xr sshd 1M . The possible values are: QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2, and DEBUG3. The default is INFO. ! @@ -1059,7 +1059,7 @@ The match patterns may consist of single entries or comma-separated lists and may use the wildcard and negation operators described in the PATTERNS section of -.Xr ssh_config 5 . +.Xr ssh_config 4 . .Pp The patterns in an .Cm Address ! @@ -1148,7 +1148,7 @@ the three colon separated values .Dq start:rate:full (e.g. "10:30:60"). -.Xr sshd 8 +.Xr sshd 1M will refuse connection attempts with a probability of .Dq rate/100 (30%) ! @@ -1268,7 +1268,7 @@ options in .Pa ~/.ssh/authorized_keys are processed by -.Xr sshd 8 . +.Xr sshd 1M . The default is .Dq no . Enabling environment processing may enable users to bypass access ! @@ -1289,7 +1289,7 @@ .Pa /var/run/sshd.pid . .It Cm Port Specifies the port number that -.Xr sshd 8 +.Xr sshd 1M listens on. The default is 22. Multiple options of this type are permitted. ! @@ -1297,7 +1297,7 @@ .Cm ListenAddress . .It Cm PrintLastLog Specifies whether -.Xr sshd 8 +.Xr sshd 1M should print the date and time of the last user login when a user logs in interactively. The default is ! @@ -1304,7 +1304,7 @@ .Dq yes . .It Cm PrintMotd Specifies whether -.Xr sshd 8 +.Xr sshd 1M should print .Pa /etc/motd when a user logs in interactively. ! @@ -1315,7 +1315,7 @@ .Dq yes . .It Cm Protocol Specifies the protocol versions -.Xr sshd 8 +.Xr sshd 1M supports. The possible values are .Sq 1 ! @@ -1440,7 +1440,7 @@ .Dq no . .It Cm StrictModes Specifies whether -.Xr sshd 8 +.Xr sshd 1M should check file modes and ownership of the user's files and home directory before accepting login. This is normally desirable because novices sometimes accidentally leave their ! @@ -1456,7 +1456,7 @@ to execute upon subsystem request. .Pp The command -.Xr sftp-server 8 +.Xr sftp-server 1M implements the .Dq sftp file transfer subsystem. ! @@ -1474,7 +1474,7 @@ Note that this option applies to protocol version 2 only. .It Cm SyslogFacility Gives the facility code that is used when logging messages from -.Xr sshd 8 . +.Xr sshd 1M . The possible values are: DAEMON, USER, AUTH, LOCAL0, LOCAL1, LOCAL2, LOCAL3, LOCAL4, LOCAL5, LOCAL6, LOCAL7. The default is AUTH. ! @@ -1517,7 +1517,7 @@ .Xr ssh-keygen 1 . .It Cm UseDNS Specifies whether -.Xr sshd 8 +.Xr sshd 1M ! should look up the remote host name, and to check that the resolved host name for the remote IP address maps back to the very same IP address. ! @@ -1571,13 +1571,13 @@ If .Cm UsePAM is enabled, you will not be able to run -.Xr sshd 8 +.Xr sshd 1M
*** 1021,1076 **** -.Xr sshd 8 +.Xr sshd 1M separates privileges by creating an unprivileged child process to deal with incoming network traffic. After successful authentication, another process will be created that has ! @@ -1368,7 +1368,7 @@ .Dq none . .It Cm X11DisplayOffset Specifies the first display number available for -.Xr sshd 8 Ns 's +.Xr sshd 1M Ns 's X11 forwarding. This prevents sshd from interfering with real X11 servers. The default is 10. ! @@ -1383,7 +1383,7 @@ .Pp When X11 forwarding is enabled, there may be additional exposure to the server and to client displays if the -.Xr sshd 8 +.Xr sshd 1M proxy display is configured to listen on the wildcard address (see .Cm X11UseLocalhost below), though this is not the default. ! @@ -1394,7 +1394,7 @@ forwarding (see the warnings for .Cm ForwardX11 in -.Xr ssh_config 5 ) . +.Xr ssh_config 4 ) . A system administrator may have a stance in which they want to protect clients that may expose themselves to attack by unwittingly requesting X11 forwarding, which can warrant a ! @@ -1408,7 +1408,7 @@ is enabled. .It Cm X11UseLocalhost Specifies whether -.Xr sshd 8 +.Xr sshd 1M should bind the X11 forwarding server to the loopback address or to the wildcard address. By default, ! @@ -1439,7 +1439,7 @@ .Pa /usr/X11R6/bin/xauth . .El .Sh TIME FORMATS -.Xr sshd 8 +.Xr sshd 1M command-line arguments and configuration file options that specify time may be expressed using a sequence of the form: .Sm off ! @@ -1483,12 +1483,12 @@ .Bl -tag -width Ds .It Pa /etc/ssh/sshd_config Contains configuration data for -.Xr sshd 8 . +.Xr sshd 1M . --- 1187,1242 ---- -.Xr sshd 8 +.Xr sshd 1M separates privileges by creating an unprivileged child process to deal with incoming network traffic. After successful authentication, another process will be created that has ! @@ -1599,7 +1599,7 @@ .Dq none . .It Cm X11DisplayOffset Specifies the first display number available for -.Xr sshd 8 Ns 's +.Xr sshd 1M Ns 's X11 forwarding. This prevents sshd from interfering with real X11 servers. The default is 10. ! @@ -1614,7 +1614,7 @@ .Pp When X11 forwarding is enabled, there may be additional exposure to the server and to client displays if the -.Xr sshd 8 +.Xr sshd 1M proxy display is configured to listen on the wildcard address (see .Cm X11UseLocalhost below), though this is not the default. ! @@ -1625,7 +1625,7 @@ forwarding (see the warnings for .Cm ForwardX11 in -.Xr ssh_config 5 ) . +.Xr ssh_config 4 ) . A system administrator may have a stance in which they want to protect clients that may expose themselves to attack by unwittingly requesting X11 forwarding, which can warrant a ! @@ -1639,7 +1639,7 @@ is enabled. .It Cm X11UseLocalhost Specifies whether -.Xr sshd 8 +.Xr sshd 1M should bind the X11 forwarding server to the loopback address or to the wildcard address. By default, ! @@ -1672,7 +1672,7 @@ .Pa /usr/X11R6/bin/xauth . .El .Sh TIME FORMATS -.Xr sshd 8 +.Xr sshd 1M command-line arguments and configuration file options that specify time may be expressed using a sequence of the form: .Sm off ! @@ -1716,12 +1716,12 @@ .Bl -tag -width Ds .It Pa /etc/ssh/sshd_config Contains configuration data for -.Xr sshd 8 . +.Xr sshd 1M .
*** 1081,1098 **** -.Xr sshd 8 +.Xr sshd 1M .Sh AUTHORS OpenSSH is a derivative of the original and free ssh 1.2.12 release by Tatu Ylonen. - Common subdirectories: openssh-6.7p1-orig/contrib/aix and openssh-6.7p1/contrib/aix - Common subdirectories: openssh-6.7p1-orig/contrib/caldera and openssh-6.7p1/contrib/caldera - Common subdirectories: openssh-6.7p1-orig/contrib/cygwin and openssh-6.7p1/contrib/cygwin - Common subdirectories: openssh-6.7p1-orig/contrib/hpux and openssh-6.7p1/contrib/hpux - Common subdirectories: openssh-6.7p1-orig/contrib/redhat and openssh-6.7p1/contrib/redhat - Common subdirectories: openssh-6.7p1-orig/contrib/solaris and openssh-6.7p1/contrib/solaris - Common subdirectories: openssh-6.7p1-orig/contrib/suse and openssh-6.7p1/contrib/suse - Common subdirectories: openssh-6.7p1-orig/openbsd-compat/regress and openssh-6.7p1/openbsd-compat/regress - Common subdirectories: openssh-6.7p1-orig/regress/unittests and openssh-6.7p1/regress/unittests - Common subdirectories: openssh-6.7p1-orig/regress/unittests/sshbuf and openssh-6.7p1/regress/unittests/sshbuf - Common subdirectories: openssh-6.7p1-orig/regress/unittests/sshkey and openssh-6.7p1/regress/unittests/sshkey - Common subdirectories: openssh-6.7p1-orig/regress/unittests/test_helper and openssh-6.7p1/regress/unittests/test_helper - Common subdirectories: openssh-6.7p1-orig/regress/unittests/sshkey/testdata and openssh-6.7p1/regress/unittests/sshkey/testdata --- 1247,1251 ----