- deraadt@cvs.openbsd.org 2001/07/27 17:26:16
[scp.c]
shorten lines
+ - markus@cvs.openbsd.org 2001/07/28 09:21:15
+ [sshd.8]
+ cleanup some RSA vs DSA vs SSH1 vs SSH2 notes
20010803
- (djm) Fix interrupted read in entropy gatherer. Spotted by markus@ on
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.\" $OpenBSD: sshd.8,v 1.137 2001/07/26 17:18:22 stevesk Exp $
+.\" $OpenBSD: sshd.8,v 1.138 2001/07/28 09:21:15 markus Exp $
.Dd September 25, 1999
.Dt SSHD 8
.Os
.Ss SSH protocol version 2
.Pp
Version 2 works similarly:
-Each host has a host-specific DSA key used to identify the host.
+Each host has a host-specific key (RSA or DSA) used to identify the host.
However, when the daemon starts, it does not generate a server key.
Forward security is provided through a Diffie-Hellman key agreement.
This key agreement results in a shared session key.
users from particular hosts.
.Pp
.It Cm AuthorizedKeysFile
-Specifies the file that contains the public RSA keys that can be used
-for RSA authentication in protocol version 1.
+Specifies the file that contains the public keys that can be used
+for user authentication.
.Cm AuthorizedKeysFile
may contain tokens of the form %T which are substituted during connection
set-up. The following tokens are defined; %% is replaces by a literal '%',