[sshd.8]
move subsections to full sections;
move the options description up the page, and a few additional tweaks
whilst in here;
ok markus
move the options description up the page, and a few additional tweaks
whilst in here;
ok markus
+ - jmc@cvs.openbsd.org 2006/01/25 09:07:22
+ [sshd.8]
+ move subsections to full sections;
20060129
- (dtucker) [configure.ac opensshd.init.in] Bug #1144: Use /bin/sh for the
20060129
- (dtucker) [configure.ac opensshd.init.in] Bug #1144: Use /bin/sh for the
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.\" $OpenBSD: sshd.8,v 1.212 2006/01/25 09:04:34 jmc Exp $
+.\" $OpenBSD: sshd.8,v 1.213 2006/01/25 09:07:22 jmc Exp $
.Dd September 25, 1999
.Dt SSHD 8
.Os
.Dd September 25, 1999
.Dt SSHD 8
.Os
supports both SSH protocol version 1 and 2 simultaneously.
.Nm
works as follows:
supports both SSH protocol version 1 and 2 simultaneously.
.Nm
works as follows:
-.Ss SSH protocol version 1
+.Sh SSH PROTOCOL VERSION 1
Each host has a host-specific RSA key
(normally 2048 bits) used to identify the host.
Additionally, when
Each host has a host-specific RSA key
(normally 2048 bits) used to identify the host.
Additionally, when
and
.Xr rsh
into the machine).
and
.Xr rsh
into the machine).
-.Ss SSH protocol version 2
+.Sh SSH PROTOCOL VERSION 2
Version 2 works similarly:
Each host has a host-specific key (RSA or DSA) used to identify the host.
However, when the daemon starts, it does not generate a server key.
Version 2 works similarly:
Each host has a host-specific key (RSA or DSA) used to identify the host.
However, when the daemon starts, it does not generate a server key.
user (PubkeyAuthentication) or
client host (HostbasedAuthentication) authentication method,
conventional password authentication and challenge response based methods.
user (PubkeyAuthentication) or
client host (HostbasedAuthentication) authentication method,
conventional password authentication and challenge response based methods.
-.Ss Command execution and data forwarding
+.Sh COMMAND EXECUTION AND DATA FORWARDING
If the client successfully authenticates itself, a dialog for
preparing the session is entered.
At this time the client may request
If the client successfully authenticates itself, a dialog for
preparing the session is entered.
At this time the client may request