2021-04-19 15:17:19 +00:00
|
|
|
diff -up openssh-8.6p1/ssh_config.5.crypto-policies openssh-8.6p1/ssh_config.5
|
|
|
|
--- openssh-8.6p1/ssh_config.5.crypto-policies 2021-04-19 15:18:32.071920379 +0200
|
|
|
|
+++ openssh-8.6p1/ssh_config.5 2021-04-19 15:21:18.400179265 +0200
|
|
|
|
@@ -368,15 +368,13 @@ or
|
2020-03-26 13:53:18 +00:00
|
|
|
.Qq *.c.example.com
|
|
|
|
domains.
|
2020-02-17 10:57:13 +00:00
|
|
|
.It Cm CASignatureAlgorithms
|
2020-03-26 13:53:18 +00:00
|
|
|
+The default is handled system-wide by
|
|
|
|
+.Xr crypto-policies 7 .
|
|
|
|
+To see the defaults and how to modify this default, see manual page
|
|
|
|
+.Xr update-crypto-policies 8 .
|
|
|
|
+.Pp
|
2020-02-17 10:57:13 +00:00
|
|
|
Specifies which algorithms are allowed for signing of certificates
|
|
|
|
by certificate authorities (CAs).
|
|
|
|
-The default is:
|
|
|
|
-.Bd -literal -offset indent
|
2021-04-19 15:17:19 +00:00
|
|
|
-ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
|
|
|
|
-sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,
|
|
|
|
-rsa-sha2-512,rsa-sha2-256
|
2020-02-17 10:57:13 +00:00
|
|
|
-.Ed
|
|
|
|
-.Pp
|
|
|
|
.Xr ssh 1
|
|
|
|
will not accept host certificates signed using algorithms other than those
|
|
|
|
specified.
|
2021-04-19 15:17:19 +00:00
|
|
|
@@ -436,20 +434,25 @@ If the option is set to
|
2021-02-23 23:22:49 +00:00
|
|
|
(the default),
|
2020-03-26 13:53:18 +00:00
|
|
|
the check will not be executed.
|
|
|
|
.It Cm Ciphers
|
2020-02-17 10:57:13 +00:00
|
|
|
+The default is handled system-wide by
|
|
|
|
+.Xr crypto-policies 7 .
|
|
|
|
+To see the defaults and how to modify this default, see manual page
|
|
|
|
+.Xr update-crypto-policies 8 .
|
|
|
|
+.Pp
|
2020-03-26 13:53:18 +00:00
|
|
|
Specifies the ciphers allowed and their order of preference.
|
|
|
|
Multiple ciphers must be comma-separated.
|
|
|
|
If the specified list begins with a
|
|
|
|
.Sq +
|
|
|
|
-character, then the specified ciphers will be appended to the default set
|
2020-09-22 13:55:35 +00:00
|
|
|
-instead of replacing them.
|
|
|
|
+character, then the specified ciphers will be appended to the built-in
|
|
|
|
+openssh default set instead of replacing them.
|
2020-03-26 13:53:18 +00:00
|
|
|
If the specified list begins with a
|
|
|
|
.Sq -
|
|
|
|
character, then the specified ciphers (including wildcards) will be removed
|
|
|
|
-from the default set instead of replacing them.
|
2020-09-22 13:55:35 +00:00
|
|
|
+from the built-in openssh default set instead of replacing them.
|
2020-03-26 13:53:18 +00:00
|
|
|
If the specified list begins with a
|
|
|
|
.Sq ^
|
|
|
|
character, then the specified ciphers will be placed at the head of the
|
|
|
|
-default set.
|
2020-09-22 13:55:35 +00:00
|
|
|
+built-in openssh default set.
|
2020-03-26 13:53:18 +00:00
|
|
|
.Pp
|
|
|
|
The supported ciphers are:
|
|
|
|
.Bd -literal -offset indent
|
2021-04-19 15:17:19 +00:00
|
|
|
@@ -465,13 +468,6 @@ aes256-gcm@openssh.com
|
2019-05-13 12:22:21 +00:00
|
|
|
chacha20-poly1305@openssh.com
|
|
|
|
.Ed
|
|
|
|
.Pp
|
|
|
|
-The default is:
|
|
|
|
-.Bd -literal -offset indent
|
|
|
|
-chacha20-poly1305@openssh.com,
|
|
|
|
-aes128-ctr,aes192-ctr,aes256-ctr,
|
|
|
|
-aes128-gcm@openssh.com,aes256-gcm@openssh.com
|
|
|
|
-.Ed
|
2020-03-26 13:53:18 +00:00
|
|
|
-.Pp
|
|
|
|
The list of available ciphers may also be obtained using
|
|
|
|
.Qq ssh -Q cipher .
|
|
|
|
.It Cm ClearAllForwardings
|
2021-04-19 15:17:19 +00:00
|
|
|
@@ -826,6 +822,11 @@ command line will be passed untouched to
|
2020-03-26 13:53:18 +00:00
|
|
|
The default is
|
|
|
|
.Dq no .
|
|
|
|
.It Cm GSSAPIKexAlgorithms
|
2019-05-13 12:22:21 +00:00
|
|
|
+The default is handled system-wide by
|
|
|
|
+.Xr crypto-policies 7 .
|
2019-06-19 13:56:25 +00:00
|
|
|
+To see the defaults and how to modify this default, see manual page
|
2019-05-13 12:22:21 +00:00
|
|
|
+.Xr update-crypto-policies 8 .
|
2020-03-26 13:53:18 +00:00
|
|
|
+.Pp
|
|
|
|
The list of key exchange algorithms that are offered for GSSAPI
|
|
|
|
key exchange. Possible values are
|
|
|
|
.Bd -literal -offset 3n
|
2021-04-19 15:17:19 +00:00
|
|
|
@@ -838,10 +839,8 @@ gss-nistp256-sha256-,
|
2019-05-13 12:22:21 +00:00
|
|
|
gss-curve25519-sha256-
|
|
|
|
.Ed
|
|
|
|
.Pp
|
|
|
|
-The default is
|
2020-03-24 08:32:00 +00:00
|
|
|
-.Dq gss-group14-sha256-,gss-group16-sha512-,gss-nistp256-sha256-,
|
|
|
|
-gss-curve25519-sha256-,gss-group14-sha1-,gss-gex-sha1- .
|
2020-03-26 13:53:18 +00:00
|
|
|
This option only applies to connections using GSSAPI.
|
|
|
|
+.Pp
|
|
|
|
.It Cm HashKnownHosts
|
|
|
|
Indicates that
|
|
|
|
.Xr ssh 1
|
2021-04-19 15:17:19 +00:00
|
|
|
@@ -1169,29 +1168,25 @@ it may be zero or more of:
|
2020-03-26 13:53:18 +00:00
|
|
|
and
|
|
|
|
.Cm pam .
|
|
|
|
.It Cm KexAlgorithms
|
2019-05-13 12:22:21 +00:00
|
|
|
+The default is handled system-wide by
|
|
|
|
+.Xr crypto-policies 7 .
|
2019-06-19 13:56:25 +00:00
|
|
|
+To see the defaults and how to modify this default, see manual page
|
2019-05-13 12:22:21 +00:00
|
|
|
+.Xr update-crypto-policies 8 .
|
2020-03-26 13:53:18 +00:00
|
|
|
+.Pp
|
|
|
|
Specifies the available KEX (Key Exchange) algorithms.
|
|
|
|
Multiple algorithms must be comma-separated.
|
|
|
|
If the specified list begins with a
|
|
|
|
.Sq +
|
|
|
|
-character, then the specified methods will be appended to the default set
|
2020-09-22 13:55:35 +00:00
|
|
|
-instead of replacing them.
|
|
|
|
+character, then the specified methods will be appended to the built-in
|
|
|
|
+openssh default set instead of replacing them.
|
2020-03-26 13:53:18 +00:00
|
|
|
If the specified list begins with a
|
|
|
|
.Sq -
|
|
|
|
character, then the specified methods (including wildcards) will be removed
|
|
|
|
-from the default set instead of replacing them.
|
2020-09-22 13:55:35 +00:00
|
|
|
+from the built-in openssh default set instead of replacing them.
|
2020-03-26 13:53:18 +00:00
|
|
|
If the specified list begins with a
|
2019-10-09 08:24:21 +00:00
|
|
|
.Sq ^
|
|
|
|
character, then the specified methods will be placed at the head of the
|
2020-03-26 13:53:18 +00:00
|
|
|
-default set.
|
2019-05-13 12:22:21 +00:00
|
|
|
-The default is:
|
|
|
|
-.Bd -literal -offset indent
|
|
|
|
-curve25519-sha256,curve25519-sha256@libssh.org,
|
|
|
|
-ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,
|
|
|
|
-diffie-hellman-group-exchange-sha256,
|
|
|
|
-diffie-hellman-group16-sha512,
|
|
|
|
-diffie-hellman-group18-sha512,
|
2020-02-17 10:57:13 +00:00
|
|
|
-diffie-hellman-group14-sha256
|
2019-05-13 12:22:21 +00:00
|
|
|
-.Ed
|
2020-09-22 13:55:35 +00:00
|
|
|
+built-in openssh default set.
|
2020-03-26 13:53:18 +00:00
|
|
|
.Pp
|
|
|
|
The list of available key exchange algorithms may also be obtained using
|
|
|
|
.Qq ssh -Q kex .
|
2021-04-19 15:17:19 +00:00
|
|
|
@@ -1301,37 +1296,33 @@ function, and all code in the
|
2021-02-23 23:22:49 +00:00
|
|
|
file.
|
|
|
|
This option is intended for debugging and no overrides are enabled by default.
|
2020-03-26 13:53:18 +00:00
|
|
|
.It Cm MACs
|
2019-05-13 12:22:21 +00:00
|
|
|
+The default is handled system-wide by
|
|
|
|
+.Xr crypto-policies 7 .
|
2019-06-19 13:56:25 +00:00
|
|
|
+To see the defaults and how to modify this default, see manual page
|
2019-05-13 12:22:21 +00:00
|
|
|
+.Xr update-crypto-policies 8 .
|
2020-03-26 13:53:18 +00:00
|
|
|
+.Pp
|
|
|
|
Specifies the MAC (message authentication code) algorithms
|
|
|
|
in order of preference.
|
|
|
|
The MAC algorithm is used for data integrity protection.
|
|
|
|
Multiple algorithms must be comma-separated.
|
|
|
|
If the specified list begins with a
|
|
|
|
.Sq +
|
|
|
|
-character, then the specified algorithms will be appended to the default set
|
2020-09-22 13:55:35 +00:00
|
|
|
-instead of replacing them.
|
|
|
|
+character, then the specified algorithms will be appended to the built-in
|
|
|
|
+openssh default set instead of replacing them.
|
2020-03-26 13:53:18 +00:00
|
|
|
If the specified list begins with a
|
|
|
|
.Sq -
|
|
|
|
character, then the specified algorithms (including wildcards) will be removed
|
|
|
|
-from the default set instead of replacing them.
|
2020-09-22 13:55:35 +00:00
|
|
|
+from the built-in openssh default set instead of replacing them.
|
2020-03-26 13:53:18 +00:00
|
|
|
If the specified list begins with a
|
|
|
|
.Sq ^
|
|
|
|
character, then the specified algorithms will be placed at the head of the
|
|
|
|
-default set.
|
2020-09-22 13:55:35 +00:00
|
|
|
+built-in openssh default set.
|
2019-05-13 12:22:21 +00:00
|
|
|
.Pp
|
2020-03-26 13:53:18 +00:00
|
|
|
The algorithms that contain
|
|
|
|
.Qq -etm
|
2019-05-13 12:22:21 +00:00
|
|
|
calculate the MAC after encryption (encrypt-then-mac).
|
|
|
|
These are considered safer and their use recommended.
|
|
|
|
.Pp
|
|
|
|
-The default is:
|
|
|
|
-.Bd -literal -offset indent
|
|
|
|
-umac-64-etm@openssh.com,umac-128-etm@openssh.com,
|
|
|
|
-hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,
|
|
|
|
-hmac-sha1-etm@openssh.com,
|
|
|
|
-umac-64@openssh.com,umac-128@openssh.com,
|
|
|
|
-hmac-sha2-256,hmac-sha2-512,hmac-sha1
|
|
|
|
-.Ed
|
2020-03-26 13:53:18 +00:00
|
|
|
-.Pp
|
|
|
|
The list of available MAC algorithms may also be obtained using
|
|
|
|
.Qq ssh -Q mac .
|
|
|
|
.It Cm NoHostAuthenticationForLocalhost
|
2021-04-19 15:17:19 +00:00
|
|
|
@@ -1503,37 +1494,25 @@ instead of continuing to execute and pas
|
2020-03-26 13:53:18 +00:00
|
|
|
The default is
|
|
|
|
.Cm no .
|
2021-02-23 23:22:49 +00:00
|
|
|
.It Cm PubkeyAcceptedAlgorithms
|
2019-05-13 12:22:21 +00:00
|
|
|
+The default is handled system-wide by
|
|
|
|
+.Xr crypto-policies 7 .
|
2019-06-19 13:56:25 +00:00
|
|
|
+To see the defaults and how to modify this default, see manual page
|
2019-05-13 12:22:21 +00:00
|
|
|
+.Xr update-crypto-policies 8 .
|
2020-03-26 13:53:18 +00:00
|
|
|
+.Pp
|
2021-02-23 23:22:49 +00:00
|
|
|
Specifies the signature algorithms that will be used for public key
|
|
|
|
authentication as a comma-separated list of patterns.
|
2020-03-26 13:53:18 +00:00
|
|
|
If the specified list begins with a
|
|
|
|
.Sq +
|
2021-02-23 23:22:49 +00:00
|
|
|
-character, then the algorithms after it will be appended to the default
|
2020-09-22 13:55:35 +00:00
|
|
|
-instead of replacing it.
|
2021-02-23 23:22:49 +00:00
|
|
|
+character, then the algorithms after it will be appended to the built-in
|
2020-09-22 13:55:35 +00:00
|
|
|
+openssh default instead of replacing it.
|
2020-03-26 13:53:18 +00:00
|
|
|
If the specified list begins with a
|
|
|
|
.Sq -
|
2021-02-23 23:22:49 +00:00
|
|
|
character, then the specified algorithms (including wildcards) will be removed
|
2020-03-26 13:53:18 +00:00
|
|
|
-from the default set instead of replacing them.
|
2020-09-22 13:55:35 +00:00
|
|
|
+from the built-in openssh default set instead of replacing them.
|
2020-03-26 13:53:18 +00:00
|
|
|
If the specified list begins with a
|
2019-10-09 08:24:21 +00:00
|
|
|
.Sq ^
|
2021-02-23 23:22:49 +00:00
|
|
|
character, then the specified algorithms will be placed at the head of the
|
2020-03-26 13:53:18 +00:00
|
|
|
-default set.
|
2019-05-13 12:22:21 +00:00
|
|
|
-The default for this option is:
|
|
|
|
-.Bd -literal -offset 3n
|
2021-02-23 23:22:49 +00:00
|
|
|
-ssh-ed25519-cert-v01@openssh.com,
|
2019-05-13 12:22:21 +00:00
|
|
|
-ecdsa-sha2-nistp256-cert-v01@openssh.com,
|
|
|
|
-ecdsa-sha2-nistp384-cert-v01@openssh.com,
|
|
|
|
-ecdsa-sha2-nistp521-cert-v01@openssh.com,
|
2020-02-17 10:57:13 +00:00
|
|
|
-sk-ssh-ed25519-cert-v01@openssh.com,
|
2021-02-23 23:22:49 +00:00
|
|
|
-sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
|
2020-02-17 10:57:13 +00:00
|
|
|
-rsa-sha2-512-cert-v01@openssh.com,
|
|
|
|
-rsa-sha2-256-cert-v01@openssh.com,
|
2019-05-13 12:22:21 +00:00
|
|
|
-ssh-rsa-cert-v01@openssh.com,
|
2021-02-23 23:22:49 +00:00
|
|
|
-ssh-ed25519,
|
2019-05-13 12:22:21 +00:00
|
|
|
-ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
|
2021-02-23 23:22:49 +00:00
|
|
|
-sk-ssh-ed25519@openssh.com,
|
2020-02-17 10:57:13 +00:00
|
|
|
-sk-ecdsa-sha2-nistp256@openssh.com,
|
|
|
|
-rsa-sha2-512,rsa-sha2-256,ssh-rsa
|
2019-05-13 12:22:21 +00:00
|
|
|
-.Ed
|
2020-09-22 13:55:35 +00:00
|
|
|
+built-in openssh default set.
|
2019-05-13 12:22:21 +00:00
|
|
|
.Pp
|
2021-02-23 23:22:49 +00:00
|
|
|
The list of available signature algorithms may also be obtained using
|
|
|
|
.Qq ssh -Q PubkeyAcceptedAlgorithms .
|
2021-04-19 15:17:19 +00:00
|
|
|
diff -up openssh-8.6p1/sshd_config.5.crypto-policies openssh-8.6p1/sshd_config.5
|
|
|
|
--- openssh-8.6p1/sshd_config.5.crypto-policies 2021-04-19 15:18:32.062920311 +0200
|
|
|
|
+++ openssh-8.6p1/sshd_config.5 2021-04-19 15:20:42.591908243 +0200
|
|
|
|
@@ -373,15 +373,13 @@ If the argument is
|
2020-03-26 13:53:18 +00:00
|
|
|
then no banner is displayed.
|
|
|
|
By default, no banner is displayed.
|
2020-02-17 10:57:13 +00:00
|
|
|
.It Cm CASignatureAlgorithms
|
2020-03-26 13:53:18 +00:00
|
|
|
+The default is handled system-wide by
|
|
|
|
+.Xr crypto-policies 7 .
|
|
|
|
+To see the defaults and how to modify this default, see manual page
|
|
|
|
+.Xr update-crypto-policies 8 .
|
|
|
|
+.Pp
|
2020-02-17 10:57:13 +00:00
|
|
|
Specifies which algorithms are allowed for signing of certificates
|
|
|
|
by certificate authorities (CAs).
|
|
|
|
-The default is:
|
|
|
|
-.Bd -literal -offset indent
|
2021-04-19 15:17:19 +00:00
|
|
|
-ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
|
|
|
|
-sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,
|
|
|
|
-rsa-sha2-512,rsa-sha2-256
|
2020-02-17 10:57:13 +00:00
|
|
|
-.Ed
|
|
|
|
-.Pp
|
|
|
|
Certificates signed using other algorithms will not be accepted for
|
|
|
|
public key or host-based authentication.
|
2020-03-26 13:53:18 +00:00
|
|
|
.It Cm ChallengeResponseAuthentication
|
2021-04-19 15:17:19 +00:00
|
|
|
@@ -445,20 +443,25 @@ The default is
|
2020-03-26 13:53:18 +00:00
|
|
|
indicating not to
|
|
|
|
.Xr chroot 2 .
|
|
|
|
.It Cm Ciphers
|
2020-02-17 10:57:13 +00:00
|
|
|
+The default is handled system-wide by
|
|
|
|
+.Xr crypto-policies 7 .
|
|
|
|
+To see the defaults and how to modify this default, see manual page
|
|
|
|
+.Xr update-crypto-policies 8 .
|
|
|
|
+.Pp
|
2020-03-26 13:53:18 +00:00
|
|
|
Specifies the ciphers allowed.
|
|
|
|
Multiple ciphers must be comma-separated.
|
|
|
|
If the specified list begins with a
|
|
|
|
.Sq +
|
|
|
|
-character, then the specified ciphers will be appended to the default set
|
2020-09-22 13:55:35 +00:00
|
|
|
-instead of replacing them.
|
|
|
|
+character, then the specified ciphers will be appended to the built-in
|
|
|
|
+openssh default set instead of replacing them.
|
2020-03-26 13:53:18 +00:00
|
|
|
If the specified list begins with a
|
|
|
|
.Sq -
|
|
|
|
character, then the specified ciphers (including wildcards) will be removed
|
|
|
|
-from the default set instead of replacing them.
|
2020-09-22 13:55:35 +00:00
|
|
|
+from the built-in openssh default set instead of replacing them.
|
2020-03-26 13:53:18 +00:00
|
|
|
If the specified list begins with a
|
|
|
|
.Sq ^
|
|
|
|
character, then the specified ciphers will be placed at the head of the
|
|
|
|
-default set.
|
2020-09-22 13:55:35 +00:00
|
|
|
+built-in openssh default set.
|
2020-03-26 13:53:18 +00:00
|
|
|
.Pp
|
|
|
|
The supported ciphers are:
|
|
|
|
.Pp
|
2021-04-19 15:17:19 +00:00
|
|
|
@@ -485,13 +488,6 @@ aes256-gcm@openssh.com
|
2019-05-13 12:22:21 +00:00
|
|
|
chacha20-poly1305@openssh.com
|
|
|
|
.El
|
|
|
|
.Pp
|
|
|
|
-The default is:
|
|
|
|
-.Bd -literal -offset indent
|
|
|
|
-chacha20-poly1305@openssh.com,
|
|
|
|
-aes128-ctr,aes192-ctr,aes256-ctr,
|
|
|
|
-aes128-gcm@openssh.com,aes256-gcm@openssh.com
|
|
|
|
-.Ed
|
2020-03-26 13:53:18 +00:00
|
|
|
-.Pp
|
|
|
|
The list of available ciphers may also be obtained using
|
|
|
|
.Qq ssh -Q cipher .
|
|
|
|
.It Cm ClientAliveCountMax
|
2021-04-19 15:17:19 +00:00
|
|
|
@@ -680,21 +676,22 @@ For this to work
|
2020-03-26 13:53:18 +00:00
|
|
|
.Cm GSSAPIKeyExchange
|
|
|
|
needs to be enabled in the server and also used by the client.
|
|
|
|
.It Cm GSSAPIKexAlgorithms
|
2019-05-13 12:22:21 +00:00
|
|
|
+The default is handled system-wide by
|
|
|
|
+.Xr crypto-policies 7 .
|
2019-06-19 13:56:25 +00:00
|
|
|
+To see the defaults and how to modify this default, see manual page
|
2019-05-13 12:22:21 +00:00
|
|
|
+.Xr update-crypto-policies 8 .
|
2020-03-26 13:53:18 +00:00
|
|
|
+.Pp
|
|
|
|
The list of key exchange algorithms that are accepted by GSSAPI
|
|
|
|
key exchange. Possible values are
|
|
|
|
.Bd -literal -offset 3n
|
|
|
|
-gss-gex-sha1-,
|
|
|
|
-gss-group1-sha1-,
|
|
|
|
-gss-group14-sha1-,
|
|
|
|
-gss-group14-sha256-,
|
|
|
|
-gss-group16-sha512-,
|
|
|
|
-gss-nistp256-sha256-,
|
|
|
|
+gss-gex-sha1-
|
|
|
|
+gss-group1-sha1-
|
|
|
|
+gss-group14-sha1-
|
|
|
|
+gss-group14-sha256-
|
|
|
|
+gss-group16-sha512-
|
|
|
|
+gss-nistp256-sha256-
|
2019-05-13 12:22:21 +00:00
|
|
|
gss-curve25519-sha256-
|
|
|
|
.Ed
|
2020-03-26 13:53:18 +00:00
|
|
|
-.Pp
|
2019-05-13 12:22:21 +00:00
|
|
|
-The default is
|
2020-03-24 08:32:00 +00:00
|
|
|
-.Dq gss-group14-sha256-,gss-group16-sha512-,gss-nistp256-sha256-,
|
|
|
|
-gss-curve25519-sha256-,gss-group14-sha1-,gss-gex-sha1- .
|
|
|
|
This option only applies to connections using GSSAPI.
|
2021-02-23 23:22:49 +00:00
|
|
|
.It Cm HostbasedAcceptedAlgorithms
|
|
|
|
Specifies the signature algorithms that will be accepted for hostbased
|
2021-04-19 15:17:19 +00:00
|
|
|
@@ -794,26 +791,13 @@ is specified, the location of the socket
|
2020-03-26 13:53:18 +00:00
|
|
|
.Ev SSH_AUTH_SOCK
|
|
|
|
environment variable.
|
2019-05-13 12:22:21 +00:00
|
|
|
.It Cm HostKeyAlgorithms
|
2020-03-26 13:53:18 +00:00
|
|
|
+The default is handled system-wide by
|
|
|
|
+.Xr crypto-policies 7 .
|
|
|
|
+To see the defaults and how to modify this default, see manual page
|
|
|
|
+.Xr update-crypto-policies 8 .
|
|
|
|
+.Pp
|
2021-02-23 23:22:49 +00:00
|
|
|
Specifies the host key signature algorithms
|
2019-05-13 12:22:21 +00:00
|
|
|
that the server offers.
|
|
|
|
-The default for this option is:
|
|
|
|
-.Bd -literal -offset 3n
|
2021-02-23 23:22:49 +00:00
|
|
|
-ssh-ed25519-cert-v01@openssh.com,
|
2019-05-13 12:22:21 +00:00
|
|
|
-ecdsa-sha2-nistp256-cert-v01@openssh.com,
|
|
|
|
-ecdsa-sha2-nistp384-cert-v01@openssh.com,
|
|
|
|
-ecdsa-sha2-nistp521-cert-v01@openssh.com,
|
2020-02-17 10:57:13 +00:00
|
|
|
-sk-ssh-ed25519-cert-v01@openssh.com,
|
2021-02-23 23:22:49 +00:00
|
|
|
-sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
|
2020-02-17 10:57:13 +00:00
|
|
|
-rsa-sha2-512-cert-v01@openssh.com,
|
|
|
|
-rsa-sha2-256-cert-v01@openssh.com,
|
2019-05-13 12:22:21 +00:00
|
|
|
-ssh-rsa-cert-v01@openssh.com,
|
2021-02-23 23:22:49 +00:00
|
|
|
-ssh-ed25519,
|
2019-05-13 12:22:21 +00:00
|
|
|
-ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
|
2021-02-23 23:22:49 +00:00
|
|
|
-sk-ssh-ed25519@openssh.com,
|
2020-02-17 10:57:13 +00:00
|
|
|
-sk-ecdsa-sha2-nistp256@openssh.com,
|
|
|
|
-rsa-sha2-512,rsa-sha2-256,ssh-rsa
|
2019-05-13 12:22:21 +00:00
|
|
|
-.Ed
|
2020-03-26 13:53:18 +00:00
|
|
|
-.Pp
|
2021-02-23 23:22:49 +00:00
|
|
|
The list of available signature algorithms may also be obtained using
|
2020-03-26 13:53:18 +00:00
|
|
|
.Qq ssh -Q HostKeyAlgorithms .
|
|
|
|
.It Cm IgnoreRhosts
|
2021-04-19 15:17:19 +00:00
|
|
|
@@ -958,20 +942,25 @@ Specifies whether to look at .k5login fi
|
2020-03-26 13:53:18 +00:00
|
|
|
The default is
|
|
|
|
.Cm yes .
|
|
|
|
.It Cm KexAlgorithms
|
2019-05-13 12:22:21 +00:00
|
|
|
+The default is handled system-wide by
|
|
|
|
+.Xr crypto-policies 7 .
|
2019-06-19 13:56:25 +00:00
|
|
|
+To see the defaults and how to modify this default, see manual page
|
2019-05-13 12:22:21 +00:00
|
|
|
+.Xr update-crypto-policies 8 .
|
2020-03-26 13:53:18 +00:00
|
|
|
+.Pp
|
|
|
|
Specifies the available KEX (Key Exchange) algorithms.
|
|
|
|
Multiple algorithms must be comma-separated.
|
|
|
|
Alternately if the specified list begins with a
|
|
|
|
.Sq +
|
|
|
|
-character, then the specified methods will be appended to the default set
|
2020-09-22 13:55:35 +00:00
|
|
|
-instead of replacing them.
|
|
|
|
+character, then the specified methods will be appended to the built-in
|
|
|
|
+openssh default set instead of replacing them.
|
2020-03-26 13:53:18 +00:00
|
|
|
If the specified list begins with a
|
|
|
|
.Sq -
|
|
|
|
character, then the specified methods (including wildcards) will be removed
|
|
|
|
-from the default set instead of replacing them.
|
2020-09-22 13:55:35 +00:00
|
|
|
+from the built-in openssh default set instead of replacing them.
|
2020-03-26 13:53:18 +00:00
|
|
|
If the specified list begins with a
|
|
|
|
.Sq ^
|
|
|
|
character, then the specified methods will be placed at the head of the
|
|
|
|
-default set.
|
2020-09-22 13:55:35 +00:00
|
|
|
+built-in openssh default set.
|
2020-03-26 13:53:18 +00:00
|
|
|
The supported algorithms are:
|
2019-05-13 12:22:21 +00:00
|
|
|
.Pp
|
2020-03-26 13:53:18 +00:00
|
|
|
.Bl -item -compact -offset indent
|
2021-04-19 15:17:19 +00:00
|
|
|
@@ -1003,15 +992,6 @@ ecdh-sha2-nistp521
|
2021-02-23 23:22:49 +00:00
|
|
|
sntrup761x25519-sha512@openssh.com
|
2019-05-13 12:22:21 +00:00
|
|
|
.El
|
|
|
|
.Pp
|
|
|
|
-The default is:
|
|
|
|
-.Bd -literal -offset indent
|
|
|
|
-curve25519-sha256,curve25519-sha256@libssh.org,
|
|
|
|
-ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,
|
|
|
|
-diffie-hellman-group-exchange-sha256,
|
|
|
|
-diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,
|
2020-02-17 10:57:13 +00:00
|
|
|
-diffie-hellman-group14-sha256
|
2019-05-13 12:22:21 +00:00
|
|
|
-.Ed
|
2020-03-26 13:53:18 +00:00
|
|
|
-.Pp
|
|
|
|
The list of available key exchange algorithms may also be obtained using
|
|
|
|
.Qq ssh -Q KexAlgorithms .
|
|
|
|
.It Cm ListenAddress
|
2021-04-19 15:17:19 +00:00
|
|
|
@@ -1097,21 +1077,26 @@ function, and all code in the
|
2021-02-23 23:22:49 +00:00
|
|
|
file.
|
|
|
|
This option is intended for debugging and no overrides are enabled by default.
|
2020-03-26 13:53:18 +00:00
|
|
|
.It Cm MACs
|
2019-05-13 12:22:21 +00:00
|
|
|
+The default is handled system-wide by
|
|
|
|
+.Xr crypto-policies 7 .
|
2019-06-19 13:56:25 +00:00
|
|
|
+To see the defaults and how to modify this default, see manual page
|
2019-05-13 12:22:21 +00:00
|
|
|
+.Xr update-crypto-policies 8 .
|
2020-03-26 13:53:18 +00:00
|
|
|
+.Pp
|
|
|
|
Specifies the available MAC (message authentication code) algorithms.
|
|
|
|
The MAC algorithm is used for data integrity protection.
|
|
|
|
Multiple algorithms must be comma-separated.
|
|
|
|
If the specified list begins with a
|
|
|
|
.Sq +
|
|
|
|
-character, then the specified algorithms will be appended to the default set
|
2020-09-22 13:55:35 +00:00
|
|
|
-instead of replacing them.
|
|
|
|
+character, then the specified algorithms will be appended to the built-in
|
|
|
|
+openssh default set instead of replacing them.
|
2020-03-26 13:53:18 +00:00
|
|
|
If the specified list begins with a
|
|
|
|
.Sq -
|
|
|
|
character, then the specified algorithms (including wildcards) will be removed
|
|
|
|
-from the default set instead of replacing them.
|
2020-09-22 13:55:35 +00:00
|
|
|
+from the built-in openssh default set instead of replacing them.
|
2020-03-26 13:53:18 +00:00
|
|
|
If the specified list begins with a
|
|
|
|
.Sq ^
|
|
|
|
character, then the specified algorithms will be placed at the head of the
|
|
|
|
-default set.
|
2020-09-22 13:55:35 +00:00
|
|
|
+built-in openssh default set.
|
2019-05-13 12:22:21 +00:00
|
|
|
.Pp
|
2020-03-26 13:53:18 +00:00
|
|
|
The algorithms that contain
|
|
|
|
.Qq -etm
|
2021-04-19 15:17:19 +00:00
|
|
|
@@ -1154,15 +1139,6 @@ umac-64-etm@openssh.com
|
2019-05-13 12:22:21 +00:00
|
|
|
umac-128-etm@openssh.com
|
|
|
|
.El
|
|
|
|
.Pp
|
|
|
|
-The default is:
|
|
|
|
-.Bd -literal -offset indent
|
|
|
|
-umac-64-etm@openssh.com,umac-128-etm@openssh.com,
|
|
|
|
-hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,
|
|
|
|
-hmac-sha1-etm@openssh.com,
|
|
|
|
-umac-64@openssh.com,umac-128@openssh.com,
|
|
|
|
-hmac-sha2-256,hmac-sha2-512,hmac-sha1
|
|
|
|
-.Ed
|
2020-03-26 13:53:18 +00:00
|
|
|
-.Pp
|
|
|
|
The list of available MAC algorithms may also be obtained using
|
|
|
|
.Qq ssh -Q mac .
|
|
|
|
.It Cm Match
|
2021-04-19 15:17:19 +00:00
|
|
|
@@ -1541,37 +1517,25 @@ or equivalent.)
|
2020-03-26 13:53:18 +00:00
|
|
|
The default is
|
|
|
|
.Cm yes .
|
2021-02-23 23:22:49 +00:00
|
|
|
.It Cm PubkeyAcceptedAlgorithms
|
2019-05-13 12:22:21 +00:00
|
|
|
+The default is handled system-wide by
|
|
|
|
+.Xr crypto-policies 7 .
|
2019-06-19 13:56:25 +00:00
|
|
|
+To see the defaults and how to modify this default, see manual page
|
2019-05-13 12:22:21 +00:00
|
|
|
+.Xr update-crypto-policies 8 .
|
2020-03-26 13:53:18 +00:00
|
|
|
+.Pp
|
2021-02-23 23:22:49 +00:00
|
|
|
Specifies the signature algorithms that will be accepted for public key
|
|
|
|
authentication as a list of comma-separated patterns.
|
2020-03-26 13:53:18 +00:00
|
|
|
Alternately if the specified list begins with a
|
|
|
|
.Sq +
|
2021-02-23 23:22:49 +00:00
|
|
|
-character, then the specified algorithms will be appended to the default set
|
2020-09-22 13:55:35 +00:00
|
|
|
-instead of replacing them.
|
2021-02-23 23:22:49 +00:00
|
|
|
+character, then the specified algorithms will be appended to the built-in
|
2020-09-22 13:55:35 +00:00
|
|
|
+openssh default set instead of replacing them.
|
2020-03-26 13:53:18 +00:00
|
|
|
If the specified list begins with a
|
|
|
|
.Sq -
|
2021-02-23 23:22:49 +00:00
|
|
|
character, then the specified algorithms (including wildcards) will be removed
|
2020-03-26 13:53:18 +00:00
|
|
|
-from the default set instead of replacing them.
|
2020-09-22 13:55:35 +00:00
|
|
|
+from the built-in openssh default set instead of replacing them.
|
2020-03-26 13:53:18 +00:00
|
|
|
If the specified list begins with a
|
2019-10-09 08:24:21 +00:00
|
|
|
.Sq ^
|
2021-02-23 23:22:49 +00:00
|
|
|
character, then the specified algorithms will be placed at the head of the
|
2020-03-26 13:53:18 +00:00
|
|
|
-default set.
|
2019-05-13 12:22:21 +00:00
|
|
|
-The default for this option is:
|
|
|
|
-.Bd -literal -offset 3n
|
2021-02-23 23:22:49 +00:00
|
|
|
-ssh-ed25519-cert-v01@openssh.com,
|
2019-05-13 12:22:21 +00:00
|
|
|
-ecdsa-sha2-nistp256-cert-v01@openssh.com,
|
|
|
|
-ecdsa-sha2-nistp384-cert-v01@openssh.com,
|
|
|
|
-ecdsa-sha2-nistp521-cert-v01@openssh.com,
|
2020-02-17 10:57:13 +00:00
|
|
|
-sk-ssh-ed25519-cert-v01@openssh.com,
|
2021-02-23 23:22:49 +00:00
|
|
|
-sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
|
2020-02-17 10:57:13 +00:00
|
|
|
-rsa-sha2-512-cert-v01@openssh.com,
|
|
|
|
-rsa-sha2-256-cert-v01@openssh.com,
|
2019-05-13 12:22:21 +00:00
|
|
|
-ssh-rsa-cert-v01@openssh.com,
|
2021-02-23 23:22:49 +00:00
|
|
|
-ssh-ed25519,
|
2019-05-13 12:22:21 +00:00
|
|
|
-ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
|
2021-02-23 23:22:49 +00:00
|
|
|
-sk-ssh-ed25519@openssh.com,
|
2020-02-17 10:57:13 +00:00
|
|
|
-sk-ecdsa-sha2-nistp256@openssh.com,
|
|
|
|
-rsa-sha2-512,rsa-sha2-256,ssh-rsa
|
2019-05-13 12:22:21 +00:00
|
|
|
-.Ed
|
2020-09-22 13:55:35 +00:00
|
|
|
+built-in openssh default set.
|
2019-05-13 12:22:21 +00:00
|
|
|
.Pp
|
2021-02-23 23:22:49 +00:00
|
|
|
The list of available signature algorithms may also be obtained using
|
|
|
|
.Qq ssh -Q PubkeyAcceptedAlgorithms .
|