summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/sshd.8 (follow)
Commit message (Expand)AuthorAgeFilesLines
* fix incorrect plural; from Ville Skyttä via GHPR#181djm2021-04-031-3/+3
* support for requiring user verified FIDO keys in sshddjm2020-08-271-2/+9
* mention that permitopen=/PermitOpen do no name to addressdjm2020-01-251-4/+4
* Replace the term "security key" with "(FIDO) authenticator".naddy2019-12-211-3/+3
* "Forward security" -> "Forward secrecy" since that's the correct term.dtucker2019-12-191-4/+4
* cut obsolete lists of crypto algorithms from outline of how SSH worksnaddy2019-12-171-7/+4
* tweak the Nd lines for a bit of consistency;jmc2019-11-301-3/+3
* add a "no-touch-required" option for authorized_keys and a similardjm2019-11-251-2/+11
* mention ed25519-sk key/cert types here too; prompted by jmc@djm2019-11-181-2/+5
* Fill in missing man page bits for U2F security key support:naddy2019-11-071-13/+24
* Switch authorized_keys example from ssh-dss to ssh-rsa since the formerdtucker2018-07-221-5/+5
* spelling;jmc2018-06-191-2/+2
* allow bare port numbers to appear in PermitListen directives, e.g.djm2018-06-191-4/+15
* tweak previous;jmc2018-06-071-4/+4
* man bits for permitlisten authorized_keys optiondjm2018-06-061-3/+20
* sort expiry-time;jmc2018-03-141-5/+5
* rename recently-added "valid-before" key restriction to "expiry-time"djm2018-03-141-3/+3
* add valid-before="[time]" authorized_keys option. A simple way ofdjm2018-03-121-2/+6
* Update RSA minimum modulus size to 1024. sshkey.h rev 1.18 bumpeddtucker2018-03-031-3/+3
* stop loading DSA keys by default, remove sshd_config stanza and manpagedjm2018-02-161-5/+2
* I accidentially a worddjm2018-02-051-2/+3
* When doing a config test with sshd -T, only require the attributesdtucker2017-11-031-11/+12
* add a "rdomain" criteria for the sshd_config Match keyword to allowdjm2017-10-251-2/+3
* word fix;jmc2017-06-241-2/+2
* use HostKeyAlias if specified instead of hostname for matching hostdjm2017-06-241-5/+19
* As promised in last release announcement: remove support fordjm2017-05-071-3/+3
* Small correction to the known_hosts section on when it is updated.dtucker2017-01-301-3/+3
* When a forced-command appears in both a certificate and andjm2016-11-301-5/+13
* remove UseLogin option and support for having /bin/login managedjm2016-08-191-5/+2
* Catch up with the SSH1 code removal and delete all mention ofnaddy2016-08-151-85/+23
* since these pages now clearly tell folks to avoid v1, normalisejmc2016-02-171-9/+7
* mention internal DH-GEX fallback groups; bz#2302djm2016-02-051-3/+6
* Add a new authorized_keys option "restrict" that includes all currentdjm2015-11-161-2/+34
* more clarity on what AuthorizedKeysFile=none does;djm2015-09-111-3/+3
* refuse to generate or accept RSA keys smaller than 1024 bits;djm2015-07-031-10/+7
* mention that the user's shell from /etc/passwd is used for commandsdjm2015-05-011-2/+4
* Reduce instances of `` '' in manuals.bentley2014-11-151-6/+6
* improve capitalization for the Ed25519 public-key signature system.sobrado2014-08-301-4/+4
* Add a sshd_config PermitUserRC option to control whether ~/.ssh/rc isdjm2014-07-031-3/+6
* remove some really old rsh referencestedu2014-04-191-17/+3
* remove libwrap support. ok deraadt djm mfriedltedu2014-03-261-9/+2
* add missing mentions of ed25519; ok djm@naddy2013-12-071-6/+10
* missing comma;jmc2013-12-061-2/+2
* support ed25519 keys (hostkeys and user identities) using the public domainmarkus2013-12-061-2/+3
* do not use Sx for sections outwith the man page - ingo informs me thatjmc2013-06-271-5/+3
* clarify -e text. suggested by & ok jmc@dtucker2013-04-071-4/+2
* Add -E option to ssh and sshd to append debugging logs to a specified filedtucker2013-04-071-2/+7
* add umac128 variant; ok djm@ at n2k12markus2012-10-041-3/+3
* Remove mention of 'three' key files since there are now four. Fromdtucker2012-06-181-4/+4
* Add "Match LocalAddress" and "Match LocalPort" to sshd and adjust testsdtucker2012-05-131-2/+4