diff options
author | Ed Maste <emaste@FreeBSD.org> | 2022-10-19 14:27:11 +0000 |
---|---|---|
committer | Ed Maste <emaste@FreeBSD.org> | 2022-10-26 16:42:37 +0000 |
commit | 75f9d5c7e36b452f4f76356dfeb8bba51d64e51b (patch) | |
tree | 0cafe92e53ebd2fbe0861af7e2c063a6bcc88138 /crypto/openssh/ssh-keyscan.1 | |
parent | c3af4c1ee8791f4e1bddd4df648c8d5cfdc62b2e (diff) |
ssh: update to OpenSSH 9.1p1
Release notes are available at https://www.openssh.com/txt/release-9.1
9.1 contains fixes for three minor memory safety problems; these have
lready been merged to the copy of OpenSSH 9.0 that is in the FreeBSD base
system.
Some highlights copied from the release notes:
Potentially-incompatible changes
--------------------------------
* ssh(1), sshd(8): SetEnv directives in ssh_config and sshd_config
are now first-match-wins to match other directives. Previously
if an environment variable was multiply specified the last set
value would have been used. bz3438
* ssh-keygen(8): ssh-keygen -A (generate all default host key types)
will no longer generate DSA keys, as these are insecure and have
not been used by default for some years.
New features
------------
* ssh(1), sshd(8): add a RequiredRSASize directive to set a minimum
RSA key length. Keys below this length will be ignored for user
authentication and for host authentication in sshd(8).
* sftp-server(8): add a "users-groups-by-id@openssh.com" extension
request that allows the client to obtain user/group names that
correspond to a set of uids/gids.
* sftp(1): use "users-groups-by-id@openssh.com" sftp-server
extension (when available) to fill in user/group names for
directory listings.
* sftp-server(8): support the "home-directory" extension request
defined in draft-ietf-secsh-filexfer-extensions-00. This overlaps
a bit with the existing "expand-path@openssh.com", but some other
clients support it.
* ssh-keygen(1), sshd(8): allow certificate validity intervals,
sshsig verification times and authorized_keys expiry-time options
to accept dates in the UTC time zone in addition to the default
of interpreting them in the system time zone. YYYYMMDD and
YYMMDDHHMM[SS] dates/times will be interpreted as UTC if suffixed
with a 'Z' character.
Also allow certificate validity intervals to be specified in raw
seconds-since-epoch as hex value, e.g. -V 0x1234:0x4567890. This
is intended for use by regress tests and other tools that call
ssh-keygen as part of a CA workflow. bz3468
* sftp(1): allow arguments to the sftp -D option, e.g. sftp -D
"/usr/libexec/sftp-server -el debug3"
* ssh-keygen(1): allow the existing -U (use agent) flag to work
with "-Y sign" operations, where it will be interpreted to require
that the private keys is hosted in an agent; bz3429
MFC after: 2 weeks
Relnotes: Yes
Sponsored by: The FreeBSD Foundation
(cherry picked from commit 38a52bd3b5cac3da6f7f6eef3dd050e6aa08ebb3)
Diffstat (limited to 'crypto/openssh/ssh-keyscan.1')
-rw-r--r-- | crypto/openssh/ssh-keyscan.1 | 10 |
1 files changed, 7 insertions, 3 deletions
diff --git a/crypto/openssh/ssh-keyscan.1 b/crypto/openssh/ssh-keyscan.1 index f9df75d42f1a..4eb0bea09168 100644 --- a/crypto/openssh/ssh-keyscan.1 +++ b/crypto/openssh/ssh-keyscan.1 @@ -1,4 +1,4 @@ -.\" $OpenBSD: ssh-keyscan.1,v 1.45 2019/11/30 07:07:59 jmc Exp $ +.\" $OpenBSD: ssh-keyscan.1,v 1.46 2022/06/03 04:00:15 dtucker Exp $ .\" .\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. .\" @@ -6,7 +6,7 @@ .\" permitted provided that due credit is given to the author and the .\" OpenBSD project by leaving this copyright notice intact. .\" -.Dd $Mdocdate: November 30 2019 $ +.Dd $Mdocdate: June 3 2022 $ .Dt SSH-KEYSCAN 1 .Os .Sh NAME @@ -103,14 +103,18 @@ The possible values are .Dq dsa , .Dq ecdsa , .Dq ed25519 , +.Dq ecdsa-sk , +.Dq ed25519-sk , or .Dq rsa . Multiple values may be specified by separating them with commas. The default is to fetch .Dq rsa , .Dq ecdsa , +.Dq ed25519 , +.Dq ecdsa-sk , and -.Dq ed25519 +.Dq ed25519-sk keys. .It Fl v Verbose mode: |