aboutsummaryrefslogtreecommitdiff
path: root/moduli.0
diff options
context:
space:
mode:
authorDag-Erling Smørgrav <des@FreeBSD.org>2008-07-23 09:33:08 +0000
committerDag-Erling Smørgrav <des@FreeBSD.org>2008-07-23 09:33:08 +0000
commit5521539314d87d3432e3c5c0e74954a673a884bd (patch)
tree8f06d9ad2f958f06e579924065ecbaf74dd734f7 /moduli.0
parentd4033b6b6f7aa0e69be09f9613e062e0fb7a9f11 (diff)
downloadsrc-5521539314d87d3432e3c5c0e74954a673a884bd.tar.gz
src-5521539314d87d3432e3c5c0e74954a673a884bd.zip
Vendor import of OpenSSH 5.1p1
Notes
Notes: svn path=/vendor-crypto/openssh/dist/; revision=180750
Diffstat (limited to 'moduli.0')
-rw-r--r--moduli.072
1 files changed, 72 insertions, 0 deletions
diff --git a/moduli.0 b/moduli.0
new file mode 100644
index 000000000000..55a315fab3fc
--- /dev/null
+++ b/moduli.0
@@ -0,0 +1,72 @@
+MODULI(5) OpenBSD Programmer's Manual MODULI(5)
+
+NAME
+ moduli - Diffie Hellman moduli
+
+DESCRIPTION
+ The /etc/moduli file contains prime numbers and generators for use by
+ sshd(8) in the Diffie-Hellman Group Exchange key exchange method.
+
+ New moduli may be generated with ssh-keygen(1) using a two-step process.
+ An initial candidate generation pass, using ssh-keygen -G, calculates
+ numbers that are likely to be useful. A second primality testing pass,
+ using ssh-keygen -T provides a high degree of assurance that the numbers
+ are prime and are safe for use in Diffie Hellman operations by sshd(8).
+ This moduli format is used as the output from each pass.
+
+ The file consists of newline-separated records, one per modulus, contain-
+ ing seven space separated fields. These fields are as follows:
+
+ timestamp The time that the modulus was last processed as YYYYM-
+ MDDHHMMSS.
+
+ type Decimal number specifying the internal structure of
+ the prime modulus. Supported types are:
+
+ 0 Unknown, not tested
+ 2 "Safe" prime; (p-1)/2 is also prime.
+ 4 Sophie Germain; (p+1)*2 is also prime.
+
+ Moduli candidates initially produced by ssh-keygen(1)
+ are Sophie Germain primes (type 4). Futher primality
+ testing with ssh-keygen(1) produces safe prime moduli
+ (type 2) that are ready for use in sshd(8). Other
+ types are not used by OpenSSH.
+
+ tests Decimal number indicating the type of primality tests
+ that the number has been subjected to represented as a
+ bitmask of the following values:
+
+ 0x00 Not tested
+ 0x01 Composite number - not prime.
+ 0x02 Sieve of Eratosthenes
+ 0x04 Probabalistic Miller-Rabin primality tests.
+
+ The ssh-keygen(1) moduli candidate generation uses the
+ Sieve of Eratosthenes (flag 0x02). Subsequent
+ ssh-keygen(1) primality tests are Miller-Rabin tests
+ (flag 0x04).
+
+ trials Decimal number indicating of primaility trials that
+ have been performed on the modulus.
+
+ size Decimal number indicating the size of the prime in
+ bits.
+
+ generator The recommended generator for use with this modulus
+ (hexadecimal).
+
+ modulus The modulus itself in hexadecimal.
+
+ When performing Diffie Hellman Group Exchange, sshd(8) first estimates
+ the size of the modulus required to produce enough Diffie Hellman output
+ to sufficiently key the selected symmetric cipher. sshd(8) then randomly
+ selects a modulus from /etc/moduli that best meets the size requirement.
+
+SEE ALSO
+ ssh-keygen(1), sshd(8),
+
+ Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer
+ Protocol, RFC 4419, 2006.
+
+OpenBSD 4.4 June 26, 2008 2