Commit 208f1ed6 authored by Damien Miller's avatar Damien Miller

- jmc@cvs.openbsd.org 2006/02/24 20:31:31

     [ssh.1 ssh_config.5 sshd.8 sshd_config.5]
     more consistency fixes;
parent 1faa7133
......@@ -166,6 +166,9 @@
- jmc@cvs.openbsd.org 2006/02/24 20:22:16
[ssh-keysign.8 ssh_config.5 sshd_config.5]
some consistency fixes;
- jmc@cvs.openbsd.org 2006/02/24 20:31:31
[ssh.1 ssh_config.5 sshd.8 sshd_config.5]
more consistency fixes;
20060313
- (dtucker) [configure.ac] Bug #1171: Don't use printf("%lld", longlong)
......@@ -4067,4 +4070,4 @@
- (djm) Trim deprecated options from INSTALL. Mention UsePAM
- (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
$Id: ChangeLog,v 1.4186 2006/03/15 00:55:31 djm Exp $
$Id: ChangeLog,v 1.4187 2006/03/15 00:56:03 djm Exp $
......@@ -34,7 +34,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $OpenBSD: ssh.1,v 1.256 2006/02/15 16:53:20 jmc Exp $
.\" $OpenBSD: ssh.1,v 1.257 2006/02/24 20:31:30 jmc Exp $
.Dd September 25, 1999
.Dt SSH 1
.Os
......@@ -569,7 +569,7 @@ Disable pseudo-tty allocation.
Force pseudo-tty allocation.
This can be used to execute arbitrary
screen-based programs on a remote machine, which can be very useful,
e.g., when implementing menu services.
e.g. when implementing menu services.
Multiple
.Fl t
options force tty allocation, even if
......@@ -1178,7 +1178,7 @@ If the current session has no tty,
this variable is not set.
.It Ev TZ
This variable is set to indicate the present time zone if it
was set when the daemon was started (i.e., the daemon passes the value
was set when the daemon was started (i.e. the daemon passes the value
on to new connections).
.It Ev USER
Set to the name of the user logging in.
......
......@@ -34,7 +34,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $OpenBSD: ssh_config.5,v 1.82 2006/02/24 20:22:16 jmc Exp $
.\" $OpenBSD: ssh_config.5,v 1.83 2006/02/24 20:31:31 jmc Exp $
.Dd September 25, 1999
.Dt SSH_CONFIG 5
.Os
......@@ -138,12 +138,12 @@ Restricts the following declarations (up to the next
keyword) to be only for those hosts that match one of the patterns
given after the keyword.
A single
.Ql \&*
.Ql *
as a pattern can be used to provide global
defaults for all hosts.
The host is the
.Ar hostname
argument given on the command line (i.e., the name is not converted to
argument given on the command line (i.e. the name is not converted to
a canonicalized host name before matching).
.Pp
See
......
......@@ -34,7 +34,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $OpenBSD: sshd.8,v 1.229 2006/02/24 10:39:52 jmc Exp $
.\" $OpenBSD: sshd.8,v 1.230 2006/02/24 20:31:31 jmc Exp $
.Dd September 25, 1999
.Dt SSHD 8
.Os
......@@ -81,7 +81,7 @@ configuration file.
.Nm
rereads its configuration file when it receives a hangup signal,
.Dv SIGHUP ,
by executing itself with the name and options it was started with, e.g.,
by executing itself with the name and options it was started with, e.g.\&
.Pa /usr/sbin/sshd .
.Pp
The options are as follows:
......@@ -154,7 +154,7 @@ is normally not run
from inetd because it needs to generate the server key before it can
respond to the client, and this may take tens of seconds.
Clients would have to wait too long if the key was regenerated every time.
However, with small key sizes (e.g., 512) using
However, with small key sizes (e.g. 512) using
.Nm
from inetd may
be feasible.
......@@ -519,7 +519,7 @@ authentication.
.It Cm no-port-forwarding
Forbids TCP forwarding when this key is used for authentication.
Any port forward requests by the client will return an error.
This might be used, e.g., in connection with the
This might be used, e.g. in connection with the
.Cm command
option.
.It Cm no-pty
......
......@@ -34,7 +34,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $OpenBSD: sshd_config.5,v 1.50 2006/02/24 20:22:16 jmc Exp $
.\" $OpenBSD: sshd_config.5,v 1.51 2006/02/24 20:31:31 jmc Exp $
.Dd September 25, 1999
.Dt SSHD_CONFIG 5
.Os
......@@ -72,7 +72,7 @@ in
for how to configure the client.
Note that environment passing is only supported for protocol 2.
Variables are specified by name, which may contain the wildcard characters
.Ql \&*
.Ql *
and
.Ql \&? .
Multiple environment variables may be separated by whitespace or spread
......@@ -456,7 +456,7 @@ The default is 10.
Alternatively, random early drop can be enabled by specifying
the three colon separated values
.Dq start:rate:full
(e.g., "10:30:60").
(e.g. "10:30:60").
.Nm sshd
will refuse connection attempts with a probability of
.Dq rate/100
......@@ -612,7 +612,7 @@ directory or files world-writable.
The default is
.Dq yes .
.It Cm Subsystem
Configures an external subsystem (e.g., file transfer daemon).
Configures an external subsystem (e.g. file transfer daemon).
Arguments should be a subsystem name and a command to execute upon subsystem
request.
The command
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment