[openssh-commits] [openssh] 01/02: upstream: move HostbasedAcceptedAlgorithms to the right place in
git+noreply at mindrot.org
git+noreply at mindrot.org
Wed Jan 27 11:45:56 AEDT 2021
This is an automated email from the git hooks/post-receive script.
djm pushed a commit to branch master
in repository openssh.
commit 507b448a2465a53ab03a88acbc71cc51b48ca6ac
Author: naddy at openbsd.org <naddy at openbsd.org>
Date: Tue Jan 26 15:40:17 2021 +0000
upstream: move HostbasedAcceptedAlgorithms to the right place in
alphabetical order
OpenBSD-Commit-ID: d766820d33dd874d944c14b0638239adb522c7ec
---
scp.1 | 4 ++--
sftp.1 | 4 ++--
ssh.1 | 4 ++--
ssh_config.5 | 18 +++++++++---------
4 files changed, 15 insertions(+), 15 deletions(-)
diff --git a/scp.1 b/scp.1
index 45cffdac..5471ea31 100644
--- a/scp.1
+++ b/scp.1
@@ -8,7 +8,7 @@
.\"
.\" Created: Sun May 7 00:14:37 1995 ylo
.\"
-.\" $OpenBSD: scp.1,v 1.94 2021/01/26 05:32:21 dtucker Exp $
+.\" $OpenBSD: scp.1,v 1.95 2021/01/26 15:40:17 naddy Exp $
.\"
.Dd $Mdocdate: January 26 2021 $
.Dt SCP 1
@@ -172,8 +172,8 @@ For full details of the options listed below, and their possible values, see
.It GSSAPIDelegateCredentials
.It HashKnownHosts
.It Host
-.It HostbasedAuthentication
.It HostbasedAcceptedAlgorithms
+.It HostbasedAuthentication
.It HostKeyAlgorithms
.It HostKeyAlias
.It Hostname
diff --git a/sftp.1 b/sftp.1
index 6e713e64..052d4d8e 100644
--- a/sftp.1
+++ b/sftp.1
@@ -1,4 +1,4 @@
-.\" $OpenBSD: sftp.1,v 1.135 2021/01/26 05:32:21 dtucker Exp $
+.\" $OpenBSD: sftp.1,v 1.136 2021/01/26 15:40:17 naddy Exp $
.\"
.\" Copyright (c) 2001 Damien Miller. All rights reserved.
.\"
@@ -246,8 +246,8 @@ For full details of the options listed below, and their possible values, see
.It GSSAPIDelegateCredentials
.It HashKnownHosts
.It Host
-.It HostbasedAuthentication
.It HostbasedAcceptedAlgorithms
+.It HostbasedAuthentication
.It HostKeyAlgorithms
.It HostKeyAlias
.It Hostname
diff --git a/ssh.1 b/ssh.1
index a9f67b4b..5884b471 100644
--- a/ssh.1
+++ b/ssh.1
@@ -33,7 +33,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.\" $OpenBSD: ssh.1,v 1.417 2021/01/26 05:32:21 dtucker Exp $
+.\" $OpenBSD: ssh.1,v 1.418 2021/01/26 15:40:17 naddy Exp $
.Dd $Mdocdate: January 26 2021 $
.Dt SSH 1
.Os
@@ -509,8 +509,8 @@ For full details of the options listed below, and their possible values, see
.It GSSAPIDelegateCredentials
.It HashKnownHosts
.It Host
-.It HostbasedAuthentication
.It HostbasedAcceptedAlgorithms
+.It HostbasedAuthentication
.It HostKeyAlgorithms
.It HostKeyAlias
.It Hostname
diff --git a/ssh_config.5 b/ssh_config.5
index d099903f..1a36427d 100644
--- a/ssh_config.5
+++ b/ssh_config.5
@@ -33,7 +33,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.\" $OpenBSD: ssh_config.5,v 1.344 2021/01/26 05:32:22 dtucker Exp $
+.\" $OpenBSD: ssh_config.5,v 1.345 2021/01/26 15:40:17 naddy Exp $
.Dd $Mdocdate: January 26 2021 $
.Dt SSH_CONFIG 5
.Os
@@ -800,14 +800,6 @@ Note that existing names and addresses in known hosts files
will not be converted automatically,
but may be manually hashed using
.Xr ssh-keygen 1 .
-.It Cm HostbasedAuthentication
-Specifies whether to try rhosts based authentication with public key
-authentication.
-The argument must be
-.Cm yes
-or
-.Cm no
-(the default).
.It Cm HostbasedAcceptedAlgorithms
Specifies the key types that will be used for hostbased authentication
as a comma-separated list of patterns.
@@ -847,6 +839,14 @@ option of
.Xr ssh 1
may be used to list supported key types.
This was formerly named HostbasedKeyTypes.
+.It Cm HostbasedAuthentication
+Specifies whether to try rhosts based authentication with public key
+authentication.
+The argument must be
+.Cm yes
+or
+.Cm no
+(the default).
.It Cm HostKeyAlgorithms
Specifies the host key algorithms
that the client wants to use in order of preference.
--
To stop receiving notification emails like this one, please contact
djm at mindrot.org.
More information about the openssh-commits
mailing list