mirror of git://anongit.mindrot.org/openssh.git
- jmc@cvs.openbsd.org 2005/12/20 22:02:50
[ssh.1] .Ss -> .Sh: subsections have not made this page more readable
This commit is contained in:
parent
c93a813802
commit
52d2061ab0
|
@ -6,6 +6,9 @@
|
||||||
authentication;
|
authentication;
|
||||||
feedback djm dtucker
|
feedback djm dtucker
|
||||||
ok deraadt markus dtucker
|
ok deraadt markus dtucker
|
||||||
|
- jmc@cvs.openbsd.org 2005/12/20 22:02:50
|
||||||
|
[ssh.1]
|
||||||
|
.Ss -> .Sh: subsections have not made this page more readable
|
||||||
|
|
||||||
20051220
|
20051220
|
||||||
- (dtucker) OpenBSD CVS Sync
|
- (dtucker) OpenBSD CVS Sync
|
||||||
|
@ -3508,4 +3511,4 @@
|
||||||
- (djm) Trim deprecated options from INSTALL. Mention UsePAM
|
- (djm) Trim deprecated options from INSTALL. Mention UsePAM
|
||||||
- (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
|
- (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
|
||||||
|
|
||||||
$Id: ChangeLog,v 1.4040 2005/12/24 03:52:13 djm Exp $
|
$Id: ChangeLog,v 1.4041 2005/12/24 03:52:36 djm Exp $
|
||||||
|
|
10
ssh.1
10
ssh.1
|
@ -34,7 +34,7 @@
|
||||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.\" $OpenBSD: ssh.1,v 1.222 2005/12/20 21:59:43 jmc Exp $
|
.\" $OpenBSD: ssh.1,v 1.223 2005/12/20 22:02:50 jmc Exp $
|
||||||
.Dd September 25, 1999
|
.Dd September 25, 1999
|
||||||
.Dt SSH 1
|
.Dt SSH 1
|
||||||
.Os
|
.Os
|
||||||
|
@ -759,7 +759,7 @@ prompts the user for a password.
|
||||||
The password is sent to the remote
|
The password is sent to the remote
|
||||||
host for checking; however, since all communications are encrypted,
|
host for checking; however, since all communications are encrypted,
|
||||||
the password cannot be seen by someone listening on the network.
|
the password cannot be seen by someone listening on the network.
|
||||||
.Ss Login session and remote execution
|
.Sh LOGIN SESSION AND REMOTE EXECUTION
|
||||||
When the user's identity has been accepted by the server, the server
|
When the user's identity has been accepted by the server, the server
|
||||||
either executes the given command, or logs into the machine and gives
|
either executes the given command, or logs into the machine and gives
|
||||||
the user a normal shell on the remote machine.
|
the user a normal shell on the remote machine.
|
||||||
|
@ -785,7 +785,7 @@ may additionally obtain configuration data from
|
||||||
a per-user configuration file and a system-wide configuration file.
|
a per-user configuration file and a system-wide configuration file.
|
||||||
The file format and configuration options are described in
|
The file format and configuration options are described in
|
||||||
.Xr ssh_config 5 .
|
.Xr ssh_config 5 .
|
||||||
.Ss Escape Characters
|
.Sh ESCAPE CHARACTERS
|
||||||
When a pseudo-terminal has been requested,
|
When a pseudo-terminal has been requested,
|
||||||
.Nm
|
.Nm
|
||||||
supports a number of functions through the use of an escape character.
|
supports a number of functions through the use of an escape character.
|
||||||
|
@ -843,7 +843,7 @@ option.
|
||||||
Request rekeying of the connection
|
Request rekeying of the connection
|
||||||
(only useful for SSH protocol version 2 and if the peer supports it).
|
(only useful for SSH protocol version 2 and if the peer supports it).
|
||||||
.El
|
.El
|
||||||
.Ss X11 and TCP forwarding
|
.Sh X11 AND TCP FORWARDING
|
||||||
If the
|
If the
|
||||||
.Cm ForwardX11
|
.Cm ForwardX11
|
||||||
variable is set to
|
variable is set to
|
||||||
|
@ -902,7 +902,7 @@ Forwarding of arbitrary TCP/IP connections over the secure channel can
|
||||||
be specified either on the command line or in a configuration file.
|
be specified either on the command line or in a configuration file.
|
||||||
One possible application of TCP/IP forwarding is a secure connection to an
|
One possible application of TCP/IP forwarding is a secure connection to an
|
||||||
electronic purse; another is going through firewalls.
|
electronic purse; another is going through firewalls.
|
||||||
.Ss Server authentication
|
.Sh SERVER AUTHENTICATION
|
||||||
.Nm
|
.Nm
|
||||||
automatically maintains and checks a database containing
|
automatically maintains and checks a database containing
|
||||||
identifications for all hosts it has ever been used with.
|
identifications for all hosts it has ever been used with.
|
||||||
|
|
Loading…
Reference in New Issue