From owner-freebsd-doc@FreeBSD.ORG Tue Dec 28 21:40:19 2004 Return-Path: Delivered-To: freebsd-doc@hub.freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 53CE716A4CE for ; Tue, 28 Dec 2004 21:40:19 +0000 (GMT) Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id 2784043D53 for ; Tue, 28 Dec 2004 21:40:19 +0000 (GMT) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.13.1/8.13.1) with ESMTP id iBSLeJxS010419 for ; Tue, 28 Dec 2004 21:40:19 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.13.1/8.13.1/Submit) id iBSLeJjQ010418; Tue, 28 Dec 2004 21:40:19 GMT (envelope-from gnats) Resent-Date: Tue, 28 Dec 2004 21:40:19 GMT Resent-Message-Id: <200412282140.iBSLeJjQ010418@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-doc@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Joel Dahl Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 6986B16A4CE for ; Tue, 28 Dec 2004 21:33:04 +0000 (GMT) Received: from av12-2-sn2.hy.skanova.net (av12-2-sn2.hy.skanova.net [81.228.8.186]) by mx1.FreeBSD.org (Postfix) with ESMTP id B3EAB43D4C for ; Tue, 28 Dec 2004 21:33:03 +0000 (GMT) (envelope-from joel@automatvapen.se) Received: by av12-2-sn2.hy.skanova.net (Postfix, from userid 502) id 8463037E6C; Tue, 28 Dec 2004 22:33:02 +0100 (CET) Received: from smtp4-1-sn2.hy.skanova.net (smtp4-1-sn2.hy.skanova.net [81.228.8.92]) by av12-2-sn2.hy.skanova.net (Postfix) with ESMTP id 6316B3820D for ; Tue, 28 Dec 2004 22:33:02 +0100 (CET) Received: from dude.automatvapen.se (t6o955p86.telia.com [212.181.189.206]) by smtp4-1-sn2.hy.skanova.net (Postfix) with SMTP id 79B2837E43 for ; Tue, 28 Dec 2004 22:33:01 +0100 (CET) Received: by dude.automatvapen.se (sSMTP sendmail emulation); Tue, 28 Dec 2004 22:33:18 +0100 Message-Id: <20041228213301.79B2837E43@smtp4-1-sn2.hy.skanova.net> Date: Tue, 28 Dec 2004 22:33:18 +0100 From: "Joel Dahl" To: FreeBSD-gnats-submit@FreeBSD.org X-Send-Pr-Version: 3.113 Subject: docs/75584: [patch] Handbook, chapter 14.11, SSH v1 is disabled by default X-BeenThere: freebsd-doc@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list Reply-To: Joel Dahl List-Id: Documentation project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 28 Dec 2004 21:40:19 -0000 >Number: 75584 >Category: docs >Synopsis: [patch] Handbook, chapter 14.11, SSH v1 is disabled by default >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-doc >State: open >Quarter: >Keywords: >Date-Required: >Class: doc-bug >Submitter-Id: current-users >Arrival-Date: Tue Dec 28 21:40:18 GMT 2004 >Closed-Date: >Last-Modified: >Originator: Joel Dahl >Release: FreeBSD 5.3-STABLE i386 >Organization: >Environment: System: FreeBSD dude.automatvapen.se 5.3-STABLE FreeBSD 5.3-STABLE #1: Sat Nov 13 19:50:36 CET 2004 joel@dude.automatvapen.se:/usr/obj/usr/src/sys/WRK i386 >Description: SSH protocol version 1 is disabled by default on OpenSSH servers. Suggested patch attached. >How-To-Repeat: >Fix: --- ssh_v1xv2 begins here --- Index: chapter.sgml =================================================================== RCS file: /home/ncvs/doc/en_US.ISO8859-1/books/handbook/security/chapter.sgml,v retrieving revision 1.251 diff -u -r1.251 chapter.sgml --- chapter.sgml 7 Dec 2004 22:40:52 -0000 1.251 +++ chapter.sgml 28 Dec 2004 19:41:55 -0000 @@ -4189,9 +4189,9 @@ ~/.ssh/known_hosts2 for SSH v2 fingerprints. - By default, OpenSSH servers are configured to accept both - SSH v1 and SSH v2 connections. The client, however, can choose - between the two. Version 2 is known to be more robust and + By default, OpenSSH servers are configured to only accept + SSH v2 connections. The client, however, can choose + between version 1 and 2. Version 2 is known to be more robust and secure than its predecessor. The &man.ssh.1; command can be forced to use either protocol --- ssh_v1xv2 ends here --- >Release-Note: >Audit-Trail: >Unformatted: