Update the section on SSH to include a blurb on OpenSSH. Also update some

other references to ssh to make them reflect reality a little better.

Submitted by:	green
This commit is contained in:
John Baldwin 1999-12-08 05:31:55 +00:00
parent b6a38c6071
commit 1fcca0967c
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=6128
2 changed files with 48 additions and 28 deletions

View file

@ -103,7 +103,7 @@
encrypted. All traffic is encrypted by default with &man.ssh.1;.
With utilities like &man.ssh-agent.1; and &man.scp.1; also
available, &man.ssh.1; is also far more convenient. If you do
not know anything about &man.ssh.1, please see
not know anything about &man.ssh.1;, please see
<xref linkend="ssh.guide">.</para>
</sect1>
@ -389,17 +389,24 @@
<procedure>
<step>
<para>Update and install the ssh port in
<filename>/usr/ports/security/ssh</filename> (should be
version 1.2.25 or later).</para>
<para>Update and install one of the SSH ports. In general,
you will probably want to get OpenSSH from the port in
<filename>/usr/ports/security/openssh</filename>. You
may also wish to check out the original ssh1 in
<filename>/usr/ports/security/ssh</filename>, but make
certain you pay attention to its license. Note that both
of these ports cannot be installed at the same time.</para>
</step>
<step>
<para>Make sure that you run &man.ssh-agent.1; before running
other applications. X users, for example, usually do this
from their <filename>.xsession</filename> or
<filename>.xinitrc</filename> file. See &man.ssh-agent.1;
for details.</para>
<para>If you do not wish to to type your password in every time
you use &man.ssh.1;, and you use RSA keys to authenticate,
&man.ssh-agent.1; is there for your convenience. If
you want to use &man.ssh-agent.1;, make sure that you run it
before running other applications. X users, for example,
usually do this from their <filename>.xsession</filename> or
<filename>.xinitrc</filename> file.
See &man.ssh-agent.1; for details.</para>
</step>
<step>
@ -410,8 +417,9 @@
</step>
<step>
<para>Copy your public key
<para>Send your public key
(<filename><envar>$HOME</envar>/.ssh/identity.pub</filename>)
to the person setting you up as a committer so it can be put
into your <filename>authorized_keys</filename> file in your
home directory on <hostid>freefall</hostid>
(i.e.
@ -423,15 +431,17 @@
<para>Now you should be able to use &man.ssh-add.1; for
authentication once per session. This will prompt you for
your private key's pass phrase, and then store it in your
authentication agent (&man.ssh-agent.1;) so that you won't
have to retype it over and over.</para>
authentication agent (&man.ssh-agent.1;). If you no longer
wish to have your key stored in the agent, issuing
<command>ssh-add -d</command> will remove it.</para>
<para>Test by doing something such as <command>ssh
freefall.FreeBSD.org ls /usr</command>.</para>
<para>For more information, see
<filename>/usr/ports/security/ssh</filename>, &man.ssh.1;,
&man.ssh-agent.1;, &man.scp.1;, and &man.ssh-keygen.1;.</para>
<filename>/usr/ports/security/openssh</filename>, &man.ssh.1;,
&man.ssh-add.1;, &man.ssh-agent.1;, &man.ssh-keygen.1;, and
&man.scp.1;.</para>
</sect1>
<sect1>