Dag-Erling Smørgrav c89ea4d72b Revert a local change that sets the default for UsePrivilegeSeparation to
"sandbox" instead of "yes".  In sandbox mode, the privsep child is unable
to load additional libraries and will therefore crash when trying to take
advantage of crypto offloading on CPUs that support it.
2013-05-29 00:19:58 +00:00
..
2011-10-05 22:08:17 +00:00
2012-09-03 16:51:41 +00:00
2011-05-04 07:34:44 +00:00
2011-05-04 07:34:44 +00:00
2012-09-03 16:51:41 +00:00
2011-10-05 22:08:17 +00:00
2011-05-04 07:34:44 +00:00
2011-05-04 07:34:44 +00:00
2010-11-11 11:46:19 +00:00
2009-10-01 17:12:52 +00:00
2010-11-11 11:46:19 +00:00
2009-10-01 17:12:52 +00:00
2008-08-01 02:48:36 +00:00
2012-09-03 16:51:41 +00:00
2010-11-11 11:46:19 +00:00
2012-09-03 16:51:41 +00:00
2010-03-09 19:16:43 +00:00
2010-03-09 19:16:43 +00:00
2008-08-01 02:48:36 +00:00
2009-10-01 17:12:52 +00:00
2008-07-22 19:01:18 +00:00
2011-10-05 22:08:17 +00:00
2011-10-05 22:08:17 +00:00
2010-03-09 19:16:43 +00:00
2011-10-05 22:08:17 +00:00
2011-05-04 07:34:44 +00:00
2008-08-01 02:48:36 +00:00
2011-05-04 07:34:44 +00:00
2011-05-04 07:34:44 +00:00
2009-10-01 17:12:52 +00:00
2012-09-03 16:51:41 +00:00
2011-05-04 07:34:44 +00:00
2011-05-04 07:34:44 +00:00
2008-07-22 19:01:18 +00:00
2011-05-04 07:34:44 +00:00
2008-07-22 19:01:18 +00:00
2011-10-05 22:08:17 +00:00
2008-07-22 19:01:18 +00:00
2008-07-22 19:01:18 +00:00
2008-07-22 19:01:18 +00:00
2008-07-22 19:01:18 +00:00
2008-07-22 19:01:18 +00:00
2012-09-03 16:51:41 +00:00
2008-08-01 02:48:36 +00:00
2009-05-22 18:46:28 +00:00
2008-07-22 19:01:18 +00:00
2012-09-03 16:51:41 +00:00
2012-09-03 16:51:41 +00:00
2012-09-03 16:51:41 +00:00
2012-09-03 16:51:41 +00:00
2008-07-22 19:01:18 +00:00
2008-07-22 19:01:18 +00:00
2008-07-22 19:01:18 +00:00
2008-08-01 02:48:36 +00:00
2008-08-01 02:48:36 +00:00
2009-10-01 17:12:52 +00:00
2008-07-22 19:01:18 +00:00
2011-10-05 22:08:17 +00:00
2011-05-04 07:34:44 +00:00
2011-05-04 07:34:44 +00:00
2012-09-03 16:51:41 +00:00
2009-10-01 17:12:52 +00:00
2008-07-22 19:01:18 +00:00
2011-05-04 07:34:44 +00:00
2011-05-04 07:34:44 +00:00
2011-05-04 07:34:44 +00:00
2011-05-04 07:34:44 +00:00
2011-05-04 07:34:44 +00:00
2008-07-22 19:01:18 +00:00
2011-05-04 07:34:44 +00:00
2011-05-04 07:34:44 +00:00
2012-09-03 16:51:41 +00:00
2011-05-04 07:34:44 +00:00
2010-04-28 10:36:33 +00:00
2008-08-01 02:48:36 +00:00
2008-08-01 02:48:36 +00:00
2010-03-09 19:16:43 +00:00
2008-07-22 19:01:18 +00:00
2008-07-22 19:01:18 +00:00
2008-07-22 19:01:18 +00:00
2012-09-03 16:51:41 +00:00
2011-10-05 22:08:17 +00:00
2008-07-22 19:01:18 +00:00
2012-09-03 16:51:41 +00:00
2010-03-09 19:16:43 +00:00
2008-08-01 02:48:36 +00:00
2009-10-01 17:12:52 +00:00
2008-08-01 02:48:36 +00:00
2011-10-05 22:08:17 +00:00
2008-07-22 19:01:18 +00:00
2008-07-22 19:01:18 +00:00
2010-03-09 19:16:43 +00:00
2008-07-22 19:01:18 +00:00
2012-09-03 16:51:41 +00:00
2011-10-05 22:08:17 +00:00
2010-03-09 19:16:43 +00:00
2008-07-22 19:01:18 +00:00
2008-07-22 19:01:18 +00:00
2012-09-03 16:51:41 +00:00
2012-09-03 16:51:41 +00:00
2008-07-22 19:01:18 +00:00
2009-10-01 17:12:52 +00:00
2008-07-22 19:01:18 +00:00
2008-07-22 19:01:18 +00:00
2011-05-04 07:34:44 +00:00
2008-07-22 19:01:18 +00:00
2008-07-22 19:01:18 +00:00
2012-09-03 16:51:41 +00:00
2012-09-03 16:51:41 +00:00
2009-10-01 17:12:52 +00:00
2010-03-09 19:16:43 +00:00
2012-09-03 16:51:41 +00:00
2008-07-22 19:01:18 +00:00
2008-07-22 19:01:18 +00:00
2011-10-05 22:08:17 +00:00
2011-10-05 22:08:17 +00:00
2012-09-03 16:51:41 +00:00
2012-09-03 16:51:41 +00:00
2011-05-04 07:34:44 +00:00
2009-10-01 17:12:52 +00:00
2008-07-22 19:01:18 +00:00
2008-08-01 02:48:36 +00:00
2012-09-03 16:51:41 +00:00
2011-05-04 07:34:44 +00:00
2010-03-09 19:16:43 +00:00
2010-03-09 19:16:43 +00:00
2012-09-03 16:51:41 +00:00
2009-05-22 18:46:28 +00:00
2008-08-01 02:48:36 +00:00
2008-07-22 19:01:18 +00:00
2011-05-04 07:34:44 +00:00
2011-05-04 07:34:44 +00:00
2012-09-03 16:51:41 +00:00
2012-06-25 19:01:04 +00:00
2011-05-04 07:34:44 +00:00
2011-10-05 22:08:17 +00:00
2012-09-03 16:51:41 +00:00
2012-09-03 16:51:41 +00:00
2011-10-05 22:08:17 +00:00
2010-03-09 19:16:43 +00:00
2011-05-04 07:34:44 +00:00
2011-10-05 22:08:17 +00:00
2010-11-11 11:46:19 +00:00
2008-07-22 19:01:18 +00:00
2011-05-04 07:34:44 +00:00
2011-05-04 07:34:44 +00:00
2008-07-22 19:01:18 +00:00
2009-05-22 18:46:28 +00:00
2010-03-09 19:16:43 +00:00
2010-03-09 19:16:43 +00:00
2008-07-22 19:01:18 +00:00
2009-05-22 18:46:28 +00:00
2008-07-22 19:01:18 +00:00
2008-07-22 19:01:18 +00:00
2011-05-04 07:34:44 +00:00
2011-05-04 07:34:44 +00:00
2008-07-22 19:01:18 +00:00
2008-07-22 19:01:18 +00:00

See http://www.openssh.com/txt/release-6.2p2 for the release notes.

- A Japanese translation of this document and of the OpenSSH FAQ is
- available at http://www.unixuser.org/~haruyama/security/openssh/index.html
- Thanks to HARUYAMA Seigo <haruyama@unixuser.org>

This is the port of OpenBSD's excellent OpenSSH[0] to Linux and other
Unices.

OpenSSH is based on the last free version of Tatu Ylonen's sample
implementation with all patent-encumbered algorithms removed (to
external libraries), all known security bugs fixed, new features
reintroduced and many other clean-ups.  OpenSSH has been created by
Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo de Raadt,
and Dug Song. It has a homepage at http://www.openssh.com/

This port consists of the re-introduction of autoconf support, PAM
support, EGD[1]/PRNGD[2] support and replacements for OpenBSD library
functions that are (regrettably) absent from other unices. This port
has been best tested on AIX, Cygwin, HP-UX, Linux, MacOS/X,
NetBSD, OpenBSD, OpenServer, Solaris, Unicos, and UnixWare.

This version actively tracks changes in the OpenBSD CVS repository.

The PAM support is now more functional than the popular packages of
commercial ssh-1.2.x. It checks "account" and "session" modules for
all logins, not just when using password authentication.

OpenSSH depends on Zlib[3], OpenSSL[4] and optionally PAM[5].

There is now several mailing lists for this port of OpenSSH. Please
refer to http://www.openssh.com/list.html for details on how to join.

Please send bug reports and patches to the mailing list
openssh-unix-dev@mindrot.org. The list is open to posting by
unsubscribed users.Code contribution are welcomed, but please follow the 
OpenBSD style guidelines[6].

Please refer to the INSTALL document for information on how to install
OpenSSH on your system. There are a number of differences between this
port of OpenSSH and F-Secure SSH 1.x, please refer to the OpenSSH FAQ[7]
for details and general tips.

Damien Miller <djm@mindrot.org>

Miscellania -

This version of OpenSSH is based upon code retrieved from the OpenBSD
CVS repository which in turn was based on the last free sample
implementation released by Tatu Ylonen.

References -

[0] http://www.openssh.com/faq.html
[1] http://www.lothar.com/tech/crypto/
[2] http://www.aet.tu-cottbus.de/personen/jaenicke/postfix_tls/prngd.html
[3] http://www.gzip.org/zlib/
[4] http://www.openssl.org/
[5] http://www.openpam.org
    http://www.kernel.org/pub/linux/libs/pam/ 
    (PAM also is standard on Solaris and HP-UX 11)
[6] http://www.openbsd.org/cgi-bin/man.cgi?query=style&sektion=9
[7] http://www.openssh.com/faq.html

$Id: README,v 1.82.2.1 2013/05/10 06:12:54 djm Exp $