From 6f614ec09bb61d5523adde9d0e63358b26f8fb75 Mon Sep 17 00:00:00 2001 From: Jason McIntyre Date: Wed, 25 Jan 2006 09:07:23 +0000 Subject: move subsections to full sections; --- usr.bin/ssh/sshd.8 | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'usr.bin/ssh') diff --git a/usr.bin/ssh/sshd.8 b/usr.bin/ssh/sshd.8 index 9c21d51f198..e94b95fbfd7 100644 --- a/usr.bin/ssh/sshd.8 +++ b/usr.bin/ssh/sshd.8 @@ -34,7 +34,7 @@ .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.\" $OpenBSD: sshd.8,v 1.212 2006/01/25 09:04:34 jmc Exp $ +.\" $OpenBSD: sshd.8,v 1.213 2006/01/25 09:07:22 jmc Exp $ .Dd September 25, 1999 .Dt SSHD 8 .Os @@ -233,7 +233,7 @@ This implementation of supports both SSH protocol version 1 and 2 simultaneously. .Nm works as follows: -.Ss SSH protocol version 1 +.Sh SSH PROTOCOL VERSION 1 Each host has a host-specific RSA key (normally 2048 bits) used to identify the host. Additionally, when @@ -275,7 +275,7 @@ are disabled (thus completely disabling and .Xr rsh into the machine). -.Ss SSH protocol version 2 +.Sh SSH PROTOCOL VERSION 2 Version 2 works similarly: Each host has a host-specific key (RSA or DSA) used to identify the host. However, when the daemon starts, it does not generate a server key. @@ -294,7 +294,7 @@ Protocol version 2 provides a public key based user (PubkeyAuthentication) or client host (HostbasedAuthentication) authentication method, conventional password authentication and challenge response based methods. -.Ss Command execution and data forwarding +.Sh COMMAND EXECUTION AND DATA FORWARDING If the client successfully authenticates itself, a dialog for preparing the session is entered. At this time the client may request -- cgit v1.2.3