head	1.7;
access;
symbols
	RELEASE_8_1_0:1.6
	RELEASE_7_3_0:1.6
	RELEASE_8_0_0:1.6
	RELEASE_7_2_0:1.6
	RELEASE_7_1_0:1.6
	RELEASE_6_4_0:1.6
	RELEASE_5_EOL:1.6
	RELEASE_7_0_0:1.6
	RELEASE_6_3_0:1.6
	PRE_XORG_7:1.6
	RELEASE_4_EOL:1.6
	RELEASE_6_2_0:1.6
	RELEASE_6_1_0:1.6
	RELEASE_5_5_0:1.6
	RELEASE_6_0_0:1.6
	RELEASE_5_4_0:1.6
	RELEASE_4_11_0:1.6
	RELEASE_5_3_0:1.6
	RELEASE_4_10_0:1.6
	RELEASE_5_2_1:1.6
	RELEASE_5_2_0:1.6
	RELEASE_4_9_0:1.6
	RELEASE_5_1_0:1.6
	RELEASE_4_8_0:1.6
	RELEASE_5_0_0:1.6
	RELEASE_4_7_0:1.6
	RELEASE_4_6_2:1.6
	RELEASE_4_6_1:1.6
	RELEASE_4_6_0:1.6
	RELEASE_5_0_DP1:1.6
	RELEASE_4_5_0:1.6
	RELEASE_4_4_0:1.6
	RELEASE_4_3_0:1.6
	RELEASE_4_2_0:1.6
	RELEASE_4_1_1:1.6
	RELEASE_4_1_0:1.5
	RELEASE_3_5_0:1.5
	RELEASE_4_0_0:1.5
	RELEASE_3_4_0:1.4
	RELEASE_3_3_0:1.4
	RELEASE_3_2_0:1.4
	RELEASE_3_1_0:1.3
	ssh_2_0_11:1.3
	RELEASE_2_2_8:1.3
	RELEASE_3_0_0:1.2
	RELEASE_2_2_7:1.2
	RELEASE_2_2_6:1.2
	RELEASE_2_2_5:1.2
	RELEASE_2_2_1:1.2
	RELEASE_2_2_2:1.2
	ssh_1_2_10:1.1.1.1
	YLO:1.1.1;
locks; strict;
comment	@# @;


1.7
date	2010.10.15.17.40.30;	author garga;	state dead;
branches;
next	1.6;

1.6
date	2000.09.02.03.56.57;	author kris;	state Exp;
branches;
next	1.5;

1.5
date	99.12.24.18.39.45;	author mharo;	state Exp;
branches;
next	1.4;

1.4
date	99.05.03.04.04.46;	author mharo;	state Exp;
branches;
next	1.3;

1.3
date	98.11.23.05.15.17;	author kuriyama;	state Exp;
branches;
next	1.2;

1.2
date	95.11.23.17.19.18;	author peter;	state Exp;
branches;
next	1.1;

1.1
date	95.10.07.01.19.27;	author torstenb;	state Exp;
branches
	1.1.1.1;
next	;

1.1.1.1
date	95.10.07.01.19.27;	author torstenb;	state Exp;
branches;
next	;


desc
@@


1.7
log
@Remove expired ports

2010-10-15 security/ssh2: abandoned upstream
2010-10-15 security/ssh2-nox11: abandoned upstream
@
text
@SSH Protocols and Secure Shell

  Secure Shell is the secure login program that revolutionized remote
management of networks hosts over the Internet.  It is a powerful,
very easy-to-use program that uses strong cryptography for protecting
all transmitted confidential data, including passwords, binary files,
and administrative commands.

The benefits of SSH include:

o Automatic authentication of users, no passwords sent in cleartext to
  prevent the stealing of passwords.
o Multiple strong authentication methods that prevent such security
  threats as spoofing identity.
o Authentication of both ends of connection, the server and the client
  are authenticated to prevent identity spoofing, trojan horses, etc. 
o Automatic authentication using agents to enable strong
  authentication to multiple systems with a single-sign-on.
o Encryption and compression of data for security and speed.
o Secure file transfer.
o Tunneling and encryption of arbitrary connections.

WWW: http://www.ssh.com/
@


1.6
log
@Upgrade to ssh-2.3.0.

PR:	ports/20869
Submitted by:	Issei Suzuki <issei@@issei.org> (Maintainer)
@
text
@@


1.5
log
@remove --prefix=${PREFIX} when GNU_CONFIGURE=yes and other minor cleanups

PR:		14759
Submitted by:	Jeremy Lea <reg@@shale.csir.co.za>
@
text
@d23 1
a23 1
WWW: http://www.ssh.fi/
@


1.4
log
@Add WWW: to DESCR files
@
text
@d9 1
a9 4
  SSH Communications Security is the developer of the Secure Shell and
the SSH protocol, technologies that are the de-facto standard for
encrypted terminal connections on the Internet. The benefits of SSH
include 
a12 1

a14 1

a16 1

a18 1

a19 1

a20 1

a21 1

@


1.3
log
@Secure shell client and server (remote login program).

PR:		ports/8204
Submitted by:	Issei Suzuki <issei@@jp.FreeBSD.ORG>
@
text
@d33 1
a33 1
See http://www.ssh.fi/ for more details.
@


1.2
log
@Update ssh from 1.2.10 to 1.2.12..  This is for two reasons:
1) It eliminated the need for my horrible kludge patch-ad
2) 1.2.12 has data stream compression (like gzip).
(I'm talking with the author about the remining three patches)
@
text
@d1 1
a1 98
Secure Shell is a program to log into another computer over a network,
to execute commands in a remote machine, and to move files from one
machine to another.  It provides strong authentication and secure
communications over insecure channels.  It is inteded as a replacement
for rlogin, rsh, and rcp.

FEATURES

 o  Complete replacement for rlogin, rsh, and rcp.

 o  Strong authentication.  Closes several security holes (e.g., IP,
    routing, and DNS spoofing).  New authentication methods: .rhosts
    together with RSA based host authentication, and pure RSA
    authentication.

 o  Improved privacy.  All communications are automatically and
    transparently encrypted.  RSA is used for key exchange, and a
    conventional cipher (normally IDEA, DES, or triple-DES) for
    encrypting the session.  Encryption is started before
    authentication, and no passwords or other information is
    transmitted in the clear.  Encryption is also used to protect
    against spoofed packets.

 o  Secure X11 sessions.  The program automatically sets DISPLAY on
    the server machine, and forwards any X11 connections over the
    secure channel.  Fake Xauthority information is automatically
    generated and forwarded to the remote machine; the local client
    automatically examines incoming X11 connections and replaces the
    fake authorization data with the real data (never telling the 
    remote machine the real information).

 o  Arbitrary TCP/IP ports can be redirected through the encrypted channel
    in both directions (e.g., for e-cash transactions).

 o  No retraining needed for normal users; everything happens
    automatically, and old .rhosts files will work with strong
    authentication if administration installs host key files.

 o  Never trusts the network.  Minimal trust on the remote side of
    the connection.  Minimal trust on domain name servers.  Pure RSA
    authentication never trusts anything but the private key.

 o  Client RSA-authenticates the server machine in the beginning of
    every connection to prevent trojan horses (by routing or DNS
    spoofing) and man-in-the-middle attacks, and the server
    RSA-authenticates the client machine before accepting .rhosts or
    /etc/hosts.equiv authentication (to prevent DNS, routing, or
    IP-spoofing).

 o  Host authentication key distribution can be centrally by the
    administration, automatically when the first connection is made
    to a machine (the key obtained on the first connection will be
    recorded and used for authentication in the future), or manually
    by each user for his/her own use.  The central and per-user host
    key repositories are both used and complement each other.  Host
    keys can be generated centrally or automatically when the software
    is installed.  Host authentication keys are typically 1024 bits.

 o  Any user can create any number of user authentication RSA keys for
    his/her own use.  Each user has a file which lists the RSA public
    keys for which proof of possession of the corresponding private
    key is accepted as authentication.  User authentication keys are
    typically 1024 bits.

 o  The server program has its own server RSA key which is
    automatically regenerated every hour.  This key is never saved in
    any file.  Exchanged session keys are encrypted using both the
    server key and the server host key.  The purpose of the separate
    server key is to make it impossible to decipher a captured session by
    breaking into the server machine at a later time; one hour from
    the connection even the server machine cannot decipher the session
    key.  The key regeneration interval is configurable.  The server
    key is normally 768 bits.

 o  An authentication agent, running in the user's laptop or local
    workstation, can be used to hold the user's RSA authentication
    keys.  Ssh automatically forwards the connection to the
    authentication agent over any connections, and there is no need to
    store the RSA authentication keys on any machine in the network
    (except the user's own local machine).  The authentication
    protocols never reveal the keys; they can only be used to verify
    that the user's agent has a certain key.  Eventually the agent
    could rely on a smart card to perform all authentication
    computations.

 o  The software can be installed and used (with restricted
    functionality) even without root privileges.

 o  The client is customizable in system-wide and per-user
    configuration files.  Most aspects of the client's operation can
    be configured.  Different options can be specified on a per-host basis.

 o  Automatically executes conventional rsh (after displaying a
    warning) if the server machine is not running sshd.

 o  Optional compression of all data with gzip (including forwarded X11
    and TCP/IP port data), which may result in significant speedups on
    slow connections.
d3 31
@


1.1
log
@Initial revision
@
text
@d96 3
@


1.1.1.1
log
@Ssh is a secure rlogin/rsh/rcp replacement with strong authentication
(.rhosts together with RSA based host authentication, and pure RSA
authentication) and improved privacy (all communications are automatically
and transparently encrypted).
@
text
@@
