Bug 1801 - cipher_spec section of ssh man page needs update
Summary: cipher_spec section of ssh man page needs update
Status: CLOSED FIXED
Alias: None
Product: Portable OpenSSH
Classification: Unclassified
Component: Documentation (show other bugs)
Version: 5.5p1
Hardware: All All
: P2 normal
Assignee: Assigned to nobody
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2010-07-22 15:30 AEST by Matthew M. Boedicker
Modified: 2010-08-27 10:28 AEST (History)
2 users (show)

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Matthew M. Boedicker 2010-07-22 15:30:24 AEST
The "-c cipher_sec" section says that 3des is still the default cipher. Also newer ciphers like aes and arcfour are not listed.
Comment 1 Darren Tucker 2010-07-22 15:56:22 AEST
Quoting it in full:

" -c cipher_spec
    Selects the cipher specification for encrypting the session.

    Protocol version 1 allows specification of a single cipher.  The
    supported values are ``3des'', ``blowfish'', and ``des''.  3des
    (triple-des) is an encrypt-decrypt-encrypt triple with three
    different keys.  It is believed to be secure.  blowfish is a fast
    block cipher; it appears very secure and is much faster than
    3des.  des is only supported in the ssh client for
    interoperability with legacy protocol 1 implementations that do
    not support the 3des cipher.  Its use is strongly discouraged due
    to cryptographic weaknesses.  The default is ``3des''.

    For protocol version 2, cipher_spec is a comma-separated list of
    ciphers listed in order of preference.  See the Ciphers keyword
    for more information."

There's 2 paragraphs: the first describes version 1 of the protocol for which the default *is* 3des.  The default cipher list for protocol 2 list listed in ssh_config(5):

"Ciphers
   Specifies the ciphers allowed for protocol version 2 in order of
   preference.  Multiple ciphers must be comma-separated.  The sup-
   ported ciphers are "3des-cbc", "aes128-cbc", "aes192-cbc",
   "aes256-cbc", "aes128-ctr", "aes192-ctr", "aes256-ctr",
   "arcfour128", "arcfour256", "arcfour", "blowfish-cbc", and
   "cast128-cbc".  The default is:

   aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,
   aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,
   aes256-cbc,arcfour"

The reference in ssh(1) should be a reference to ssh_config(5) though.
Comment 2 Damien Miller 2010-08-27 10:19:42 AEST
Darren has updated ssh(1):

revision 1.307
date: 2010/07/23 08:49:25;  author: dtucker;  state: Exp;  lines: +5 -3
Ciphers is documented in ssh_config(5) these days

This was released in OpenSSH 5.6
Comment 3 Darren Tucker 2010-08-27 10:28:11 AEST
With the release of OpenSSH 5.6p1 this bug is now considered closed.  If you have further problems please reopen or file a new bug as appropriate.