On 2017/09/25 13:03, Lars Noodén wrote: > I would propose the following change, or something similar, to sshd_config.5 > > It is then more clear which options are accepted and how the directive is > used.
Saying that it can be yes or no and the default is no seems a bit long-winded, this smaller diff seems just as clear to me? Index: sshd_config.5 =================================================================== RCS file: /cvs/src/usr.bin/ssh/sshd_config.5,v retrieving revision 1.252 diff -u -p -u -6 -r1.252 sshd_config.5 --- sshd_config.5 1 Sep 2017 15:41:26 -0000 1.252 +++ sshd_config.5 25 Sep 2017 15:45:40 -0000 @@ -578,12 +578,14 @@ simplify restricted configurations. .It Cm ExposeAuthInfo Enables writing a file containing a list of authentication methods and public credentials (e.g. keys) used to authenticate the user. The location of the file is exposed to the user session through the .Ev SSH_USER_AUTH environment variable. +The default is +.Cm no . .It Cm FingerprintHash Specifies the hash algorithm used when logging key fingerprints. Valid options are: .Cm md5 and .Cm sha256 . > /Lars > > Index: src/usr.bin/ssh/sshd_config.5 > =================================================================== > RCS file: /cvs/src/usr.bin/ssh/sshd_config.5,v > retrieving revision 1.252 > diff -u -p -u -r1.252 sshd_config.5 > --- src/usr.bin/ssh/sshd_config.5 1 Sep 2017 15:41:26 -0000 1.252 > +++ src/usr.bin/ssh/sshd_config.5 25 Sep 2017 12:49:21 -0000 > @@ -576,11 +576,17 @@ TCP and StreamLocal. > This option overrides all other forwarding-related options and may > simplify restricted configurations. > .It Cm ExposeAuthInfo > -Enables writing a file containing a list of authentication methods and > +Writes a temporary file containing a list of authentication methods and > public credentials (e.g. keys) used to authenticate the user. > The location of the file is exposed to the user session through the > .Ev SSH_USER_AUTH > environment variable. > +The value can be set to > +.Cm yes > +or > +.Cm no . > +The default is > +.Cm no . > .It Cm FingerprintHash > Specifies the hash algorithm used when logging key fingerprints. > Valid options are: >