aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTom Hukins <tom@FreeBSD.org>2023-03-05 10:17:41 +0000
committerSergio Carlavilla Delgado <carlavilla@FreeBSD.org>2023-03-05 10:17:41 +0000
commitbb022d98edf57003f5bb6519b49ba95f6c2e408f (patch)
treeb7557b373cd6f282357c4688cedbc78aca22e9f1
parent689f1b026a02bf6d7039bdfec59353196d83ccef (diff)
downloaddoc-bb022d98ed.tar.gz
doc-bb022d98ed.zip
Security Handbook Chapter - Stop using -2 argument in ssh(1)
-rw-r--r--documentation/content/en/books/handbook/security/_index.adoc11
1 files changed, 4 insertions, 7 deletions
diff --git a/documentation/content/en/books/handbook/security/_index.adoc b/documentation/content/en/books/handbook/security/_index.adoc
index 13aea12147..0185fea3b4 100644
--- a/documentation/content/en/books/handbook/security/_index.adoc
+++ b/documentation/content/en/books/handbook/security/_index.adoc
@@ -1747,15 +1747,12 @@ The following command tells `ssh` to create a tunnel for telnet:
[source,shell]
....
-% ssh -2 -N -f -L 5023:localhost:23 user@foo.example.com
+% ssh -N -f -L 5023:localhost:23 user@foo.example.com
%
....
This example uses the following options:
-`-2`::
-Forces `ssh` to use version 2 to connect to the server.
-
`-N`::
Indicates no command, or tunnel only.
If omitted, `ssh` initiates a normal session.
@@ -1782,7 +1779,7 @@ This method can be used to wrap any number of insecure TCP protocols such as SMT
[source,shell]
....
-% ssh -2 -N -f -L 5025:localhost:25 user@mailserver.example.com
+% ssh -N -f -L 5025:localhost:25 user@mailserver.example.com
user@mailserver.example.com's password: *****
% telnet localhost 5025
Trying 127.0.0.1...
@@ -1803,7 +1800,7 @@ To check email in a secure manner, create an SSH connection to the SSH server an
[source,shell]
....
-% ssh -2 -N -f -L 2110:mail.example.com:110 user@ssh-server.example.com
+% ssh -N -f -L 2110:mail.example.com:110 user@ssh-server.example.com
user@ssh-server.example.com's password: ******
....
@@ -1822,7 +1819,7 @@ The solution is to create an SSH connection to a machine outside of the network'
[source,shell]
....
-% ssh -2 -N -f -L 8888:music.example.com:8000 user@unfirewalled-system.example.org
+% ssh -N -f -L 8888:music.example.com:8000 user@unfirewalled-system.example.org
user@unfirewalled-system.example.org's password: *******
....