summaryrefslogtreecommitdiff
path: root/openssh-8.0p1-crypto-policies.patch
diff options
context:
space:
mode:
Diffstat (limited to 'openssh-8.0p1-crypto-policies.patch')
-rw-r--r--openssh-8.0p1-crypto-policies.patch632
1 files changed, 0 insertions, 632 deletions
diff --git a/openssh-8.0p1-crypto-policies.patch b/openssh-8.0p1-crypto-policies.patch
deleted file mode 100644
index 86c08db..0000000
--- a/openssh-8.0p1-crypto-policies.patch
+++ /dev/null
@@ -1,632 +0,0 @@
-diff --color -ru -x regress -x autom4te.cache -x '*.o' -x '*.lo' -x Makefile -x config.status -x configure~ -x configure.ac openssh-9.3p1/ssh_config.5 openssh-9.3p1-patched/ssh_config.5
---- openssh-9.3p1/ssh_config.5 2023-06-07 10:26:48.284590156 +0200
-+++ openssh-9.3p1-patched/ssh_config.5 2023-06-07 10:26:00.623052194 +0200
-@@ -378,17 +378,13 @@
- causes no CNAMEs to be considered for canonicalization.
- This is the default behaviour.
- .It Cm CASignatureAlgorithms
-+The default is handled system-wide by
-+.Xr crypto-policies 7 .
-+Information about defaults, how to modify the defaults and how to customize existing policies with sub-policies are present in manual page
-+.Xr update-crypto-policies 8 .
-+.Pp
- Specifies which algorithms are allowed for signing of certificates
- by certificate authorities (CAs).
--The default is:
--.Bd -literal -offset indent
--ssh-ed25519,ecdsa-sha2-nistp256,
--ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
--sk-ssh-ed25519@openssh.com,
--sk-ecdsa-sha2-nistp256@openssh.com,
--rsa-sha2-512,rsa-sha2-256
--.Ed
--.Pp
- If the specified list begins with a
- .Sq +
- character, then the specified algorithms will be appended to the default set
-@@ -450,20 +446,25 @@
- (the default),
- the check will not be executed.
- .It Cm Ciphers
-+The default is handled system-wide by
-+.Xr crypto-policies 7 .
-+Information about defaults, how to modify the defaults and how to customize existing policies with sub-policies are present in manual page
-+.Xr update-crypto-policies 8 .
-+.Pp
- Specifies the ciphers allowed and their order of preference.
- Multiple ciphers must be comma-separated.
- If the specified list begins with a
- .Sq +
--character, then the specified ciphers will be appended to the default set
--instead of replacing them.
-+character, then the specified ciphers will be appended to the built-in
-+openssh default set instead of replacing them.
- If the specified list begins with a
- .Sq -
- character, then the specified ciphers (including wildcards) will be removed
--from the default set instead of replacing them.
-+from the built-in openssh default set instead of replacing them.
- If the specified list begins with a
- .Sq ^
- character, then the specified ciphers will be placed at the head of the
--default set.
-+built-in openssh default set.
- .Pp
- The supported ciphers are:
- .Bd -literal -offset indent
-@@ -479,13 +480,6 @@
- chacha20-poly1305@openssh.com
- .Ed
- .Pp
--The default is:
--.Bd -literal -offset indent
--chacha20-poly1305@openssh.com,
--aes128-ctr,aes192-ctr,aes256-ctr,
--aes128-gcm@openssh.com,aes256-gcm@openssh.com
--.Ed
--.Pp
- The list of available ciphers may also be obtained using
- .Qq ssh -Q cipher .
- .It Cm ClearAllForwardings
-@@ -885,6 +879,11 @@
- The default is
- .Dq no .
- .It Cm GSSAPIKexAlgorithms
-+The default is handled system-wide by
-+.Xr crypto-policies 7 .
-+Information about defaults, how to modify the defaults and how to customize existing policies with sub-policies are present in manual page
-+.Xr update-crypto-policies 8 .
-+.Pp
- The list of key exchange algorithms that are offered for GSSAPI
- key exchange. Possible values are
- .Bd -literal -offset 3n
-@@ -897,10 +896,8 @@
- gss-curve25519-sha256-
- .Ed
- .Pp
--The default is
--.Dq gss-group14-sha256-,gss-group16-sha512-,gss-nistp256-sha256-,
--gss-curve25519-sha256-,gss-group14-sha1-,gss-gex-sha1- .
- This option only applies to connections using GSSAPI.
-+.Pp
- .It Cm HashKnownHosts
- Indicates that
- .Xr ssh 1
-@@ -919,36 +916,25 @@
- but may be manually hashed using
- .Xr ssh-keygen 1 .
- .It Cm HostbasedAcceptedAlgorithms
-+The default is handled system-wide by
-+.Xr crypto-policies 7 .
-+Information about defaults, how to modify the defaults and how to customize existing policies with sub-policies are present in manual page
-+.Xr update-crypto-policies 8 .
-+.Pp
- Specifies the signature algorithms that will be used for hostbased
- authentication as a comma-separated list of patterns.
- Alternately if the specified list begins with a
- .Sq +
- character, then the specified signature algorithms will be appended
--to the default set instead of replacing them.
-+to the built-in openssh default set instead of replacing them.
- If the specified list begins with a
- .Sq -
- character, then the specified signature algorithms (including wildcards)
--will be removed from the default set instead of replacing them.
-+will be removed from the built-in openssh default set instead of replacing them.
- If the specified list begins with a
- .Sq ^
- character, then the specified signature algorithms will be placed
--at the head of the default set.
--The default for this option is:
--.Bd -literal -offset 3n
--ssh-ed25519-cert-v01@openssh.com,
--ecdsa-sha2-nistp256-cert-v01@openssh.com,
--ecdsa-sha2-nistp384-cert-v01@openssh.com,
--ecdsa-sha2-nistp521-cert-v01@openssh.com,
--sk-ssh-ed25519-cert-v01@openssh.com,
--sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
--rsa-sha2-512-cert-v01@openssh.com,
--rsa-sha2-256-cert-v01@openssh.com,
--ssh-ed25519,
--ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
--sk-ssh-ed25519@openssh.com,
--sk-ecdsa-sha2-nistp256@openssh.com,
--rsa-sha2-512,rsa-sha2-256
--.Ed
-+at the head of the built-in openssh default set.
- .Pp
- The
- .Fl Q
-@@ -1001,6 +987,17 @@
- .Pp
- The list of available signature algorithms may also be obtained using
- .Qq ssh -Q HostKeyAlgorithms .
-+.Pp
-+The proposed
-+.Cm HostKeyAlgorithms
-+during KEX are limited to the set of algorithms that is defined in
-+.Cm PubkeyAcceptedAlgorithms
-+and therefore they are indirectly affected by system-wide
-+.Xr crypto_policies 7 .
-+.Xr crypto_policies 7 can not handle the list of host key algorithms directly as doing so
-+would break the order given by the
-+.Pa known_hosts
-+file.
- .It Cm HostKeyAlias
- Specifies an alias that should be used instead of the
- real host name when looking up or saving the host key
-@@ -1232,30 +1229,25 @@
- and
- .Cm pam .
- .It Cm KexAlgorithms
-+The default is handled system-wide by
-+.Xr crypto-policies 7 .
-+Information about defaults, how to modify the defaults and how to customize existing policies with sub-policies are present in manual page
-+.Xr update-crypto-policies 8 .
-+.Pp
- Specifies the available KEX (Key Exchange) algorithms.
- Multiple algorithms must be comma-separated.
- If the specified list begins with a
- .Sq +
--character, then the specified algorithms will be appended to the default set
--instead of replacing them.
-+character, then the specified methods will be appended to the built-in
-+openssh default set instead of replacing them.
- If the specified list begins with a
- .Sq -
- character, then the specified algorithms (including wildcards) will be removed
--from the default set instead of replacing them.
-+from the built-in openssh default set instead of replacing them.
- If the specified list begins with a
- .Sq ^
- character, then the specified algorithms will be placed at the head of the
--default set.
--The default is:
--.Bd -literal -offset indent
--sntrup761x25519-sha512@openssh.com,
--curve25519-sha256,curve25519-sha256@libssh.org,
--ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,
--diffie-hellman-group-exchange-sha256,
--diffie-hellman-group16-sha512,
--diffie-hellman-group18-sha512,
--diffie-hellman-group14-sha256
--.Ed
-+built-in openssh default set.
- .Pp
- The list of available key exchange algorithms may also be obtained using
- .Qq ssh -Q kex .
-@@ -1365,37 +1357,33 @@
- file.
- This option is intended for debugging and no overrides are enabled by default.
- .It Cm MACs
-+The default is handled system-wide by
-+.Xr crypto-policies 7 .
-+Information about defaults, how to modify the defaults and how to customize existing policies with sub-policies are present in manual page
-+.Xr update-crypto-policies 8 .
-+.Pp
- Specifies the MAC (message authentication code) algorithms
- in order of preference.
- The MAC algorithm is used for data integrity protection.
- Multiple algorithms must be comma-separated.
- If the specified list begins with a
- .Sq +
--character, then the specified algorithms will be appended to the default set
--instead of replacing them.
-+character, then the specified algorithms will be appended to the built-in
-+openssh default set instead of replacing them.
- If the specified list begins with a
- .Sq -
- character, then the specified algorithms (including wildcards) will be removed
--from the default set instead of replacing them.
-+from the built-in openssh default set instead of replacing them.
- If the specified list begins with a
- .Sq ^
- character, then the specified algorithms will be placed at the head of the
--default set.
-+built-in openssh default set.
- .Pp
- The algorithms that contain
- .Qq -etm
- calculate the MAC after encryption (encrypt-then-mac).
- These are considered safer and their use recommended.
- .Pp
--The default is:
--.Bd -literal -offset indent
--umac-64-etm@openssh.com,umac-128-etm@openssh.com,
--hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,
--hmac-sha1-etm@openssh.com,
--umac-64@openssh.com,umac-128@openssh.com,
--hmac-sha2-256,hmac-sha2-512,hmac-sha1
--.Ed
--.Pp
- The list of available MAC algorithms may also be obtained using
- .Qq ssh -Q mac .
- .It Cm NoHostAuthenticationForLocalhost
-@@ -1567,39 +1555,31 @@
- The default is
- .Cm no .
- .It Cm PubkeyAcceptedAlgorithms
-+The default is handled system-wide by
-+.Xr crypto-policies 7 .
-+Information about defaults, how to modify the defaults and how to customize existing policies with sub-policies are present in manual page
-+.Xr update-crypto-policies 8 .
-+.Pp
- Specifies the signature algorithms that will be used for public key
- authentication as a comma-separated list of patterns.
- If the specified list begins with a
- .Sq +
--character, then the algorithms after it will be appended to the default
--instead of replacing it.
-+character, then the algorithms after it will be appended to the built-in
-+openssh default instead of replacing it.
- If the specified list begins with a
- .Sq -
- character, then the specified algorithms (including wildcards) will be removed
--from the default set instead of replacing them.
-+from the built-in openssh default set instead of replacing them.
- If the specified list begins with a
- .Sq ^
- character, then the specified algorithms will be placed at the head of the
--default set.
--The default for this option is:
--.Bd -literal -offset 3n
--ssh-ed25519-cert-v01@openssh.com,
--ecdsa-sha2-nistp256-cert-v01@openssh.com,
--ecdsa-sha2-nistp384-cert-v01@openssh.com,
--ecdsa-sha2-nistp521-cert-v01@openssh.com,
--sk-ssh-ed25519-cert-v01@openssh.com,
--sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
--rsa-sha2-512-cert-v01@openssh.com,
--rsa-sha2-256-cert-v01@openssh.com,
--ssh-ed25519,
--ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
--sk-ssh-ed25519@openssh.com,
--sk-ecdsa-sha2-nistp256@openssh.com,
--rsa-sha2-512,rsa-sha2-256
--.Ed
-+built-in openssh default set.
- .Pp
- The list of available signature algorithms may also be obtained using
- .Qq ssh -Q PubkeyAcceptedAlgorithms .
-+.Pp
-+This option affects also
-+.Cm HostKeyAlgorithms
- .It Cm PubkeyAuthentication
- Specifies whether to try public key authentication.
- The argument to this keyword must be
-@@ -2265,7 +2245,9 @@
- This file must be world-readable.
- .El
- .Sh SEE ALSO
--.Xr ssh 1
-+.Xr ssh 1 ,
-+.Xr crypto-policies 7 ,
-+.Xr update-crypto-policies 8
- .Sh AUTHORS
- .An -nosplit
- OpenSSH is a derivative of the original and free
-diff --color -ru -x regress -x autom4te.cache -x '*.o' -x '*.lo' -x Makefile -x config.status -x configure~ -x configure.ac openssh-9.3p1/sshd_config.5 openssh-9.3p1-patched/sshd_config.5
---- openssh-9.3p1/sshd_config.5 2023-06-07 10:26:48.277590077 +0200
-+++ openssh-9.3p1-patched/sshd_config.5 2023-06-07 10:26:00.592051845 +0200
-@@ -379,17 +379,13 @@
- then no banner is displayed.
- By default, no banner is displayed.
- .It Cm CASignatureAlgorithms
-+The default is handled system-wide by
-+.Xr crypto-policies 7 .
-+Information about defaults, how to modify the defaults and how to customize existing policies with sub-policies are present in manual page
-+.Xr update-crypto-policies 8 .
-+.Pp
- Specifies which algorithms are allowed for signing of certificates
- by certificate authorities (CAs).
--The default is:
--.Bd -literal -offset indent
--ssh-ed25519,ecdsa-sha2-nistp256,
--ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
--sk-ssh-ed25519@openssh.com,
--sk-ecdsa-sha2-nistp256@openssh.com,
--rsa-sha2-512,rsa-sha2-256
--.Ed
--.Pp
- If the specified list begins with a
- .Sq +
- character, then the specified algorithms will be appended to the default set
-@@ -525,20 +521,25 @@
- indicating not to
- .Xr chroot 2 .
- .It Cm Ciphers
-+The default is handled system-wide by
-+.Xr crypto-policies 7 .
-+Information about defaults, how to modify the defaults and how to customize existing policies with sub-policies are present in manual page
-+.Xr update-crypto-policies 8 .
-+.Pp
- Specifies the ciphers allowed.
- Multiple ciphers must be comma-separated.
- If the specified list begins with a
- .Sq +
--character, then the specified ciphers will be appended to the default set
--instead of replacing them.
-+character, then the specified ciphers will be appended to the built-in
-+openssh default set instead of replacing them.
- If the specified list begins with a
- .Sq -
- character, then the specified ciphers (including wildcards) will be removed
--from the default set instead of replacing them.
-+from the built-in openssh default set instead of replacing them.
- If the specified list begins with a
- .Sq ^
- character, then the specified ciphers will be placed at the head of the
--default set.
-+built-in openssh default set.
- .Pp
- The supported ciphers are:
- .Pp
-@@ -565,13 +566,6 @@
- chacha20-poly1305@openssh.com
- .El
- .Pp
--The default is:
--.Bd -literal -offset indent
--chacha20-poly1305@openssh.com,
--aes128-ctr,aes192-ctr,aes256-ctr,
--aes128-gcm@openssh.com,aes256-gcm@openssh.com
--.Ed
--.Pp
- The list of available ciphers may also be obtained using
- .Qq ssh -Q cipher .
- .It Cm ClientAliveCountMax
-@@ -766,53 +760,43 @@
- .Cm GSSAPIKeyExchange
- needs to be enabled in the server and also used by the client.
- .It Cm GSSAPIKexAlgorithms
-+The default is handled system-wide by
-+.Xr crypto-policies 7 .
-+Information about defaults, how to modify the defaults and how to customize existing policies with sub-policies are present in manual page
-+.Xr update-crypto-policies 8 .
-+.Pp
- The list of key exchange algorithms that are accepted by GSSAPI
- key exchange. Possible values are
- .Bd -literal -offset 3n
--gss-gex-sha1-,
--gss-group1-sha1-,
--gss-group14-sha1-,
--gss-group14-sha256-,
--gss-group16-sha512-,
--gss-nistp256-sha256-,
-+gss-gex-sha1-
-+gss-group1-sha1-
-+gss-group14-sha1-
-+gss-group14-sha256-
-+gss-group16-sha512-
-+gss-nistp256-sha256-
- gss-curve25519-sha256-
- .Ed
--.Pp
--The default is
--.Dq gss-group14-sha256-,gss-group16-sha512-,gss-nistp256-sha256-,
--gss-curve25519-sha256-,gss-group14-sha1-,gss-gex-sha1- .
- This option only applies to connections using GSSAPI.
- .It Cm HostbasedAcceptedAlgorithms
-+The default is handled system-wide by
-+.Xr crypto-policies 7 .
-+Information about defaults, how to modify the defaults and how to customize existing policies with sub-policies are present in manual page
-+.Xr update-crypto-policies 8 .
-+.Pp
- Specifies the signature algorithms that will be accepted for hostbased
- authentication as a list of comma-separated patterns.
- Alternately if the specified list begins with a
- .Sq +
- character, then the specified signature algorithms will be appended to
--the default set instead of replacing them.
-+the built-in openssh default set instead of replacing them.
- If the specified list begins with a
- .Sq -
- character, then the specified signature algorithms (including wildcards)
--will be removed from the default set instead of replacing them.
-+will be removed from the built-in openssh default set instead of replacing them.
- If the specified list begins with a
- .Sq ^
- character, then the specified signature algorithms will be placed at
--the head of the default set.
--The default for this option is:
--.Bd -literal -offset 3n
--ssh-ed25519-cert-v01@openssh.com,
--ecdsa-sha2-nistp256-cert-v01@openssh.com,
--ecdsa-sha2-nistp384-cert-v01@openssh.com,
--ecdsa-sha2-nistp521-cert-v01@openssh.com,
--sk-ssh-ed25519-cert-v01@openssh.com,
--sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
--rsa-sha2-512-cert-v01@openssh.com,
--rsa-sha2-256-cert-v01@openssh.com,
--ssh-ed25519,
--ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
--sk-ssh-ed25519@openssh.com,
--sk-ecdsa-sha2-nistp256@openssh.com,
--rsa-sha2-512,rsa-sha2-256
--.Ed
-+the head of the built-in openssh default set.
- .Pp
- The list of available signature algorithms may also be obtained using
- .Qq ssh -Q HostbasedAcceptedAlgorithms .
-@@ -879,25 +863,14 @@
- .Ev SSH_AUTH_SOCK
- environment variable.
- .It Cm HostKeyAlgorithms
-+The default is handled system-wide by
-+.Xr crypto-policies 7 .
-+Information about defaults, how to modify the defaults and how to customize existing policies with sub-policies are present in manual page
-+.Xr update-crypto-policies 8 .
-+.Pp
- Specifies the host key signature algorithms
- that the server offers.
- The default for this option is:
--.Bd -literal -offset 3n
--ssh-ed25519-cert-v01@openssh.com,
--ecdsa-sha2-nistp256-cert-v01@openssh.com,
--ecdsa-sha2-nistp384-cert-v01@openssh.com,
--ecdsa-sha2-nistp521-cert-v01@openssh.com,
--sk-ssh-ed25519-cert-v01@openssh.com,
--sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
--rsa-sha2-512-cert-v01@openssh.com,
--rsa-sha2-256-cert-v01@openssh.com,
--ssh-ed25519,
--ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
--sk-ssh-ed25519@openssh.com,
--sk-ecdsa-sha2-nistp256@openssh.com,
--rsa-sha2-512,rsa-sha2-256
--.Ed
--.Pp
- The list of available signature algorithms may also be obtained using
- .Qq ssh -Q HostKeyAlgorithms .
- .It Cm IgnoreRhosts
-@@ -1044,20 +1017,25 @@
- The default is
- .Cm yes .
- .It Cm KexAlgorithms
-+The default is handled system-wide by
-+.Xr crypto-policies 7 .
-+Information about defaults, how to modify the defaults and how to customize existing policies with sub-policies are present in manual page
-+.Xr update-crypto-policies 8 .
-+.Pp
- Specifies the available KEX (Key Exchange) algorithms.
- Multiple algorithms must be comma-separated.
- Alternately if the specified list begins with a
- .Sq +
--character, then the specified algorithms will be appended to the default set
--instead of replacing them.
-+character, then the specified methods will be appended to the built-in
-+openssh default set instead of replacing them.
- If the specified list begins with a
- .Sq -
- character, then the specified algorithms (including wildcards) will be removed
--from the default set instead of replacing them.
-+from the built-in openssh default set instead of replacing them.
- If the specified list begins with a
- .Sq ^
- character, then the specified algorithms will be placed at the head of the
--default set.
-+built-in openssh default set.
- The supported algorithms are:
- .Pp
- .Bl -item -compact -offset indent
-@@ -1089,16 +1067,6 @@
- sntrup761x25519-sha512@openssh.com
- .El
- .Pp
--The default is:
--.Bd -literal -offset indent
--sntrup761x25519-sha512@openssh.com,
--curve25519-sha256,curve25519-sha256@libssh.org,
--ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,
--diffie-hellman-group-exchange-sha256,
--diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,
--diffie-hellman-group14-sha256
--.Ed
--.Pp
- The list of available key exchange algorithms may also be obtained using
- .Qq ssh -Q KexAlgorithms .
- .It Cm ListenAddress
-@@ -1184,21 +1152,26 @@
- file.
- This option is intended for debugging and no overrides are enabled by default.
- .It Cm MACs
-+The default is handled system-wide by
-+.Xr crypto-policies 7 .
-+Information about defaults, how to modify the defaults and how to customize existing policies with sub-policies are present in manual page
-+.Xr update-crypto-policies 8 .
-+.Pp
- Specifies the available MAC (message authentication code) algorithms.
- The MAC algorithm is used for data integrity protection.
- Multiple algorithms must be comma-separated.
- If the specified list begins with a
- .Sq +
--character, then the specified algorithms will be appended to the default set
--instead of replacing them.
-+character, then the specified algorithms will be appended to the built-in
-+openssh default set instead of replacing them.
- If the specified list begins with a
- .Sq -
- character, then the specified algorithms (including wildcards) will be removed
--from the default set instead of replacing them.
-+from the built-in openssh default set instead of replacing them.
- If the specified list begins with a
- .Sq ^
- character, then the specified algorithms will be placed at the head of the
--default set.
-+built-in openssh default set.
- .Pp
- The algorithms that contain
- .Qq -etm
-@@ -1241,15 +1214,6 @@
- umac-128-etm@openssh.com
- .El
- .Pp
--The default is:
--.Bd -literal -offset indent
--umac-64-etm@openssh.com,umac-128-etm@openssh.com,
--hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,
--hmac-sha1-etm@openssh.com,
--umac-64@openssh.com,umac-128@openssh.com,
--hmac-sha2-256,hmac-sha2-512,hmac-sha1
--.Ed
--.Pp
- The list of available MAC algorithms may also be obtained using
- .Qq ssh -Q mac .
- .It Cm Match
-@@ -1633,36 +1597,25 @@
- The default is
- .Cm yes .
- .It Cm PubkeyAcceptedAlgorithms
-+The default is handled system-wide by
-+.Xr crypto-policies 7 .
-+Information about defaults, how to modify the defaults and how to customize existing policies with sub-policies are present in manual page
-+.Xr update-crypto-policies 8 .
-+.Pp
- Specifies the signature algorithms that will be accepted for public key
- authentication as a list of comma-separated patterns.
- Alternately if the specified list begins with a
- .Sq +
--character, then the specified algorithms will be appended to the default set
--instead of replacing them.
-+character, then the specified algorithms will be appended to the built-in
-+openssh default set instead of replacing them.
- If the specified list begins with a
- .Sq -
- character, then the specified algorithms (including wildcards) will be removed
--from the default set instead of replacing them.
-+from the built-in openssh default set instead of replacing them.
- If the specified list begins with a
- .Sq ^
- character, then the specified algorithms will be placed at the head of the
--default set.
--The default for this option is:
--.Bd -literal -offset 3n
--ssh-ed25519-cert-v01@openssh.com,
--ecdsa-sha2-nistp256-cert-v01@openssh.com,
--ecdsa-sha2-nistp384-cert-v01@openssh.com,
--ecdsa-sha2-nistp521-cert-v01@openssh.com,
--sk-ssh-ed25519-cert-v01@openssh.com,
--sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
--rsa-sha2-512-cert-v01@openssh.com,
--rsa-sha2-256-cert-v01@openssh.com,
--ssh-ed25519,
--ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
--sk-ssh-ed25519@openssh.com,
--sk-ecdsa-sha2-nistp256@openssh.com,
--rsa-sha2-512,rsa-sha2-256
--.Ed
-+built-in openssh default set.
- .Pp
- The list of available signature algorithms may also be obtained using
- .Qq ssh -Q PubkeyAcceptedAlgorithms .
-@@ -2131,7 +2084,9 @@
- .El
- .Sh SEE ALSO
- .Xr sftp-server 8 ,
--.Xr sshd 8
-+.Xr sshd 8 ,
-+.Xr crypto-policies 7 ,
-+.Xr update-crypto-policies 8
- .Sh AUTHORS
- .An -nosplit
- OpenSSH is a derivative of the original and free