a848054
diff -up openssh-8.2p1/ssh_config.5.crypto-policies openssh-8.2p1/ssh_config.5
a848054
--- openssh-8.2p1/ssh_config.5.crypto-policies	2020-03-26 14:40:44.546775605 +0100
a848054
+++ openssh-8.2p1/ssh_config.5	2020-03-26 14:52:20.700649727 +0100
a848054
@@ -359,17 +359,17 @@ or
a848054
 .Qq *.c.example.com
a848054
 domains.
51f5c1c
 .It Cm CASignatureAlgorithms
a848054
+The default is handled system-wide by
a848054
+.Xr crypto-policies 7 .
a848054
+To see the defaults and how to modify this default, see manual page
a848054
+.Xr update-crypto-policies 8 .
a848054
+.Pp
51f5c1c
 Specifies which algorithms are allowed for signing of certificates
51f5c1c
 by certificate authorities (CAs).
51f5c1c
-The default is:
51f5c1c
-.Bd -literal -offset indent
51f5c1c
-ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
51f5c1c
-ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa
51f5c1c
-.Ed
51f5c1c
-.Pp
51f5c1c
 .Xr ssh 1
51f5c1c
 will not accept host certificates signed using algorithms other than those
51f5c1c
 specified.
51f5c1c
+.Pp
a848054
 .It Cm CertificateFile
a848054
 Specifies a file from which the user's certificate is read.
a848054
 A corresponding private key must be provided separately in order
a848054
@@ -424,20 +424,25 @@ If the option is set to
a848054
 .Cm no ,
a848054
 the check will not be executed.
a848054
 .It Cm Ciphers
51f5c1c
+The default is handled system-wide by
51f5c1c
+.Xr crypto-policies 7 .
51f5c1c
+To see the defaults and how to modify this default, see manual page
51f5c1c
+.Xr update-crypto-policies 8 .
51f5c1c
+.Pp
a848054
 Specifies the ciphers allowed and their order of preference.
a848054
 Multiple ciphers must be comma-separated.
a848054
 If the specified list begins with a
a848054
 .Sq +
a848054
-character, then the specified ciphers will be appended to the default set
9c88962
-instead of replacing them.
9c88962
+character, then the specified ciphers will be appended to the built-in
9c88962
+openssh default set instead of replacing them.
a848054
 If the specified list begins with a
a848054
 .Sq -
a848054
 character, then the specified ciphers (including wildcards) will be removed
a848054
-from the default set instead of replacing them.
9c88962
+from the built-in openssh default set instead of replacing them.
a848054
 If the specified list begins with a
a848054
 .Sq ^
a848054
 character, then the specified ciphers will be placed at the head of the
a848054
-default set.
9c88962
+built-in openssh default set.
a848054
 .Pp
a848054
 The supported ciphers are:
a848054
 .Bd -literal -offset indent
a848054
@@ -453,13 +458,6 @@ aes256-gcm@openssh.com
6caa973
 chacha20-poly1305@openssh.com
6caa973
 .Ed
6caa973
 .Pp
6caa973
-The default is:
6caa973
-.Bd -literal -offset indent
6caa973
-chacha20-poly1305@openssh.com,
6caa973
-aes128-ctr,aes192-ctr,aes256-ctr,
6caa973
-aes128-gcm@openssh.com,aes256-gcm@openssh.com
6caa973
-.Ed
a848054
-.Pp
a848054
 The list of available ciphers may also be obtained using
a848054
 .Qq ssh -Q cipher .
a848054
 .It Cm ClearAllForwardings
a848054
@@ -812,6 +810,11 @@ command line will be passed untouched to
a848054
 The default is
a848054
 .Dq no .
a848054
 .It Cm GSSAPIKexAlgorithms
6caa973
+The default is handled system-wide by
6caa973
+.Xr crypto-policies 7 .
fdbd5bc
+To see the defaults and how to modify this default, see manual page
6caa973
+.Xr update-crypto-policies 8 .
a848054
+.Pp
a848054
 The list of key exchange algorithms that are offered for GSSAPI
a848054
 key exchange. Possible values are
a848054
 .Bd -literal -offset 3n
a848054
@@ -824,10 +827,8 @@ gss-nistp256-sha256-,
6caa973
 gss-curve25519-sha256-
6caa973
 .Ed
6caa973
 .Pp
6caa973
-The default is
1cc7c87
-.Dq gss-group14-sha256-,gss-group16-sha512-,gss-nistp256-sha256-,
1cc7c87
-gss-curve25519-sha256-,gss-group14-sha1-,gss-gex-sha1- .
a848054
 This option only applies to connections using GSSAPI.
a848054
+.Pp
a848054
 .It Cm HashKnownHosts
a848054
 Indicates that
a848054
 .Xr ssh 1
a848054
@@ -1149,29 +1150,25 @@ it may be zero or more of:
a848054
 and
a848054
 .Cm pam .
a848054
 .It Cm KexAlgorithms
6caa973
+The default is handled system-wide by
6caa973
+.Xr crypto-policies 7 .
fdbd5bc
+To see the defaults and how to modify this default, see manual page
6caa973
+.Xr update-crypto-policies 8 .
a848054
+.Pp
a848054
 Specifies the available KEX (Key Exchange) algorithms.
a848054
 Multiple algorithms must be comma-separated.
a848054
 If the specified list begins with a
a848054
 .Sq +
a848054
-character, then the specified methods will be appended to the default set
9c88962
-instead of replacing them.
9c88962
+character, then the specified methods will be appended to the built-in
9c88962
+openssh default set instead of replacing them.
a848054
 If the specified list begins with a
a848054
 .Sq -
a848054
 character, then the specified methods (including wildcards) will be removed
a848054
-from the default set instead of replacing them.
9c88962
+from the built-in openssh default set instead of replacing them.
a848054
 If the specified list begins with a
36fef56
 .Sq ^
36fef56
 character, then the specified methods will be placed at the head of the
a848054
-default set.
6caa973
-The default is:
6caa973
-.Bd -literal -offset indent
6caa973
-curve25519-sha256,curve25519-sha256@libssh.org,
6caa973
-ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,
6caa973
-diffie-hellman-group-exchange-sha256,
6caa973
-diffie-hellman-group16-sha512,
6caa973
-diffie-hellman-group18-sha512,
51f5c1c
-diffie-hellman-group14-sha256
6caa973
-.Ed
9c88962
+built-in openssh default set.
a848054
 .Pp
a848054
 The list of available key exchange algorithms may also be obtained using
a848054
 .Qq ssh -Q kex .
a848054
@@ -1231,37 +1228,33 @@ The default is INFO.
a848054
 DEBUG and DEBUG1 are equivalent.
a848054
 DEBUG2 and DEBUG3 each specify higher levels of verbose output.
a848054
 .It Cm MACs
6caa973
+The default is handled system-wide by
6caa973
+.Xr crypto-policies 7 .
fdbd5bc
+To see the defaults and how to modify this default, see manual page
6caa973
+.Xr update-crypto-policies 8 .
a848054
+.Pp
a848054
 Specifies the MAC (message authentication code) algorithms
a848054
 in order of preference.
a848054
 The MAC algorithm is used for data integrity protection.
a848054
 Multiple algorithms must be comma-separated.
a848054
 If the specified list begins with a
a848054
 .Sq +
a848054
-character, then the specified algorithms will be appended to the default set
9c88962
-instead of replacing them.
9c88962
+character, then the specified algorithms will be appended to the built-in
9c88962
+openssh default set instead of replacing them.
a848054
 If the specified list begins with a
a848054
 .Sq -
a848054
 character, then the specified algorithms (including wildcards) will be removed
a848054
-from the default set instead of replacing them.
9c88962
+from the built-in openssh default set instead of replacing them.
a848054
 If the specified list begins with a
a848054
 .Sq ^
a848054
 character, then the specified algorithms will be placed at the head of the
a848054
-default set.
9c88962
+built-in openssh default set.
6caa973
 .Pp
a848054
 The algorithms that contain
a848054
 .Qq -etm
6caa973
 calculate the MAC after encryption (encrypt-then-mac).
6caa973
 These are considered safer and their use recommended.
6caa973
 .Pp
6caa973
-The default is:
6caa973
-.Bd -literal -offset indent
6caa973
-umac-64-etm@openssh.com,umac-128-etm@openssh.com,
6caa973
-hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,
6caa973
-hmac-sha1-etm@openssh.com,
6caa973
-umac-64@openssh.com,umac-128@openssh.com,
6caa973
-hmac-sha2-256,hmac-sha2-512,hmac-sha1
6caa973
-.Ed
a848054
-.Pp
a848054
 The list of available MAC algorithms may also be obtained using
a848054
 .Qq ssh -Q mac .
a848054
 .It Cm NoHostAuthenticationForLocalhost
a848054
@@ -1394,36 +1387,25 @@ instead of continuing to execute and pas
a848054
 The default is
a848054
 .Cm no .
a848054
 .It Cm PubkeyAcceptedKeyTypes
6caa973
+The default is handled system-wide by
6caa973
+.Xr crypto-policies 7 .
fdbd5bc
+To see the defaults and how to modify this default, see manual page
6caa973
+.Xr update-crypto-policies 8 .
a848054
+.Pp
a848054
 Specifies the key types that will be used for public key authentication
a848054
 as a comma-separated list of patterns.
a848054
 If the specified list begins with a
a848054
 .Sq +
a848054
-character, then the key types after it will be appended to the default
9c88962
-instead of replacing it.
9c88962
+character, then the key types after it will be appended to the built-in
9c88962
+openssh default instead of replacing it.
a848054
 If the specified list begins with a
a848054
 .Sq -
a848054
 character, then the specified key types (including wildcards) will be removed
a848054
-from the default set instead of replacing them.
9c88962
+from the built-in openssh default set instead of replacing them.
a848054
 If the specified list begins with a
36fef56
 .Sq ^
36fef56
 character, then the specified key types will be placed at the head of the
a848054
-default set.
6caa973
-The default for this option is:
6caa973
-.Bd -literal -offset 3n
6caa973
-ecdsa-sha2-nistp256-cert-v01@openssh.com,
6caa973
-ecdsa-sha2-nistp384-cert-v01@openssh.com,
6caa973
-ecdsa-sha2-nistp521-cert-v01@openssh.com,
51f5c1c
-sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
6caa973
-ssh-ed25519-cert-v01@openssh.com,
51f5c1c
-sk-ssh-ed25519-cert-v01@openssh.com,
51f5c1c
-rsa-sha2-512-cert-v01@openssh.com,
51f5c1c
-rsa-sha2-256-cert-v01@openssh.com,
6caa973
-ssh-rsa-cert-v01@openssh.com,
6caa973
-ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
51f5c1c
-sk-ecdsa-sha2-nistp256@openssh.com,
51f5c1c
-ssh-ed25519,sk-ssh-ed25519@openssh.com,
51f5c1c
-rsa-sha2-512,rsa-sha2-256,ssh-rsa
6caa973
-.Ed
9c88962
+built-in openssh default set.
6caa973
 .Pp
6caa973
 The list of available key types may also be obtained using
51f5c1c
 .Qq ssh -Q PubkeyAcceptedKeyTypes .
a848054
diff -up openssh-8.2p1/sshd_config.5.crypto-policies openssh-8.2p1/sshd_config.5
a848054
--- openssh-8.2p1/sshd_config.5.crypto-policies	2020-03-26 14:40:44.530775355 +0100
a848054
+++ openssh-8.2p1/sshd_config.5	2020-03-26 14:48:56.732468099 +0100
a848054
@@ -375,16 +375,16 @@ If the argument is
a848054
 then no banner is displayed.
a848054
 By default, no banner is displayed.
51f5c1c
 .It Cm CASignatureAlgorithms
a848054
+The default is handled system-wide by
a848054
+.Xr crypto-policies 7 .
a848054
+To see the defaults and how to modify this default, see manual page
a848054
+.Xr update-crypto-policies 8 .
a848054
+.Pp
51f5c1c
 Specifies which algorithms are allowed for signing of certificates
51f5c1c
 by certificate authorities (CAs).
51f5c1c
-The default is:
51f5c1c
-.Bd -literal -offset indent
51f5c1c
-ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
51f5c1c
-ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa
51f5c1c
-.Ed
51f5c1c
-.Pp
51f5c1c
 Certificates signed using other algorithms will not be accepted for
51f5c1c
 public key or host-based authentication.
51f5c1c
+.Pp
a848054
 .It Cm ChallengeResponseAuthentication
a848054
 Specifies whether challenge-response authentication is allowed (e.g. via
a848054
 PAM or through authentication styles supported in
a848054
@@ -446,20 +446,25 @@ The default is
a848054
 indicating not to
a848054
 .Xr chroot 2 .
a848054
 .It Cm Ciphers
51f5c1c
+The default is handled system-wide by
51f5c1c
+.Xr crypto-policies 7 .
51f5c1c
+To see the defaults and how to modify this default, see manual page
51f5c1c
+.Xr update-crypto-policies 8 .
51f5c1c
+.Pp
a848054
 Specifies the ciphers allowed.
a848054
 Multiple ciphers must be comma-separated.
a848054
 If the specified list begins with a
a848054
 .Sq +
a848054
-character, then the specified ciphers will be appended to the default set
9c88962
-instead of replacing them.
9c88962
+character, then the specified ciphers will be appended to the built-in
9c88962
+openssh default set instead of replacing them.
a848054
 If the specified list begins with a
a848054
 .Sq -
a848054
 character, then the specified ciphers (including wildcards) will be removed
a848054
-from the default set instead of replacing them.
9c88962
+from the built-in openssh default set instead of replacing them.
a848054
 If the specified list begins with a
a848054
 .Sq ^
a848054
 character, then the specified ciphers will be placed at the head of the
a848054
-default set.
9c88962
+built-in openssh default set.
a848054
 .Pp
a848054
 The supported ciphers are:
a848054
 .Pp
a848054
@@ -486,13 +491,6 @@ aes256-gcm@openssh.com
6caa973
 chacha20-poly1305@openssh.com
6caa973
 .El
6caa973
 .Pp
6caa973
-The default is:
6caa973
-.Bd -literal -offset indent
6caa973
-chacha20-poly1305@openssh.com,
6caa973
-aes128-ctr,aes192-ctr,aes256-ctr,
6caa973
-aes128-gcm@openssh.com,aes256-gcm@openssh.com
6caa973
-.Ed
a848054
-.Pp
a848054
 The list of available ciphers may also be obtained using
a848054
 .Qq ssh -Q cipher .
a848054
 .It Cm ClientAliveCountMax
a848054
@@ -681,22 +679,24 @@ For this to work
a848054
 .Cm GSSAPIKeyExchange
a848054
 needs to be enabled in the server and also used by the client.
a848054
 .It Cm GSSAPIKexAlgorithms
6caa973
+The default is handled system-wide by
6caa973
+.Xr crypto-policies 7 .
fdbd5bc
+To see the defaults and how to modify this default, see manual page
6caa973
+.Xr update-crypto-policies 8 .
a848054
+.Pp
a848054
 The list of key exchange algorithms that are accepted by GSSAPI
a848054
 key exchange. Possible values are
a848054
 .Bd -literal -offset 3n
a848054
-gss-gex-sha1-,
a848054
-gss-group1-sha1-,
a848054
-gss-group14-sha1-,
a848054
-gss-group14-sha256-,
a848054
-gss-group16-sha512-,
a848054
-gss-nistp256-sha256-,
a848054
+gss-gex-sha1-
a848054
+gss-group1-sha1-
a848054
+gss-group14-sha1-
a848054
+gss-group14-sha256-
a848054
+gss-group16-sha512-
a848054
+gss-nistp256-sha256-
6caa973
 gss-curve25519-sha256-
6caa973
 .Ed
a848054
-.Pp
6caa973
-The default is
1cc7c87
-.Dq gss-group14-sha256-,gss-group16-sha512-,gss-nistp256-sha256-,
1cc7c87
-gss-curve25519-sha256-,gss-group14-sha1-,gss-gex-sha1- .
1cc7c87
 This option only applies to connections using GSSAPI.
a848054
+.Pp
6caa973
 .It Cm HostbasedAcceptedKeyTypes
6caa973
 Specifies the key types that will be accepted for hostbased authentication
a848054
 as a list of comma-separated patterns.
a848054
@@ -793,25 +793,13 @@ is specified, the location of the socket
a848054
 .Ev SSH_AUTH_SOCK
a848054
 environment variable.
6caa973
 .It Cm HostKeyAlgorithms
a848054
+The default is handled system-wide by
a848054
+.Xr crypto-policies 7 .
a848054
+To see the defaults and how to modify this default, see manual page
a848054
+.Xr update-crypto-policies 8 .
a848054
+.Pp
6caa973
 Specifies the host key algorithms
6caa973
 that the server offers.
6caa973
-The default for this option is:
6caa973
-.Bd -literal -offset 3n
6caa973
-ecdsa-sha2-nistp256-cert-v01@openssh.com,
6caa973
-ecdsa-sha2-nistp384-cert-v01@openssh.com,
6caa973
-ecdsa-sha2-nistp521-cert-v01@openssh.com,
51f5c1c
-sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
6caa973
-ssh-ed25519-cert-v01@openssh.com,
51f5c1c
-sk-ssh-ed25519-cert-v01@openssh.com,
51f5c1c
-rsa-sha2-512-cert-v01@openssh.com,
51f5c1c
-rsa-sha2-256-cert-v01@openssh.com,
6caa973
-ssh-rsa-cert-v01@openssh.com,
6caa973
-ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
51f5c1c
-sk-ecdsa-sha2-nistp256@openssh.com,
51f5c1c
-ssh-ed25519,sk-ssh-ed25519@openssh.com,
51f5c1c
-rsa-sha2-512,rsa-sha2-256,ssh-rsa
6caa973
-.Ed
a848054
-.Pp
a848054
 The list of available key types may also be obtained using
a848054
 .Qq ssh -Q HostKeyAlgorithms .
a848054
 .It Cm IgnoreRhosts
a848054
@@ -943,20 +931,25 @@ Specifies whether to look at .k5login fi
a848054
 The default is
a848054
 .Cm yes .
a848054
 .It Cm KexAlgorithms
6caa973
+The default is handled system-wide by
6caa973
+.Xr crypto-policies 7 .
fdbd5bc
+To see the defaults and how to modify this default, see manual page
6caa973
+.Xr update-crypto-policies 8 .
a848054
+.Pp
a848054
 Specifies the available KEX (Key Exchange) algorithms.
a848054
 Multiple algorithms must be comma-separated.
a848054
 Alternately if the specified list begins with a
a848054
 .Sq +
a848054
-character, then the specified methods will be appended to the default set
9c88962
-instead of replacing them.
9c88962
+character, then the specified methods will be appended to the built-in
9c88962
+openssh default set instead of replacing them.
a848054
 If the specified list begins with a
a848054
 .Sq -
a848054
 character, then the specified methods (including wildcards) will be removed
a848054
-from the default set instead of replacing them.
9c88962
+from the built-in openssh default set instead of replacing them.
a848054
 If the specified list begins with a
a848054
 .Sq ^
a848054
 character, then the specified methods will be placed at the head of the
a848054
-default set.
9c88962
+built-in openssh default set.
a848054
 The supported algorithms are:
6caa973
 .Pp
a848054
 .Bl -item -compact -offset indent
a848054
@@ -988,15 +981,6 @@ ecdh-sha2-nistp521
51f5c1c
 sntrup4591761x25519-sha512@tinyssh.org
6caa973
 .El
6caa973
 .Pp
6caa973
-The default is:
6caa973
-.Bd -literal -offset indent
6caa973
-curve25519-sha256,curve25519-sha256@libssh.org,
6caa973
-ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,
6caa973
-diffie-hellman-group-exchange-sha256,
6caa973
-diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,
51f5c1c
-diffie-hellman-group14-sha256
6caa973
-.Ed
a848054
-.Pp
a848054
 The list of available key exchange algorithms may also be obtained using
a848054
 .Qq ssh -Q KexAlgorithms .
a848054
 .It Cm ListenAddress
a848054
@@ -1065,21 +1049,26 @@ DEBUG and DEBUG1 are equivalent.
a848054
 DEBUG2 and DEBUG3 each specify higher levels of debugging output.
a848054
 Logging with a DEBUG level violates the privacy of users and is not recommended.
a848054
 .It Cm MACs
6caa973
+The default is handled system-wide by
6caa973
+.Xr crypto-policies 7 .
fdbd5bc
+To see the defaults and how to modify this default, see manual page
6caa973
+.Xr update-crypto-policies 8 .
a848054
+.Pp
a848054
 Specifies the available MAC (message authentication code) algorithms.
a848054
 The MAC algorithm is used for data integrity protection.
a848054
 Multiple algorithms must be comma-separated.
a848054
 If the specified list begins with a
a848054
 .Sq +
a848054
-character, then the specified algorithms will be appended to the default set
9c88962
-instead of replacing them.
9c88962
+character, then the specified algorithms will be appended to the built-in
9c88962
+openssh default set instead of replacing them.
a848054
 If the specified list begins with a
a848054
 .Sq -
a848054
 character, then the specified algorithms (including wildcards) will be removed
a848054
-from the default set instead of replacing them.
9c88962
+from the built-in openssh default set instead of replacing them.
a848054
 If the specified list begins with a
a848054
 .Sq ^
a848054
 character, then the specified algorithms will be placed at the head of the
a848054
-default set.
9c88962
+built-in openssh default set.
6caa973
 .Pp
a848054
 The algorithms that contain
a848054
 .Qq -etm
a848054
@@ -1122,15 +1111,6 @@ umac-64-etm@openssh.com
6caa973
 umac-128-etm@openssh.com
6caa973
 .El
6caa973
 .Pp
6caa973
-The default is:
6caa973
-.Bd -literal -offset indent
6caa973
-umac-64-etm@openssh.com,umac-128-etm@openssh.com,
6caa973
-hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,
6caa973
-hmac-sha1-etm@openssh.com,
6caa973
-umac-64@openssh.com,umac-128@openssh.com,
6caa973
-hmac-sha2-256,hmac-sha2-512,hmac-sha1
6caa973
-.Ed
a848054
-.Pp
a848054
 The list of available MAC algorithms may also be obtained using
a848054
 .Qq ssh -Q mac .
a848054
 .It Cm Match
a848054
@@ -1480,36 +1460,25 @@ or equivalent.)
a848054
 The default is
a848054
 .Cm yes .
a848054
 .It Cm PubkeyAcceptedKeyTypes
6caa973
+The default is handled system-wide by
6caa973
+.Xr crypto-policies 7 .
fdbd5bc
+To see the defaults and how to modify this default, see manual page
6caa973
+.Xr update-crypto-policies 8 .
a848054
+.Pp
a848054
 Specifies the key types that will be accepted for public key authentication
a848054
 as a list of comma-separated patterns.
a848054
 Alternately if the specified list begins with a
a848054
 .Sq +
a848054
-character, then the specified key types will be appended to the default set
9c88962
-instead of replacing them.
9c88962
+character, then the specified key types will be appended to the built-in
9c88962
+openssh default set instead of replacing them.
a848054
 If the specified list begins with a
a848054
 .Sq -
a848054
 character, then the specified key types (including wildcards) will be removed
a848054
-from the default set instead of replacing them.
9c88962
+from the built-in openssh default set instead of replacing them.
a848054
 If the specified list begins with a
36fef56
 .Sq ^
36fef56
 character, then the specified key types will be placed at the head of the
a848054
-default set.
6caa973
-The default for this option is:
6caa973
-.Bd -literal -offset 3n
6caa973
-ecdsa-sha2-nistp256-cert-v01@openssh.com,
6caa973
-ecdsa-sha2-nistp384-cert-v01@openssh.com,
6caa973
-ecdsa-sha2-nistp521-cert-v01@openssh.com,
51f5c1c
-sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
6caa973
-ssh-ed25519-cert-v01@openssh.com,
51f5c1c
-sk-ssh-ed25519-cert-v01@openssh.com,
51f5c1c
-rsa-sha2-512-cert-v01@openssh.com,
51f5c1c
-rsa-sha2-256-cert-v01@openssh.com,
6caa973
-ssh-rsa-cert-v01@openssh.com,
6caa973
-ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
51f5c1c
-sk-ecdsa-sha2-nistp256@openssh.com,
51f5c1c
-ssh-ed25519,sk-ssh-ed25519@openssh.com,
51f5c1c
-rsa-sha2-512,rsa-sha2-256,ssh-rsa
6caa973
-.Ed
9c88962
+built-in openssh default set.
6caa973
 .Pp
6caa973
 The list of available key types may also be obtained using
51f5c1c
 .Qq ssh -Q PubkeyAcceptedKeyTypes .