diff --git a/documentation/content/en/books/handbook/security/_index.adoc b/documentation/content/en/books/handbook/security/_index.adoc --- a/documentation/content/en/books/handbook/security/_index.adoc +++ b/documentation/content/en/books/handbook/security/_index.adoc @@ -1576,7 +1576,6 @@ OpenSSH encrypts all traffic to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks. OpenSSH is maintained by the OpenBSD project and is installed by default in FreeBSD. -It is compatible with both SSH version 1 and 2 protocols. When data is sent over the network in an unencrypted form, network sniffers anywhere in between the client and server can steal user/password information or data transferred during the session. OpenSSH offers a variety of authentication and encryption methods to prevent this from happening. @@ -1606,10 +1605,8 @@ Future attempts to login are verified against the saved key and `ssh` will display an alert if the server's key does not match the saved key. If this occurs, the user should first verify why the key has changed before continuing with the connection. -By default, recent versions of OpenSSH only accept SSHv2 connections. -By default, the client will use version 2 if possible and will fall back to version 1 if the server does not support version 2. -To force `ssh` to only use the specified protocol, include `-1` or `-2`. -Additional options are described in man:ssh[1]. +Recent versions of OpenSSH only accept SSHv2 connections. +SSH protocol version 1 is obsolete. Use man:scp[1] to securely copy a file to or from a remote machine. This example copies [.filename]#COPYRIGHT# on the remote system to a file of the same name in the current directory of the local system: