summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2006-03-15 11:56:56 +1100
committerDamien Miller <djm@mindrot.org>2006-03-15 11:56:56 +1100
commit5b0d63f8943dc7f9029ba5171b2a23acfa97f7aa (patch)
tree2f0cd066c306ebfd61ebacd792160056af537014
parent45ee2b91e62eb382e0cd0c61a9b34c25b8efc36c (diff)
- jmc@cvs.openbsd.org 2006/02/24 23:43:57
[sshd_config.5] some grammar/wording fixes;
-rw-r--r--ChangeLog5
-rw-r--r--sshd_config.5107
2 files changed, 54 insertions, 58 deletions
diff --git a/ChangeLog b/ChangeLog
index a24b2d025..18298750c 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -172,6 +172,9 @@
172 - jmc@cvs.openbsd.org 2006/02/24 23:20:07 172 - jmc@cvs.openbsd.org 2006/02/24 23:20:07
173 [ssh_config.5] 173 [ssh_config.5]
174 some grammar/wording fixes; 174 some grammar/wording fixes;
175 - jmc@cvs.openbsd.org 2006/02/24 23:43:57
176 [sshd_config.5]
177 some grammar/wording fixes;
175 178
17620060313 17920060313
177 - (dtucker) [configure.ac] Bug #1171: Don't use printf("%lld", longlong) 180 - (dtucker) [configure.ac] Bug #1171: Don't use printf("%lld", longlong)
@@ -4073,4 +4076,4 @@
4073 - (djm) Trim deprecated options from INSTALL. Mention UsePAM 4076 - (djm) Trim deprecated options from INSTALL. Mention UsePAM
4074 - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu 4077 - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
4075 4078
4076$Id: ChangeLog,v 1.4188 2006/03/15 00:56:18 djm Exp $ 4079$Id: ChangeLog,v 1.4189 2006/03/15 00:56:56 djm Exp $
diff --git a/sshd_config.5 b/sshd_config.5
index 642e1fa29..6f60d7e84 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: sshd_config.5,v 1.51 2006/02/24 20:31:31 jmc Exp $ 37.\" $OpenBSD: sshd_config.5,v 1.52 2006/02/24 23:43:57 jmc Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSHD_CONFIG 5 39.Dt SSHD_CONFIG 5
40.Os 40.Os
@@ -89,7 +89,7 @@ Specifies which address family should be used by
89Valid arguments are 89Valid arguments are
90.Dq any , 90.Dq any ,
91.Dq inet 91.Dq inet
92(use IPv4 only) or 92(use IPv4 only), or
93.Dq inet6 93.Dq inet6
94(use IPv6 only). 94(use IPv6 only).
95The default is 95The default is
@@ -135,9 +135,9 @@ Specifies the file that contains the public keys that can be used
135for user authentication. 135for user authentication.
136.Cm AuthorizedKeysFile 136.Cm AuthorizedKeysFile
137may contain tokens of the form %T which are substituted during connection 137may contain tokens of the form %T which are substituted during connection
138set-up. 138setup.
139The following tokens are defined: %% is replaced by a literal '%', 139The following tokens are defined: %% is replaced by a literal '%',
140%h is replaced by the home directory of the user being authenticated and 140%h is replaced by the home directory of the user being authenticated, and
141%u is replaced by the username of that user. 141%u is replaced by the username of that user.
142After expansion, 142After expansion,
143.Cm AuthorizedKeysFile 143.Cm AuthorizedKeysFile
@@ -176,20 +176,19 @@ The supported ciphers are
176.Dq blowfish-cbc , 176.Dq blowfish-cbc ,
177and 177and
178.Dq cast128-cbc . 178.Dq cast128-cbc .
179The default is 179The default is:
180.Bd -literal 180.Bd -literal -offset 3n
181 ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128, 181aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,
182 arcfour256,arcfour,aes192-cbc,aes256-cbc,aes128-ctr, 182arcfour256,arcfour,aes192-cbc,aes256-cbc,aes128-ctr,
183 aes192-ctr,aes256-ctr'' 183aes192-ctr,aes256-ctr
184.Ed 184.Ed
185.It Cm ClientAliveCountMax 185.It Cm ClientAliveCountMax
186Sets the number of client alive messages (see below) which may be 186Sets the number of client alive messages (see below) which may be
187sent without 187sent without
188.Nm sshd 188.Xr sshd 8
189receiving any messages back from the client. 189receiving any messages back from the client.
190If this threshold is reached while client alive messages are being sent, 190If this threshold is reached while client alive messages are being sent,
191.Nm sshd 191sshd will disconnect the client, terminating the session.
192will disconnect the client, terminating the session.
193It is important to note that the use of client alive messages is very 192It is important to note that the use of client alive messages is very
194different from 193different from
195.Cm TCPKeepAlive 194.Cm TCPKeepAlive
@@ -207,12 +206,12 @@ If
207.Cm ClientAliveInterval 206.Cm ClientAliveInterval
208(see below) is set to 15, and 207(see below) is set to 15, and
209.Cm ClientAliveCountMax 208.Cm ClientAliveCountMax
210is left at the default, unresponsive ssh clients 209is left at the default, unresponsive SSH clients
211will be disconnected after approximately 45 seconds. 210will be disconnected after approximately 45 seconds.
212.It Cm ClientAliveInterval 211.It Cm ClientAliveInterval
213Sets a timeout interval in seconds after which if no data has been received 212Sets a timeout interval in seconds after which if no data has been received
214from the client, 213from the client,
215.Nm sshd 214.Xr sshd 8
216will send a message through the encrypted 215will send a message through the encrypted
217channel to request a response from the client. 216channel to request a response from the client.
218The default 217The default
@@ -260,12 +259,11 @@ for more information on patterns.
260Specifies whether remote hosts are allowed to connect to ports 259Specifies whether remote hosts are allowed to connect to ports
261forwarded for the client. 260forwarded for the client.
262By default, 261By default,
263.Nm sshd 262.Xr sshd 8
264binds remote port forwardings to the loopback address. 263binds remote port forwardings to the loopback address.
265This prevents other remote hosts from connecting to forwarded ports. 264This prevents other remote hosts from connecting to forwarded ports.
266.Cm GatewayPorts 265.Cm GatewayPorts
267can be used to specify that 266can be used to specify that sshd
268.Nm sshd
269should allow remote port forwardings to bind to non-loopback addresses, thus 267should allow remote port forwardings to bind to non-loopback addresses, thus
270allowing other hosts to connect. 268allowing other hosts to connect.
271The argument may be 269The argument may be
@@ -308,7 +306,7 @@ and
308.Pa /etc/ssh/ssh_host_dsa_key 306.Pa /etc/ssh/ssh_host_dsa_key
309for protocol version 2. 307for protocol version 2.
310Note that 308Note that
311.Nm sshd 309.Xr sshd 8
312will refuse to use a file if it is group/world-accessible. 310will refuse to use a file if it is group/world-accessible.
313It is possible to have multiple host key files. 311It is possible to have multiple host key files.
314.Dq rsa1 312.Dq rsa1
@@ -335,7 +333,7 @@ The default is
335.Dq yes . 333.Dq yes .
336.It Cm IgnoreUserKnownHosts 334.It Cm IgnoreUserKnownHosts
337Specifies whether 335Specifies whether
338.Nm sshd 336.Xr sshd 8
339should ignore the user's 337should ignore the user's
340.Pa ~/.ssh/known_hosts 338.Pa ~/.ssh/known_hosts
341during 339during
@@ -350,24 +348,24 @@ Specifies whether the password provided by the user for
350will be validated through the Kerberos KDC. 348will be validated through the Kerberos KDC.
351To use this option, the server needs a 349To use this option, the server needs a
352Kerberos servtab which allows the verification of the KDC's identity. 350Kerberos servtab which allows the verification of the KDC's identity.
353Default is 351The default is
354.Dq no . 352.Dq no .
355.It Cm KerberosGetAFSToken 353.It Cm KerberosGetAFSToken
356If AFS is active and the user has a Kerberos 5 TGT, attempt to acquire 354If AFS is active and the user has a Kerberos 5 TGT, attempt to acquire
357an AFS token before accessing the user's home directory. 355an AFS token before accessing the user's home directory.
358Default is 356The default is
359.Dq no . 357.Dq no .
360.It Cm KerberosOrLocalPasswd 358.It Cm KerberosOrLocalPasswd
361If set then if password authentication through Kerberos fails then 359If password authentication through Kerberos fails then
362the password will be validated via any additional local mechanism 360the password will be validated via any additional local mechanism
363such as 361such as
364.Pa /etc/passwd . 362.Pa /etc/passwd .
365Default is 363The default is
366.Dq yes . 364.Dq yes .
367.It Cm KerberosTicketCleanup 365.It Cm KerberosTicketCleanup
368Specifies whether to automatically destroy the user's ticket cache 366Specifies whether to automatically destroy the user's ticket cache
369file on logout. 367file on logout.
370Default is 368The default is
371.Dq yes . 369.Dq yes .
372.It Cm KeyRegenerationInterval 370.It Cm KeyRegenerationInterval
373In protocol version 1, the ephemeral server key is automatically regenerated 371In protocol version 1, the ephemeral server key is automatically regenerated
@@ -380,7 +378,7 @@ If the value is 0, the key is never regenerated.
380The default is 3600 (seconds). 378The default is 3600 (seconds).
381.It Cm ListenAddress 379.It Cm ListenAddress
382Specifies the local addresses 380Specifies the local addresses
383.Nm sshd 381.Xr sshd 8
384should listen on. 382should listen on.
385The following forms may be used: 383The following forms may be used:
386.Pp 384.Pp
@@ -406,8 +404,7 @@ The following forms may be used:
406If 404If
407.Ar port 405.Ar port
408is not specified, 406is not specified,
409.Nm sshd 407sshd will listen on the address and all prior
410will listen on the address and all prior
411.Cm Port 408.Cm Port
412options specified. 409options specified.
413The default is to listen on all local addresses. 410The default is to listen on all local addresses.
@@ -416,7 +413,7 @@ Multiple
416options are permitted. 413options are permitted.
417Additionally, any 414Additionally, any
418.Cm Port 415.Cm Port
419options must precede this option for non port qualified addresses. 416options must precede this option for non-port qualified addresses.
420.It Cm LoginGraceTime 417.It Cm LoginGraceTime
421The server disconnects after this time if the user has not 418The server disconnects after this time if the user has not
422successfully logged in. 419successfully logged in.
@@ -426,7 +423,7 @@ The default is 120 seconds.
426Gives the verbosity level that is used when logging messages from 423Gives the verbosity level that is used when logging messages from
427.Nm sshd . 424.Nm sshd .
428The possible values are: 425The possible values are:
429QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3. 426QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2, and DEBUG3.
430The default is INFO. 427The default is INFO.
431DEBUG and DEBUG1 are equivalent. 428DEBUG and DEBUG1 are equivalent.
432DEBUG2 and DEBUG3 each specify higher levels of debugging output. 429DEBUG2 and DEBUG3 each specify higher levels of debugging output.
@@ -436,7 +433,7 @@ Specifies the available MAC (message authentication code) algorithms.
436The MAC algorithm is used in protocol version 2 433The MAC algorithm is used in protocol version 2
437for data integrity protection. 434for data integrity protection.
438Multiple algorithms must be comma-separated. 435Multiple algorithms must be comma-separated.
439The default is 436The default is:
440.Dq hmac-md5,hmac-sha1,hmac-ripemd160,hmac-sha1-96,hmac-md5-96 . 437.Dq hmac-md5,hmac-sha1,hmac-ripemd160,hmac-sha1-96,hmac-md5-96 .
441.It Cm MaxAuthTries 438.It Cm MaxAuthTries
442Specifies the maximum number of authentication attempts permitted per 439Specifies the maximum number of authentication attempts permitted per
@@ -446,8 +443,7 @@ additional failures are logged.
446The default is 6. 443The default is 6.
447.It Cm MaxStartups 444.It Cm MaxStartups
448Specifies the maximum number of concurrent unauthenticated connections to the 445Specifies the maximum number of concurrent unauthenticated connections to the
449.Nm sshd 446SSH daemon.
450daemon.
451Additional connections will be dropped until authentication succeeds or the 447Additional connections will be dropped until authentication succeeds or the
452.Cm LoginGraceTime 448.Cm LoginGraceTime
453expires for a connection. 449expires for a connection.
@@ -484,18 +480,18 @@ Specifies whether root can log in using
484The argument must be 480The argument must be
485.Dq yes , 481.Dq yes ,
486.Dq without-password , 482.Dq without-password ,
487.Dq forced-commands-only 483.Dq forced-commands-only ,
488or 484or
489.Dq no . 485.Dq no .
490The default is 486The default is
491.Dq yes . 487.Dq yes .
492.Pp 488.Pp
493If this option is set to 489If this option is set to
494.Dq without-password 490.Dq without-password ,
495password authentication is disabled for root. 491password authentication is disabled for root.
496.Pp 492.Pp
497If this option is set to 493If this option is set to
498.Dq forced-commands-only 494.Dq forced-commands-only ,
499root login with public key authentication will be allowed, 495root login with public key authentication will be allowed,
500but only if the 496but only if the
501.Ar command 497.Ar command
@@ -505,7 +501,7 @@ normally not allowed).
505All other authentication methods are disabled for root. 501All other authentication methods are disabled for root.
506.Pp 502.Pp
507If this option is set to 503If this option is set to
508.Dq no 504.Dq no ,
509root is not allowed to log in. 505root is not allowed to log in.
510.It Cm PermitTunnel 506.It Cm PermitTunnel
511Specifies whether 507Specifies whether
@@ -514,7 +510,7 @@ device forwarding is allowed.
514The argument must be 510The argument must be
515.Dq yes , 511.Dq yes ,
516.Dq point-to-point , 512.Dq point-to-point ,
517.Dq ethernet 513.Dq ethernet ,
518or 514or
519.Dq no . 515.Dq no .
520The default is 516The default is
@@ -527,7 +523,7 @@ and
527options in 523options in
528.Pa ~/.ssh/authorized_keys 524.Pa ~/.ssh/authorized_keys
529are processed by 525are processed by
530.Nm sshd . 526.Xr sshd 8 .
531The default is 527The default is
532.Dq no . 528.Dq no .
533Enabling environment processing may enable users to bypass access 529Enabling environment processing may enable users to bypass access
@@ -541,7 +537,7 @@ The default is
541.Pa /var/run/sshd.pid . 537.Pa /var/run/sshd.pid .
542.It Cm Port 538.It Cm Port
543Specifies the port number that 539Specifies the port number that
544.Nm sshd 540.Xr sshd 8
545listens on. 541listens on.
546The default is 22. 542The default is 22.
547Multiple options of this type are permitted. 543Multiple options of this type are permitted.
@@ -549,14 +545,14 @@ See also
549.Cm ListenAddress . 545.Cm ListenAddress .
550.It Cm PrintLastLog 546.It Cm PrintLastLog
551Specifies whether 547Specifies whether
552.Nm sshd 548.Xr sshd 8
553should print the date and time of the last user login when a user logs 549should print the date and time of the last user login when a user logs
554in interactively. 550in interactively.
555The default is 551The default is
556.Dq yes . 552.Dq yes .
557.It Cm PrintMotd 553.It Cm PrintMotd
558Specifies whether 554Specifies whether
559.Nm sshd 555.Xr sshd 8
560should print 556should print
561.Pa /etc/motd 557.Pa /etc/motd
562when a user logs in interactively. 558when a user logs in interactively.
@@ -567,12 +563,12 @@ The default is
567.Dq yes . 563.Dq yes .
568.It Cm Protocol 564.It Cm Protocol
569Specifies the protocol versions 565Specifies the protocol versions
570.Nm sshd 566.Xr sshd 8
571supports. 567supports.
572The possible values are 568The possible values are
573.Dq 1 569.Sq 1
574and 570and
575.Dq 2 . 571.Sq 2 .
576Multiple versions must be comma-separated. 572Multiple versions must be comma-separated.
577The default is 573The default is
578.Dq 2,1 . 574.Dq 2,1 .
@@ -604,7 +600,7 @@ Defines the number of bits in the ephemeral protocol version 1 server key.
604The minimum value is 512, and the default is 768. 600The minimum value is 512, and the default is 768.
605.It Cm StrictModes 601.It Cm StrictModes
606Specifies whether 602Specifies whether
607.Nm sshd 603.Xr sshd 8
608should check file modes and ownership of the 604should check file modes and ownership of the
609user's files and home directory before accepting login. 605user's files and home directory before accepting login.
610This is normally desirable because novices sometimes accidentally leave their 606This is normally desirable because novices sometimes accidentally leave their
@@ -651,7 +647,7 @@ To disable TCP keepalive messages, the value should be set to
651.Dq no . 647.Dq no .
652.It Cm UseDNS 648.It Cm UseDNS
653Specifies whether 649Specifies whether
654.Nm sshd 650.Xr sshd 8
655should look up the remote host name and check that 651should look up the remote host name and check that
656the resolved host name for the remote IP address maps back to the 652the resolved host name for the remote IP address maps back to the
657very same IP address. 653very same IP address.
@@ -702,7 +698,7 @@ The default is
702.Dq no . 698.Dq no .
703.It Cm UsePrivilegeSeparation 699.It Cm UsePrivilegeSeparation
704Specifies whether 700Specifies whether
705.Nm sshd 701.Xr sshd 8
706separates privileges by creating an unprivileged child process 702separates privileges by creating an unprivileged child process
707to deal with incoming network traffic. 703to deal with incoming network traffic.
708After successful authentication, another process will be created that has 704After successful authentication, another process will be created that has
@@ -713,11 +709,9 @@ The default is
713.Dq yes . 709.Dq yes .
714.It Cm X11DisplayOffset 710.It Cm X11DisplayOffset
715Specifies the first display number available for 711Specifies the first display number available for
716.Nm sshd Ns 's 712.Xr sshd 8 Ns 's
717X11 forwarding. 713X11 forwarding.
718This prevents 714This prevents sshd from interfering with real X11 servers.
719.Nm sshd
720from interfering with real X11 servers.
721The default is 10. 715The default is 10.
722.It Cm X11Forwarding 716.It Cm X11Forwarding
723Specifies whether X11 forwarding is permitted. 717Specifies whether X11 forwarding is permitted.
@@ -730,14 +724,14 @@ The default is
730.Pp 724.Pp
731When X11 forwarding is enabled, there may be additional exposure to 725When X11 forwarding is enabled, there may be additional exposure to
732the server and to client displays if the 726the server and to client displays if the
733.Nm sshd 727.Xr sshd 8
734proxy display is configured to listen on the wildcard address (see 728proxy display is configured to listen on the wildcard address (see
735.Cm X11UseLocalhost 729.Cm X11UseLocalhost
736below), however this is not the default. 730below), though this is not the default.
737Additionally, the authentication spoofing and authentication data 731Additionally, the authentication spoofing and authentication data
738verification and substitution occur on the client side. 732verification and substitution occur on the client side.
739The security risk of using X11 forwarding is that the client's X11 733The security risk of using X11 forwarding is that the client's X11
740display server may be exposed to attack when the ssh client requests 734display server may be exposed to attack when the SSH client requests
741forwarding (see the warnings for 735forwarding (see the warnings for
742.Cm ForwardX11 736.Cm ForwardX11
743in 737in
@@ -755,12 +749,11 @@ X11 forwarding is automatically disabled if
755is enabled. 749is enabled.
756.It Cm X11UseLocalhost 750.It Cm X11UseLocalhost
757Specifies whether 751Specifies whether
758.Nm sshd 752.Xr sshd 8
759should bind the X11 forwarding server to the loopback address or to 753should bind the X11 forwarding server to the loopback address or to
760the wildcard address. 754the wildcard address.
761By default, 755By default,
762.Nm sshd 756sshd binds the forwarding server to the loopback address and sets the
763binds the forwarding server to the loopback address and sets the
764hostname part of the 757hostname part of the
765.Ev DISPLAY 758.Ev DISPLAY
766environment variable to 759environment variable to