summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDarren Tucker <dtucker@zip.com.au>2003-10-15 15:50:42 +1000
committerDarren Tucker <dtucker@zip.com.au>2003-10-15 15:50:42 +1000
commit1f20394e92afa417c1201506f9ae8683170ac496 (patch)
treedc4552b853891fb2fba19f404da087062622bf97
parent439ce0daf95fef595ba2592d16b17401a8bee135 (diff)
- jmc@cvs.openbsd.org 2003/10/08 08:27:36
[scp.1 scp.c sftp-server.8 sftp.1 sftp.c ssh.1 sshd.8] scp and sftp: add options list and sort options. options list requested by deraadt@ sshd: use same format as ssh ssh: remove wrong option from list sftp-server: Subsystem is documented in ssh_config(5), not sshd(8) ok deraadt@ markus@
-rw-r--r--ChangeLog13
-rw-r--r--scp.1168
-rw-r--r--scp.c6
-rw-r--r--sftp-server.85
-rw-r--r--sftp.1142
-rw-r--r--sftp.c12
-rw-r--r--ssh.13
-rw-r--r--sshd.885
8 files changed, 277 insertions, 157 deletions
diff --git a/ChangeLog b/ChangeLog
index ee86bb7c5..d2c3255c9 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,14 @@
120031015
2 - (dtucker) OpenBSD CVS Sync
3 - jmc@cvs.openbsd.org 2003/10/08 08:27:36
4 [scp.1 scp.c sftp-server.8 sftp.1 sftp.c ssh.1 sshd.8]
5 scp and sftp: add options list and sort options. options list requested
6 by deraadt@
7 sshd: use same format as ssh
8 ssh: remove wrong option from list
9 sftp-server: Subsystem is documented in ssh_config(5), not sshd(8)
10 ok deraadt@ markus@
11
120031009 1220031009
2 - (dtucker) [sshd_config.5] UsePAM defaults to "no". ok djm@ 13 - (dtucker) [sshd_config.5] UsePAM defaults to "no". ok djm@
3 14
@@ -1314,4 +1325,4 @@
1314 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo. 1325 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
1315 Report from murple@murple.net, diagnosis from dtucker@zip.com.au 1326 Report from murple@murple.net, diagnosis from dtucker@zip.com.au
1316 1327
1317$Id: ChangeLog,v 1.3069 2003/10/09 04:13:53 dtucker Exp $ 1328$Id: ChangeLog,v 1.3070 2003/10/15 05:50:42 dtucker Exp $
diff --git a/scp.1 b/scp.1
index a971500ee..bdc413337 100644
--- a/scp.1
+++ b/scp.1
@@ -9,7 +9,7 @@
9.\" 9.\"
10.\" Created: Sun May 7 00:14:37 1995 ylo 10.\" Created: Sun May 7 00:14:37 1995 ylo
11.\" 11.\"
12.\" $OpenBSD: scp.1,v 1.28 2003/06/10 09:12:11 jmc Exp $ 12.\" $OpenBSD: scp.1,v 1.29 2003/10/08 08:27:36 jmc Exp $
13.\" 13.\"
14.Dd September 25, 1999 14.Dd September 25, 1999
15.Dt SCP 1 15.Dt SCP 1
@@ -20,24 +20,24 @@
20.Sh SYNOPSIS 20.Sh SYNOPSIS
21.Nm scp 21.Nm scp
22.Bk -words 22.Bk -words
23.Op Fl pqrvBC1246 23.Op Fl 1246BCpqrv
24.Op Fl F Ar ssh_config
25.Op Fl S Ar program
26.Op Fl P Ar port
27.Op Fl c Ar cipher 24.Op Fl c Ar cipher
25.Op Fl F Ar ssh_config
28.Op Fl i Ar identity_file 26.Op Fl i Ar identity_file
29.Op Fl l Ar limit 27.Op Fl l Ar limit
30.Op Fl o Ar ssh_option 28.Op Fl o Ar ssh_option
29.Op Fl P Ar port
30.Op Fl S Ar program
31.Sm off 31.Sm off
32.Oo 32.Oo
33.Op Ar user@ 33.Op Ar user No @
34.Ar host1 No : 34.Ar host1 No :
35.Oc Ns Ar file1 35.Oc Ns Ar file1
36.Sm on 36.Sm on
37.Op Ar ... 37.Op Ar ...
38.Sm off 38.Sm off
39.Oo 39.Oo
40.Op Ar user@ 40.Op Ar user No @
41.Ar host2 No : 41.Ar host2 No :
42.Oc Ar file2 42.Oc Ar file2
43.Sm on 43.Sm on
@@ -62,35 +62,24 @@ Copies between two remote hosts are permitted.
62.Pp 62.Pp
63The options are as follows: 63The options are as follows:
64.Bl -tag -width Ds 64.Bl -tag -width Ds
65.It Fl c Ar cipher 65.It Fl 1
66Selects the cipher to use for encrypting the data transfer. 66Forces
67This option is directly passed to
68.Xr ssh 1 .
69.It Fl i Ar identity_file
70Selects the file from which the identity (private key) for RSA
71authentication is read.
72This option is directly passed to
73.Xr ssh 1 .
74.It Fl l Ar limit
75Limits the used bandwidth, specified in Kbit/s.
76.It Fl p
77Preserves modification times, access times, and modes from the
78original file.
79.It Fl r
80Recursively copy entire directories.
81.It Fl v
82Verbose mode.
83Causes
84.Nm 67.Nm
85and 68to use protocol 1.
86.Xr ssh 1 69.It Fl 2
87to print debugging messages about their progress. 70Forces
88This is helpful in 71.Nm
89debugging connection, authentication, and configuration problems. 72to use protocol 2.
73.It Fl 4
74Forces
75.Nm
76to use IPv4 addresses only.
77.It Fl 6
78Forces
79.Nm
80to use IPv6 addresses only.
90.It Fl B 81.It Fl B
91Selects batch mode (prevents asking for passwords or passphrases). 82Selects batch mode (prevents asking for passwords or passphrases).
92.It Fl q
93Disables the progress meter.
94.It Fl C 83.It Fl C
95Compression enable. 84Compression enable.
96Passes the 85Passes the
@@ -98,12 +87,85 @@ Passes the
98flag to 87flag to
99.Xr ssh 1 88.Xr ssh 1
100to enable compression. 89to enable compression.
90.It Fl c Ar cipher
91Selects the cipher to use for encrypting the data transfer.
92This option is directly passed to
93.Xr ssh 1 .
101.It Fl F Ar ssh_config 94.It Fl F Ar ssh_config
102Specifies an alternative 95Specifies an alternative
103per-user configuration file for 96per-user configuration file for
104.Nm ssh . 97.Nm ssh .
105This option is directly passed to 98This option is directly passed to
106.Xr ssh 1 . 99.Xr ssh 1 .
100.It Fl i Ar identity_file
101Selects the file from which the identity (private key) for RSA
102authentication is read.
103This option is directly passed to
104.Xr ssh 1 .
105.It Fl l Ar limit
106Limits the used bandwidth, specified in Kbit/s.
107.It Fl o Ar ssh_option
108Can be used to pass options to
109.Nm ssh
110in the format used in
111.Xr ssh_config 5 .
112This is useful for specifying options
113for which there is no separate
114.Nm scp
115command-line flag.
116For full details of the options listed below, and their possible values, see
117.Xr ssh_config 5 .
118.Pp
119.Bl -tag -width Ds -offset indent -compact
120.It AddressFamily
121.It BatchMode
122.It BindAddress
123.It ChallengeResponseAuthentication
124.It CheckHostIP
125.It Cipher
126.It Ciphers
127.It ClearAllForwardings
128.It Compression
129.It CompressionLevel
130.It ConnectionAttempts
131.It ConnectionTimeout
132.It DynamicForward
133.It EscapeChar
134.It ForwardAgent
135.It ForwardX11
136.It GatewayPorts
137.It GlobalKnownHostsFile
138.It GSSAPIAuthentication
139.It GSSAPIDelegateCredentials
140.It Host
141.It HostbasedAuthentication
142.It HostKeyAlgorithms
143.It HostKeyAlias
144.It HostName
145.It IdentityFile
146.It KeepAlive
147.It LocalForward
148.It LogLevel
149.It MACs
150.It NoHostAuthenticationForLocalhost
151.It NumberOfPasswordPrompts
152.It PasswordAuthentication
153.It Port
154.It PreferredAuthentications
155.It Protocol
156.It ProxyCommand
157.It PubkeyAuthentication
158.It RemoteForward
159.It RhostsRSAAuthentication
160.It RSAAuthentication
161.It SmartcardDevice
162.It StrictHostKeyChecking
163.It UsePrivilegedPort
164.It User
165.It UserKnownHostsFile
166.It VerifyHostKeyDNS
167.It XAuthLocation
168.El
107.It Fl P Ar port 169.It Fl P Ar port
108Specifies the port to connect to on the remote host. 170Specifies the port to connect to on the remote host.
109Note that this option is written with a capital 171Note that this option is written with a capital
@@ -112,6 +174,13 @@ because
112.Fl p 174.Fl p
113is already reserved for preserving the times and modes of the file in 175is already reserved for preserving the times and modes of the file in
114.Xr rcp 1 . 176.Xr rcp 1 .
177.It Fl p
178Preserves modification times, access times, and modes from the
179original file.
180.It Fl q
181Disables the progress meter.
182.It Fl r
183Recursively copy entire directories.
115.It Fl S Ar program 184.It Fl S Ar program
116Name of 185Name of
117.Ar program 186.Ar program
@@ -119,31 +188,15 @@ to use for the encrypted connection.
119The program must understand 188The program must understand
120.Xr ssh 1 189.Xr ssh 1
121options. 190options.
122.It Fl o Ar ssh_option 191.It Fl v
123Can be used to pass options to 192Verbose mode.
124.Nm ssh 193Causes
125in the format used in
126.Xr ssh_config 5 .
127This is useful for specifying options
128for which there is no separate
129.Nm scp
130command-line flag.
131.It Fl 1
132Forces
133.Nm
134to use protocol 1.
135.It Fl 2
136Forces
137.Nm
138to use protocol 2.
139.It Fl 4
140Forces
141.Nm
142to use IPv4 addresses only.
143.It Fl 6
144Forces
145.Nm 194.Nm
146to use IPv6 addresses only. 195and
196.Xr ssh 1
197to print debugging messages about their progress.
198This is helpful in
199debugging connection, authentication, and configuration problems.
147.El 200.El
148.Sh DIAGNOSTICS 201.Sh DIAGNOSTICS
149.Nm 202.Nm
@@ -165,5 +218,4 @@ program in BSD source code from the Regents of the University of
165California. 218California.
166.Sh AUTHORS 219.Sh AUTHORS
167.An Timo Rinne Aq tri@iki.fi 220.An Timo Rinne Aq tri@iki.fi
168and
169.An Tatu Ylonen Aq ylo@cs.hut.fi 221.An Tatu Ylonen Aq ylo@cs.hut.fi
diff --git a/scp.c b/scp.c
index a1f136a1f..364ab2860 100644
--- a/scp.c
+++ b/scp.c
@@ -71,7 +71,7 @@
71 */ 71 */
72 72
73#include "includes.h" 73#include "includes.h"
74RCSID("$OpenBSD: scp.c,v 1.109 2003/09/19 17:40:20 markus Exp $"); 74RCSID("$OpenBSD: scp.c,v 1.110 2003/10/08 08:27:36 jmc Exp $");
75 75
76#include "xmalloc.h" 76#include "xmalloc.h"
77#include "atomicio.h" 77#include "atomicio.h"
@@ -1019,8 +1019,8 @@ void
1019usage(void) 1019usage(void)
1020{ 1020{
1021 (void) fprintf(stderr, 1021 (void) fprintf(stderr,
1022 "usage: scp [-pqrvBC1246] [-F config] [-S program] [-P port]\n" 1022 "usage: scp [-1246BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file]\n"
1023 " [-c cipher] [-i identity] [-l limit] [-o option]\n" 1023 " [-l limit] [-o ssh_option] [-P port] [-S program]\n"
1024 " [[user@]host1:]file1 [...] [[user@]host2:]file2\n"); 1024 " [[user@]host1:]file1 [...] [[user@]host2:]file2\n");
1025 exit(1); 1025 exit(1);
1026} 1026}
diff --git a/sftp-server.8 b/sftp-server.8
index 871f83796..42f5d437c 100644
--- a/sftp-server.8
+++ b/sftp-server.8
@@ -1,4 +1,4 @@
1.\" $OpenBSD: sftp-server.8,v 1.9 2003/06/10 09:12:11 jmc Exp $ 1.\" $OpenBSD: sftp-server.8,v 1.10 2003/10/08 08:27:36 jmc Exp $
2.\" 2.\"
3.\" Copyright (c) 2000 Markus Friedl. All rights reserved. 3.\" Copyright (c) 2000 Markus Friedl. All rights reserved.
4.\" 4.\"
@@ -41,11 +41,12 @@ using the
41.Cm Subsystem 41.Cm Subsystem
42option. 42option.
43See 43See
44.Xr sshd 8 44.Xr sshd_config 5
45for more information. 45for more information.
46.Sh SEE ALSO 46.Sh SEE ALSO
47.Xr sftp 1 , 47.Xr sftp 1 ,
48.Xr ssh 1 , 48.Xr ssh 1 ,
49.Xr sshd_config 5 ,
49.Xr sshd 8 50.Xr sshd 8
50.Rs 51.Rs
51.%A T. Ylonen 52.%A T. Ylonen
diff --git a/sftp.1 b/sftp.1
index 753a4f2b9..05b972e46 100644
--- a/sftp.1
+++ b/sftp.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: sftp.1,v 1.45 2003/09/02 18:50:06 jmc Exp $ 1.\" $OpenBSD: sftp.1,v 1.46 2003/10/08 08:27:36 jmc Exp $
2.\" 2.\"
3.\" Copyright (c) 2001 Damien Miller. All rights reserved. 3.\" Copyright (c) 2001 Damien Miller. All rights reserved.
4.\" 4.\"
@@ -31,15 +31,15 @@
31.Sh SYNOPSIS 31.Sh SYNOPSIS
32.Nm sftp 32.Nm sftp
33.Bk -words 33.Bk -words
34.Op Fl vC1 34.Op Fl 1Cv
35.Op Fl b Ar batchfile
36.Op Fl o Ar ssh_option
37.Op Fl s Ar subsystem | sftp_server
38.Op Fl B Ar buffer_size 35.Op Fl B Ar buffer_size
36.Op Fl b Ar batchfile
39.Op Fl F Ar ssh_config 37.Op Fl F Ar ssh_config
40.Op Fl P Ar sftp_server path 38.Op Fl o Ar ssh_option
39.Op Fl P Ar sftp_server_path
41.Op Fl R Ar num_requests 40.Op Fl R Ar num_requests
42.Op Fl S Ar program 41.Op Fl S Ar program
42.Op Fl s Ar subsystem | sftp_server
43.Ar host 43.Ar host
44.Ek 44.Ek
45.Nm sftp 45.Nm sftp
@@ -84,6 +84,15 @@ and
84for details). 84for details).
85The options are as follows: 85The options are as follows:
86.Bl -tag -width Ds 86.Bl -tag -width Ds
87.It Fl 1
88Specify the use of protocol version 1.
89.It Fl B Ar buffer_size
90Specify the size of the buffer that
91.Nm
92uses when transferring files.
93Larger buffers require fewer round trips at the cost of higher
94memory consumption.
95The default is 32768 bytes.
87.It Fl b Ar batchfile 96.It Fl b Ar batchfile
88Batch mode reads a series of commands from an input 97Batch mode reads a series of commands from an input
89.Ar batchfile 98.Ar batchfile
@@ -104,6 +113,16 @@ prefixing the command with a
104.Sq Ic \- 113.Sq Ic \-
105character (for example, 114character (for example,
106.Ic -rm /tmp/blah* ) . 115.Ic -rm /tmp/blah* ) .
116.It Fl C
117Enables compression (via ssh's
118.Fl C
119flag).
120.It Fl F Ar ssh_config
121Specifies an alternative
122per-user configuration file for
123.Xr ssh 1 .
124This option is directly passed to
125.Xr ssh 1 .
107.It Fl o Ar ssh_option 126.It Fl o Ar ssh_option
108Can be used to pass options to 127Can be used to pass options to
109.Nm ssh 128.Nm ssh
@@ -115,35 +134,60 @@ for which there is no separate
115command-line flag. 134command-line flag.
116For example, to specify an alternate port use: 135For example, to specify an alternate port use:
117.Ic sftp -oPort=24 . 136.Ic sftp -oPort=24 .
118.It Fl s Ar subsystem | sftp_server 137For full details of the options listed below, and their possible values, see
119Specifies the SSH2 subsystem or the path for an sftp server 138.Xr ssh_config 5 .
120on the remote host. 139.Pp
121A path is useful for using 140.Bl -tag -width Ds -offset indent -compact
122.Nm 141.It AddressFamily
123over protocol version 1, or when the remote 142.It BatchMode
124.Xr sshd 8 143.It BindAddress
125does not have an sftp subsystem configured. 144.It ChallengeResponseAuthentication
126.It Fl v 145.It CheckHostIP
127Raise logging level. 146.It Cipher
128This option is also passed to ssh. 147.It Ciphers
129.It Fl B Ar buffer_size 148.It ClearAllForwardings
130Specify the size of the buffer that 149.It Compression
131.Nm 150.It CompressionLevel
132uses when transferring files. 151.It ConnectionAttempts
133Larger buffers require fewer round trips at the cost of higher 152.It ConnectionTimeout
134memory consumption. 153.It DynamicForward
135The default is 32768 bytes. 154.It EscapeChar
136.It Fl C 155.It ForwardAgent
137Enables compression (via ssh's 156.It ForwardX11
138.Fl C 157.It GatewayPorts
139flag). 158.It GlobalKnownHostsFile
140.It Fl F Ar ssh_config 159.It GSSAPIAuthentication
141Specifies an alternative 160.It GSSAPIDelegateCredentials
142per-user configuration file for 161.It Host
143.Xr ssh 1 . 162.It HostbasedAuthentication
144This option is directly passed to 163.It HostKeyAlgorithms
145.Xr ssh 1 . 164.It HostKeyAlias
146.It Fl P Ar sftp_server path 165.It HostName
166.It IdentityFile
167.It KeepAlive
168.It LocalForward
169.It LogLevel
170.It MACs
171.It NoHostAuthenticationForLocalhost
172.It NumberOfPasswordPrompts
173.It PasswordAuthentication
174.It Port
175.It PreferredAuthentications
176.It Protocol
177.It ProxyCommand
178.It PubkeyAuthentication
179.It RemoteForward
180.It RhostsRSAAuthentication
181.It RSAAuthentication
182.It SmartcardDevice
183.It StrictHostKeyChecking
184.It UsePrivilegedPort
185.It User
186.It UserKnownHostsFile
187.It VerifyHostKeyDNS
188.It XAuthLocation
189.El
190.It Fl P Ar sftp_server_path
147Connect directly to a local sftp server 191Connect directly to a local sftp server
148(rather than via 192(rather than via
149.Xr ssh 1 ) 193.Xr ssh 1 )
@@ -160,8 +204,17 @@ to use for the encrypted connection.
160The program must understand 204The program must understand
161.Xr ssh 1 205.Xr ssh 1
162options. 206options.
163.It Fl 1 207.It Fl s Ar subsystem | sftp_server
164Specify the use of protocol version 1. 208Specifies the SSH2 subsystem or the path for an sftp server
209on the remote host.
210A path is useful for using
211.Nm
212over protocol version 1, or when the remote
213.Xr sshd 8
214does not have an sftp subsystem configured.
215.It Fl v
216Raise logging level.
217This option is also passed to ssh.
165.El 218.El
166.Sh INTERACTIVE COMMANDS 219.Sh INTERACTIVE COMMANDS
167Once in interactive mode, 220Once in interactive mode,
@@ -170,16 +223,13 @@ understands a set of commands similar to those of
170.Xr ftp 1 . 223.Xr ftp 1 .
171Commands are case insensitive and pathnames may be enclosed in quotes if they 224Commands are case insensitive and pathnames may be enclosed in quotes if they
172contain spaces. 225contain spaces.
173.Bl -tag -width Ds 226.Bl -tag -width "lmdir path"
174.It Ic bye 227.It Ic bye
175Quit 228Quit
176.Nm sftp . 229.Nm sftp .
177.It Ic cd Ar path 230.It Ic cd Ar path
178Change remote directory to 231Change remote directory to
179.Ar path . 232.Ar path .
180.It Ic lcd Ar path
181Change local directory to
182.Ar path .
183.It Ic chgrp Ar grp Ar path 233.It Ic chgrp Ar grp Ar path
184Change group of file 234Change group of file
185.Ar path 235.Ar path
@@ -219,6 +269,9 @@ flag is specified, then the file's full permission and access time are
219copied too. 269copied too.
220.It Ic help 270.It Ic help
221Display help text. 271Display help text.
272.It Ic lcd Ar path
273Change local directory to
274.Ar path .
222.It Ic lls Op Ar ls-options Op Ar path 275.It Ic lls Op Ar ls-options Op Ar path
223Display local directory listing of either 276Display local directory listing of either
224.Ar path 277.Ar path
@@ -280,12 +333,12 @@ Rename remote file from
280.Ar oldpath 333.Ar oldpath
281to 334to
282.Ar newpath . 335.Ar newpath .
283.It Ic rmdir Ar path
284Remove remote directory specified by
285.Ar path .
286.It Ic rm Ar path 336.It Ic rm Ar path
287Delete remote file specified by 337Delete remote file specified by
288.Ar path . 338.Ar path .
339.It Ic rmdir Ar path
340Remove remote directory specified by
341.Ar path .
289.It Ic symlink Ar oldpath Ar newpath 342.It Ic symlink Ar oldpath Ar newpath
290Create a symbolic link from 343Create a symbolic link from
291.Ar oldpath 344.Ar oldpath
@@ -305,6 +358,7 @@ Escape to local shell.
305Synonym for help. 358Synonym for help.
306.El 359.El
307.Sh SEE ALSO 360.Sh SEE ALSO
361.Xr ftp 1 ,
308.Xr scp 1 , 362.Xr scp 1 ,
309.Xr ssh 1 , 363.Xr ssh 1 ,
310.Xr ssh-add 1 , 364.Xr ssh-add 1 ,
diff --git a/sftp.c b/sftp.c
index c2a6593b8..fddc6875f 100644
--- a/sftp.c
+++ b/sftp.c
@@ -24,7 +24,7 @@
24 24
25#include "includes.h" 25#include "includes.h"
26 26
27RCSID("$OpenBSD: sftp.c,v 1.37 2003/07/10 20:05:55 markus Exp $"); 27RCSID("$OpenBSD: sftp.c,v 1.38 2003/10/08 08:27:36 jmc Exp $");
28 28
29#include "buffer.h" 29#include "buffer.h"
30#include "xmalloc.h" 30#include "xmalloc.h"
@@ -112,10 +112,12 @@ usage(void)
112 extern char *__progname; 112 extern char *__progname;
113 113
114 fprintf(stderr, 114 fprintf(stderr,
115 "usage: %s [-vC1] [-b batchfile] [-o ssh_option] [-s subsystem | sftp_server]\n" 115 "usage: %s [-1Cv] [-B buffer_size] [-b batchfile] [-F ssh_config]\n"
116 " [-B buffer_size] [-F ssh_config] [-P sftp_server path]\n" 116 " [-o ssh_option] [-P sftp_server_path] [-R num_requests]\n"
117 " [-R num_requests] [-S program]\n" 117 " [-S program] [-s subsystem | sftp_server] host\n"
118 " [user@]host[:file [file]]\n", __progname); 118 " %s [[user@]host[:file [file]]]\n"
119 " %s [[user@]host[:dir[/]]]\n"
120 " %s -b batchfile [user@]host\n", __progname, __progname, __progname, __progname);
119 exit(1); 121 exit(1);
120} 122}
121 123
diff --git a/ssh.1 b/ssh.1
index 21e573b6d..2ba7fa6fd 100644
--- a/ssh.1
+++ b/ssh.1
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: ssh.1,v 1.176 2003/09/29 11:40:51 jmc Exp $ 37.\" $OpenBSD: ssh.1,v 1.177 2003/10/08 08:27:36 jmc Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSH 1 39.Dt SSH 1
40.Os 40.Os
@@ -621,7 +621,6 @@ For full details of the options listed below, and their possible values, see
621.It ConnectionAttempts 621.It ConnectionAttempts
622.It ConnectionTimeout 622.It ConnectionTimeout
623.It DynamicForward 623.It DynamicForward
624.It EnableSSHKeysign
625.It EscapeChar 624.It EscapeChar
626.It ForwardAgent 625.It ForwardAgent
627.It ForwardX11 626.It ForwardX11
diff --git a/sshd.8 b/sshd.8
index 0eeea6666..34413e2a7 100644
--- a/sshd.8
+++ b/sshd.8
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: sshd.8,v 1.199 2003/08/13 08:46:31 markus Exp $ 37.\" $OpenBSD: sshd.8,v 1.200 2003/10/08 08:27:36 jmc Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSHD 8 39.Dt SSHD 8
40.Os 40.Os
@@ -44,7 +44,7 @@
44.Sh SYNOPSIS 44.Sh SYNOPSIS
45.Nm sshd 45.Nm sshd
46.Bk -words 46.Bk -words
47.Op Fl deiqtD46 47.Op Fl 46Ddeiqt
48.Op Fl b Ar bits 48.Op Fl b Ar bits
49.Op Fl f Ar config_file 49.Op Fl f Ar config_file
50.Op Fl g Ar login_grace_time 50.Op Fl g Ar login_grace_time
@@ -78,9 +78,7 @@ This implementation of
78supports both SSH protocol version 1 and 2 simultaneously. 78supports both SSH protocol version 1 and 2 simultaneously.
79.Nm 79.Nm
80works as follows: 80works as follows:
81.Pp
82.Ss SSH protocol version 1 81.Ss SSH protocol version 1
83.Pp
84Each host has a host-specific RSA key 82Each host has a host-specific RSA key
85(normally 1024 bits) used to identify the host. 83(normally 1024 bits) used to identify the host.
86Additionally, when 84Additionally, when
@@ -92,7 +90,7 @@ Whenever a client connects, the daemon responds with its public
92host and server keys. 90host and server keys.
93The client compares the 91The client compares the
94RSA host key against its own database to verify that it has not changed. 92RSA host key against its own database to verify that it has not changed.
95The client then generates a 256 bit random number. 93The client then generates a 256-bit random number.
96It encrypts this 94It encrypts this
97random number using both the host key and the server key, and sends 95random number using both the host key and the server key, and sends
98the encrypted number to the server. 96the encrypted number to the server.
@@ -107,9 +105,9 @@ to use from those offered by the server.
107.Pp 105.Pp
108Next, the server and the client enter an authentication dialog. 106Next, the server and the client enter an authentication dialog.
109The client tries to authenticate itself using 107The client tries to authenticate itself using
110.Pa .rhosts 108.Em .rhosts
111authentication, 109authentication,
112.Pa .rhosts 110.Em .rhosts
113authentication combined with RSA host 111authentication combined with RSA host
114authentication, RSA challenge-response authentication, or password 112authentication, RSA challenge-response authentication, or password
115based authentication. 113based authentication.
@@ -137,7 +135,8 @@ or
137.Ql \&*NP\&* 135.Ql \&*NP\&*
138). 136).
139.Pp 137.Pp
140Rhosts authentication is normally disabled 138.Em rhosts
139authentication is normally disabled
141because it is fundamentally insecure, but can be enabled in the server 140because it is fundamentally insecure, but can be enabled in the server
142configuration file if desired. 141configuration file if desired.
143System security is not improved unless 142System security is not improved unless
@@ -150,9 +149,7 @@ are disabled (thus completely disabling
150and 149and
151.Xr rsh 150.Xr rsh
152into the machine). 151into the machine).
153.Pp
154.Ss SSH protocol version 2 152.Ss SSH protocol version 2
155.Pp
156Version 2 works similarly: 153Version 2 works similarly:
157Each host has a host-specific key (RSA or DSA) used to identify the host. 154Each host has a host-specific key (RSA or DSA) used to identify the host.
158However, when the daemon starts, it does not generate a server key. 155However, when the daemon starts, it does not generate a server key.
@@ -160,7 +157,7 @@ Forward security is provided through a Diffie-Hellman key agreement.
160This key agreement results in a shared session key. 157This key agreement results in a shared session key.
161.Pp 158.Pp
162The rest of the session is encrypted using a symmetric cipher, currently 159The rest of the session is encrypted using a symmetric cipher, currently
163128 bit AES, Blowfish, 3DES, CAST128, Arcfour, 192 bit AES, or 256 bit AES. 160128-bit AES, Blowfish, 3DES, CAST128, Arcfour, 192-bit AES, or 256-bit AES.
164The client selects the encryption algorithm 161The client selects the encryption algorithm
165to use from those offered by the server. 162to use from those offered by the server.
166Additionally, session integrity is provided 163Additionally, session integrity is provided
@@ -171,9 +168,7 @@ Protocol version 2 provides a public key based
171user (PubkeyAuthentication) or 168user (PubkeyAuthentication) or
172client host (HostbasedAuthentication) authentication method, 169client host (HostbasedAuthentication) authentication method,
173conventional password authentication and challenge response based methods. 170conventional password authentication and challenge response based methods.
174.Pp
175.Ss Command execution and data forwarding 171.Ss Command execution and data forwarding
176.Pp
177If the client successfully authenticates itself, a dialog for 172If the client successfully authenticates itself, a dialog for
178preparing the session is entered. 173preparing the session is entered.
179At this time the client may request 174At this time the client may request
@@ -192,8 +187,9 @@ connections have been closed, the server sends command exit status to
192the client, and both sides exit. 187the client, and both sides exit.
193.Pp 188.Pp
194.Nm 189.Nm
195can be configured using command-line options or a configuration 190can be configured using command-line options or a configuration file
196file. 191(by default
192.Xr sshd_config 5 ) .
197Command-line options override values specified in the 193Command-line options override values specified in the
198configuration file. 194configuration file.
199.Pp 195.Pp
@@ -205,9 +201,23 @@ by executing itself with the name it was started as, i.e.,
205.Pp 201.Pp
206The options are as follows: 202The options are as follows:
207.Bl -tag -width Ds 203.Bl -tag -width Ds
204.It Fl 4
205Forces
206.Nm
207to use IPv4 addresses only.
208.It Fl 6
209Forces
210.Nm
211to use IPv6 addresses only.
208.It Fl b Ar bits 212.It Fl b Ar bits
209Specifies the number of bits in the ephemeral protocol version 1 213Specifies the number of bits in the ephemeral protocol version 1
210server key (default 768). 214server key (default 768).
215.It Fl D
216When this option is specified,
217.Nm
218will not detach and does not become a daemon.
219This allows easy monitoring of
220.Nm sshd .
211.It Fl d 221.It Fl d
212Debug mode. 222Debug mode.
213The server sends verbose debug output to the system 223The server sends verbose debug output to the system
@@ -267,7 +277,7 @@ be feasible.
267Specifies how often the ephemeral protocol version 1 server key is 277Specifies how often the ephemeral protocol version 1 server key is
268regenerated (default 3600 seconds, or one hour). 278regenerated (default 3600 seconds, or one hour).
269The motivation for regenerating the key fairly 279The motivation for regenerating the key fairly
270often is that the key is not stored anywhere, and after about an hour, 280often is that the key is not stored anywhere, and after about an hour
271it becomes impossible to recover the key for decrypting intercepted 281it becomes impossible to recover the key for decrypting intercepted
272communications even if the machine is cracked into or physically 282communications even if the machine is cracked into or physically
273seized. 283seized.
@@ -276,6 +286,8 @@ A value of zero indicates that the key will never be regenerated.
276Can be used to give options in the format used in the configuration file. 286Can be used to give options in the format used in the configuration file.
277This is useful for specifying options for which there is no separate 287This is useful for specifying options for which there is no separate
278command-line flag. 288command-line flag.
289For full details of the options, and their values, see
290.Xr sshd_config 5 .
279.It Fl p Ar port 291.It Fl p Ar port
280Specifies the port on which the server listens for connections 292Specifies the port on which the server listens for connections
281(default 22). 293(default 22).
@@ -325,20 +337,6 @@ USER@HOST pattern in
325.Cm AllowUsers 337.Cm AllowUsers
326or 338or
327.Cm DenyUsers . 339.Cm DenyUsers .
328.It Fl D
329When this option is specified
330.Nm
331will not detach and does not become a daemon.
332This allows easy monitoring of
333.Nm sshd .
334.It Fl 4
335Forces
336.Nm
337to use IPv4 addresses only.
338.It Fl 6
339Forces
340.Nm
341to use IPv6 addresses only.
342.El 340.El
343.Sh CONFIGURATION FILE 341.Sh CONFIGURATION FILE
344.Nm 342.Nm
@@ -375,9 +373,9 @@ Changes to run with normal user privileges.
375.It 373.It
376Sets up basic environment. 374Sets up basic environment.
377.It 375.It
378Reads 376Reads the file
379.Pa $HOME/.ssh/environment 377.Pa $HOME/.ssh/environment ,
380if it exists and users are allowed to change their environment. 378if it exists, and users are allowed to change their environment.
381See the 379See the
382.Cm PermitUserEnvironment 380.Cm PermitUserEnvironment
383option in 381option in
@@ -516,7 +514,7 @@ Limit local
516port forwarding such that it may only connect to the specified host and 514port forwarding such that it may only connect to the specified host and
517port. 515port.
518IPv6 addresses can be specified with an alternative syntax: 516IPv6 addresses can be specified with an alternative syntax:
519.Ar host/port . 517.Ar host Ns / Ns Ar port .
520Multiple 518Multiple
521.Cm permitopen 519.Cm permitopen
522options may be applied separated by commas. 520options may be applied separated by commas.
@@ -524,13 +522,13 @@ No pattern matching is performed on the specified hostnames,
524they must be literal domains or addresses. 522they must be literal domains or addresses.
525.El 523.El
526.Ss Examples 524.Ss Examples
5271024 33 12121.\|.\|.\|312314325 ylo@foo.bar 5251024 33 12121...312314325 ylo@foo.bar
528.Pp 526.Pp
529from="*.niksula.hut.fi,!pc.niksula.hut.fi" 1024 35 23.\|.\|.\|2334 ylo@niksula 527from="*.niksula.hut.fi,!pc.niksula.hut.fi" 1024 35 23...2334 ylo@niksula
530.Pp 528.Pp
531command="dump /home",no-pty,no-port-forwarding 1024 33 23.\|.\|.\|2323 backup.hut.fi 529command="dump /home",no-pty,no-port-forwarding 1024 33 23...2323 backup.hut.fi
532.Pp 530.Pp
533permitopen="10.2.1.55:80",permitopen="10.2.1.56:25" 1024 33 23.\|.\|.\|2323 531permitopen="10.2.1.55:80",permitopen="10.2.1.56:25" 1024 33 23...2323
534.Sh SSH_KNOWN_HOSTS FILE FORMAT 532.Sh SSH_KNOWN_HOSTS FILE FORMAT
535The 533The
536.Pa /etc/ssh/ssh_known_hosts 534.Pa /etc/ssh/ssh_known_hosts
@@ -588,7 +586,7 @@ or by taking
588and adding the host names at the front. 586and adding the host names at the front.
589.Ss Examples 587.Ss Examples
590.Bd -literal 588.Bd -literal
591closenet,.\|.\|.\|,130.233.208.41 1024 37 159.\|.\|.93 closenet.hut.fi 589closenet,...,130.233.208.41 1024 37 159...93 closenet.hut.fi
592cvs.openbsd.org,199.185.137.3 ssh-rsa AAAA1234.....= 590cvs.openbsd.org,199.185.137.3 ssh-rsa AAAA1234.....=
593.Ed 591.Ed
594.Sh FILES 592.Sh FILES
@@ -647,7 +645,7 @@ and/or
647.Pa id_rsa.pub 645.Pa id_rsa.pub
648files into this file, as described in 646files into this file, as described in
649.Xr ssh-keygen 1 . 647.Xr ssh-keygen 1 .
650.It Pa "/etc/ssh/ssh_known_hosts" and "$HOME/.ssh/known_hosts" 648.It Pa "/etc/ssh/ssh_known_hosts", "$HOME/.ssh/known_hosts"
651These files are consulted when using rhosts with RSA host 649These files are consulted when using rhosts with RSA host
652authentication or protocol version 2 hostbased authentication 650authentication or protocol version 2 hostbased authentication
653to check the public key of the host. 651to check the public key of the host.
@@ -681,7 +679,7 @@ The file must
681be writable only by the user; it is recommended that it not be 679be writable only by the user; it is recommended that it not be
682accessible by others. 680accessible by others.
683.Pp 681.Pp
684If is also possible to use netgroups in the file. 682It is also possible to use netgroups in the file.
685Either host or user 683Either host or user
686name may be of the form +@groupname to specify all hosts or all users 684name may be of the form +@groupname to specify all hosts or all users
687in the group. 685in the group.
@@ -693,7 +691,7 @@ However, this file is
693not used by rlogin and rshd, so using this permits access using SSH only. 691not used by rlogin and rshd, so using this permits access using SSH only.
694.It Pa /etc/hosts.equiv 692.It Pa /etc/hosts.equiv
695This file is used during 693This file is used during
696.Pa .rhosts 694.Em rhosts
697authentication. 695authentication.
698In the simplest form, this file contains host names, one per line. 696In the simplest form, this file contains host names, one per line.
699Users on 697Users on
@@ -800,9 +798,12 @@ This file should be writable only by root, and should be world-readable.
800.Xr ssh-add 1 , 798.Xr ssh-add 1 ,
801.Xr ssh-agent 1 , 799.Xr ssh-agent 1 ,
802.Xr ssh-keygen 1 , 800.Xr ssh-keygen 1 ,
801.Xr chroot 2 ,
802.Xr hosts_access 5 ,
803.Xr login.conf 5 , 803.Xr login.conf 5 ,
804.Xr moduli 5 , 804.Xr moduli 5 ,
805.Xr sshd_config 5 , 805.Xr sshd_config 5 ,
806.Xr inetd 8 ,
806.Xr sftp-server 8 807.Xr sftp-server 8
807.Rs 808.Rs
808.%A T. Ylonen 809.%A T. Ylonen