summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2001-04-23 13:02:16 +0000
committerBen Lindstrom <mouring@eviladmin.org>2001-04-23 13:02:16 +0000
commitc65e6a0fec9d96722d268003c2b89c2a8906aee9 (patch)
tree6fe9ae19926c5300895e21212aa5a40a37eae7ff
parent2857d9cf771ffa561e6e6e535632bd7ef74c0f7d (diff)
- markus@cvs.openbsd.org 2001/04/22 23:58:36
[ssh-keygen.1 ssh.1 sshd.8] document hostbased and other cleanup
-rw-r--r--ChangeLog8
-rw-r--r--ssh-keygen.16
-rw-r--r--ssh.1100
-rw-r--r--sshd.8121
4 files changed, 153 insertions, 82 deletions
diff --git a/ChangeLog b/ChangeLog
index 7c723c9e9..1680cc0d1 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,9 @@
120010424
2 - OpenBSD CVS Sync
3 - markus@cvs.openbsd.org 2001/04/22 23:58:36
4 [ssh-keygen.1 ssh.1 sshd.8]
5 document hostbased and other cleanup
6
120010422 720010422
2 - OpenBSD CVS Sync 8 - OpenBSD CVS Sync
3 - markus@cvs.openbsd.org 2001/04/20 16:32:22 9 - markus@cvs.openbsd.org 2001/04/20 16:32:22
@@ -5225,4 +5231,4 @@
5225 - Wrote replacements for strlcpy and mkdtemp 5231 - Wrote replacements for strlcpy and mkdtemp
5226 - Released 1.0pre1 5232 - Released 1.0pre1
5227 5233
5228$Id: ChangeLog,v 1.1159 2001/04/22 17:19:46 mouring Exp $ 5234$Id: ChangeLog,v 1.1160 2001/04/23 13:02:16 mouring Exp $
diff --git a/ssh-keygen.1 b/ssh-keygen.1
index e2e4bc45b..613bc95d7 100644
--- a/ssh-keygen.1
+++ b/ssh-keygen.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-keygen.1,v 1.38 2001/04/22 13:41:02 markus Exp $ 1.\" $OpenBSD: ssh-keygen.1,v 1.39 2001/04/22 23:58:36 markus Exp $
2.\" 2.\"
3.\" -*- nroff -*- 3.\" -*- nroff -*-
4.\" 4.\"
@@ -81,10 +81,10 @@
81generates, manages and converts authentication keys for 81generates, manages and converts authentication keys for
82.Xr ssh 1 . 82.Xr ssh 1 .
83.Nm 83.Nm
84defaults to generating a RSA1 key for use by protocols 1.3 and 1.5; 84defaults to generating a RSA1 key for use by SSH protocol version 1.
85specifying the 85specifying the
86.Fl t 86.Fl t
87option allows you to create a key for use by protocol 2.0. 87option allows you to create a key for use by SSH protocol version 2.
88.Pp 88.Pp
89Normally each user wishing to use SSH 89Normally each user wishing to use SSH
90with RSA or DSA authentication runs this once to create the authentication 90with RSA or DSA authentication runs this once to create the authentication
diff --git a/ssh.1 b/ssh.1
index 4757a12d7..0d26197b6 100644
--- a/ssh.1
+++ b/ssh.1
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: ssh.1,v 1.106 2001/04/22 13:32:27 markus Exp $ 37.\" $OpenBSD: ssh.1,v 1.107 2001/04/22 23:58:36 markus Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSH 1 39.Dt SSH 1
40.Os 40.Os
@@ -110,7 +110,7 @@ permitted to log in.
110This form of authentication alone is normally not 110This form of authentication alone is normally not
111allowed by the server because it is not secure. 111allowed by the server because it is not secure.
112.Pp 112.Pp
113The second (and primary) authentication method is the 113The second authentication method is the
114.Pa rhosts 114.Pa rhosts
115or 115or
116.Pa hosts.equiv 116.Pa hosts.equiv
@@ -205,13 +205,18 @@ the password cannot be seen by someone listening on the network.
205.Ss SSH protocol version 2 205.Ss SSH protocol version 2
206.Pp 206.Pp
207When a user connects using the protocol version 2 207When a user connects using the protocol version 2
208different authentication methods are available: 208different authentication methods are available.
209At first, the client attempts to authenticate using the public key method. 209Using the default values for
210If this method fails password authentication is tried. 210.Cm PreferredAuthentications ,
211the client will try to authenticate first using the public key method;
212if this method fails password authentication is attempted,
213and finally if this method fails keyboard-interactive authentication
214is attempted.
215If this method fails password authentication is
216tried.
211.Pp 217.Pp
212The public key method is similar to RSA authentication described 218The public key method is similar to RSA authentication described
213in the previous section except that the DSA or RSA algorithm is used 219in the previous section and allows the RSA or DSA algorithm to be used:
214instead.
215The client uses his private key, 220The client uses his private key,
216.Pa $HOME/.ssh/id_dsa 221.Pa $HOME/.ssh/id_dsa
217or 222or
@@ -225,8 +230,10 @@ and is only known to the client and the server.
225.Pp 230.Pp
226If public key authentication fails or is not available a password 231If public key authentication fails or is not available a password
227can be sent encrypted to the remote host for proving the user's identity. 232can be sent encrypted to the remote host for proving the user's identity.
228This protocol 2 implementation does not yet support Kerberos or 233.Pp
229S/Key authentication. 234Additionally,
235.Nm
236supports hostbased or challenge response authentication.
230.Pp 237.Pp
231Protocol 2 provides additional mechanisms for confidentiality 238Protocol 2 provides additional mechanisms for confidentiality
232(the traffic is encrypted using 3DES, Blowfish, CAST128 or Arcfour) 239(the traffic is encrypted using 3DES, Blowfish, CAST128 or Arcfour)
@@ -286,7 +293,7 @@ Background ssh
286List forwarded connections 293List forwarded connections
287.It Cm ~& 294.It Cm ~&
288Background ssh at logout when waiting for forwarded connection / X11 sessions 295Background ssh at logout when waiting for forwarded connection / X11 sessions
289to terminate (this does not currently work for SSH protocol version 2) 296to terminate (protocol version 1 only)
290.It Cm ~? 297.It Cm ~?
291Display a list of escape characters 298Display a list of escape characters
292.It Cm ~R 299.It Cm ~R
@@ -573,6 +580,8 @@ from the local machine.
573Port forwardings can also be specified in the configuration file. 580Port forwardings can also be specified in the configuration file.
574Privileged ports can be forwarded only when 581Privileged ports can be forwarded only when
575logging in as root on the remote machine. 582logging in as root on the remote machine.
583IPv6 addresses can be specified with an alternative syntax:
584.Ar port/host/hostport
576.It Fl 1 585.It Fl 1
577Forces 586Forces
578.Nm 587.Nm
@@ -645,6 +654,7 @@ The argument to this keyword must be
645.Dq yes 654.Dq yes
646or 655or
647.Dq no . 656.Dq no .
657This option applies to protocol version 1 only.
648.It Cm BatchMode 658.It Cm BatchMode
649If set to 659If set to
650.Dq yes , 660.Dq yes ,
@@ -687,8 +697,7 @@ The default is
687.Pp 697.Pp
688.Bd -literal 698.Bd -literal
689 ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour, 699 ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,
690 aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc, 700 aes192-cbc,aes256-cbc''
691 rijndael256-cbc,rijndael-cbc@lysator.liu.se''
692.Ed 701.Ed
693.It Cm Compression 702.It Cm Compression
694Specifies whether to use compression. 703Specifies whether to use compression.
@@ -704,21 +713,13 @@ The argument must be an integer from 1 (fast) to 9 (slow, best).
704The default level is 6, which is good for most applications. 713The default level is 6, which is good for most applications.
705The meaning of the values is the same as in 714The meaning of the values is the same as in
706.Xr gzip 1 . 715.Xr gzip 1 .
716Note that this option applies to protocol version 1 only.
707.It Cm ConnectionAttempts 717.It Cm ConnectionAttempts
708Specifies the number of tries (one per second) to make before falling 718Specifies the number of tries (one per second) to make before falling
709back to rsh or exiting. 719back to rsh or exiting.
710The argument must be an integer. 720The argument must be an integer.
711This may be useful in scripts if the connection sometimes fails. 721This may be useful in scripts if the connection sometimes fails.
712The default is 4. 722The default is 4.
713.It Cm PubkeyAuthentication
714Specifies whether to try public key authentication.
715The argument to this keyword must be
716.Dq yes
717or
718.Dq no .
719The default is
720.Dq yes .
721Note that this option applies to protocol version 2 only.
722.It Cm EscapeChar 723.It Cm EscapeChar
723Sets the escape character (default: 724Sets the escape character (default:
724.Ql ~ ) . 725.Ql ~ ) .
@@ -783,17 +784,29 @@ host key database instead of
783Specifies a file to use for the protocol version 2 global 784Specifies a file to use for the protocol version 2 global
784host key database instead of 785host key database instead of
785.Pa /etc/ssh_known_hosts2 . 786.Pa /etc/ssh_known_hosts2 .
786.It Cm HostKeyAlias 787.It Cm HostbasedAuthentication
787Specifies an alias that should be used instead of the 788Specifies whether to try rhosts based authentication with public key
788real host name when looking up or saving the host key 789authentication.
789in the known_hosts files. 790The argument must be
790This option is useful for tunneling ssh connections 791.Dq yes
791or if you have multiple servers running on a single host. 792or
793.Dq no .
794The default is
795.Dq yes .
796This option applies to protocol version 2 only and
797is similar to
798.Cm RhostsRSAAuthentication .
792.It Cm HostKeyAlgorithms 799.It Cm HostKeyAlgorithms
793Specfies the protocol version 2 host key algorithms 800Specfies the protocol version 2 host key algorithms
794that the client wants to use in order of preference. 801that the client wants to use in order of preference.
795The default for this option is: 802The default for this option is:
796.Dq ssh-rsa,ssh-dss 803.Dq ssh-rsa,ssh-dss
804.It Cm HostKeyAlias
805Specifies an alias that should be used instead of the
806real host name when looking up or saving the host key
807in the host key database files.
808This option is useful for tunneling ssh connections
809or if you have multiple servers running on a single host.
797.It Cm HostName 810.It Cm HostName
798Specifies the real host name to log into. 811Specifies the real host name to log into.
799This can be used to specify nicknames or abbreviations for hosts. 812This can be used to specify nicknames or abbreviations for hosts.
@@ -802,7 +815,7 @@ Numeric IP addresses are also permitted (both on the command line and in
802.Cm HostName 815.Cm HostName
803specifications). 816specifications).
804.It Cm IdentityFile 817.It Cm IdentityFile
805Specifies the file from which the user's RSA authentication identity 818Specifies the file from which the user's RSA or DSA authentication identity
806is read (default 819is read (default
807.Pa $HOME/.ssh/identity 820.Pa $HOME/.ssh/identity
808in the user's home directory). 821in the user's home directory).
@@ -882,7 +895,6 @@ or
882.Dq no . 895.Dq no .
883The default is 896The default is
884.Dq yes . 897.Dq yes .
885Note that this option applies to both protocol version 1 and 2.
886.It Cm Port 898.It Cm Port
887Specifies the port number to connect on the remote host. 899Specifies the port number to connect on the remote host.
888Default is 22. 900Default is 22.
@@ -934,6 +946,15 @@ Note that
934.Cm CheckHostIP 946.Cm CheckHostIP
935is not available for connects with a proxy command. 947is not available for connects with a proxy command.
936.Pp 948.Pp
949.It Cm PubkeyAuthentication
950Specifies whether to try public key authentication.
951The argument to this keyword must be
952.Dq yes
953or
954.Dq no .
955The default is
956.Dq yes .
957This option applies to protocol version 2 only.
937.It Cm RemoteForward 958.It Cm RemoteForward
938Specifies that a TCP/IP port on the remote machine be forwarded over 959Specifies that a TCP/IP port on the remote machine be forwarded over
939the secure channel to given host:port from the local machine. 960the secure channel to given host:port from the local machine.
@@ -951,13 +972,15 @@ Disabling rhosts authentication may reduce
951authentication time on slow connections when rhosts authentication is 972authentication time on slow connections when rhosts authentication is
952not used. 973not used.
953Most servers do not permit RhostsAuthentication because it 974Most servers do not permit RhostsAuthentication because it
954is not secure (see RhostsRSAAuthentication). 975is not secure (see
976.Cm RhostsRSAAuthentication ).
955The argument to this keyword must be 977The argument to this keyword must be
956.Dq yes 978.Dq yes
957or 979or
958.Dq no . 980.Dq no .
959The default is 981The default is
960.Dq yes . 982.Dq yes .
983This option applies to protocol version 1 only.
961.It Cm RhostsRSAAuthentication 984.It Cm RhostsRSAAuthentication
962Specifies whether to try rhosts based authentication with RSA host 985Specifies whether to try rhosts based authentication with RSA host
963authentication. 986authentication.
@@ -967,6 +990,7 @@ or
967.Dq no . 990.Dq no .
968The default is 991The default is
969.Dq yes . 992.Dq yes .
993This option applies to protocol version 1 only.
970.It Cm RSAAuthentication 994.It Cm RSAAuthentication
971Specifies whether to try RSA authentication. 995Specifies whether to try RSA authentication.
972The argument to this keyword must be 996The argument to this keyword must be
@@ -1037,13 +1061,13 @@ or
1037.Dq no . 1061.Dq no .
1038The default is 1062The default is
1039.Dq no . 1063.Dq no .
1040Note that setting this option to 1064Note that you need to set this option to
1041.Dq no 1065.Dq yes
1042turns off 1066if you want to use
1043.Cm RhostsAuthentication 1067.Cm RhostsAuthentication
1044and 1068and
1045.Cm RhostsRSAAuthentication 1069.Cm RhostsRSAAuthentication
1046for older servers. 1070with older servers.
1047.It Cm User 1071.It Cm User
1048Specifies the user to log in as. 1072Specifies the user to log in as.
1049This can be useful if you have a different user name on different machines. 1073This can be useful if you have a different user name on different machines.
@@ -1097,7 +1121,9 @@ the host where the shell runs, and n is an integer >= 1.
1097.Nm 1121.Nm
1098uses this special value to forward X11 connections over the secure 1122uses this special value to forward X11 connections over the secure
1099channel. 1123channel.
1100The user should normally not set DISPLAY explicitly, as that 1124The user should normally not set
1125.Ev DISPLAY
1126explicitly, as that
1101will render the X11 connection insecure (and will require the user to 1127will render the X11 connection insecure (and will require the user to
1102manually copy any required authorization cookies). 1128manually copy any required authorization cookies).
1103.It Ev HOME 1129.It Ev HOME
@@ -1211,7 +1237,7 @@ spaces).
1211This file is not highly sensitive, but the recommended 1237This file is not highly sensitive, but the recommended
1212permissions are read/write for the user, and not accessible by others. 1238permissions are read/write for the user, and not accessible by others.
1213.It Pa $HOME/.ssh/authorized_keys2 1239.It Pa $HOME/.ssh/authorized_keys2
1214Lists the public keys (DSA/RSA) that can be used for logging in as this user. 1240Lists the public keys (RSA/DSA) that can be used for logging in as this user.
1215This file is not highly sensitive, but the recommended 1241This file is not highly sensitive, but the recommended
1216permissions are read/write for the user, and not accessible by others. 1242permissions are read/write for the user, and not accessible by others.
1217.It Pa /etc/ssh_known_hosts, /etc/ssh_known_hosts2 1243.It Pa /etc/ssh_known_hosts, /etc/ssh_known_hosts2
@@ -1219,7 +1245,7 @@ Systemwide list of known host keys.
1219.Pa /etc/ssh_known_hosts 1245.Pa /etc/ssh_known_hosts
1220contains RSA and 1246contains RSA and
1221.Pa /etc/ssh_known_hosts2 1247.Pa /etc/ssh_known_hosts2
1222contains DSA or RSA keys for protocol version 2. 1248contains RSA or DSA keys for protocol version 2.
1223These files should be prepared by the 1249These files should be prepared by the
1224system administrator to contain the public host keys of all machines in the 1250system administrator to contain the public host keys of all machines in the
1225organization. 1251organization.
diff --git a/sshd.8 b/sshd.8
index 5b8380dc5..62e3de7c6 100644
--- a/sshd.8
+++ b/sshd.8
@@ -34,13 +34,13 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: sshd.8,v 1.119 2001/04/22 13:32:27 markus Exp $ 37.\" $OpenBSD: sshd.8,v 1.120 2001/04/22 23:58:36 markus Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSHD 8 39.Dt SSHD 8
40.Os 40.Os
41.Sh NAME 41.Sh NAME
42.Nm sshd 42.Nm sshd
43.Nd OpenSSH ssh daemon 43.Nd OpenSSH SSH daemon
44.Sh SYNOPSIS 44.Sh SYNOPSIS
45.Nm sshd 45.Nm sshd
46.Op Fl deiqD46 46.Op Fl deiqD46
@@ -134,8 +134,9 @@ Each host has a host-specific DSA key used to identify the host.
134However, when the daemon starts, it does not generate a server key. 134However, when the daemon starts, it does not generate a server key.
135Forward security is provided through a Diffie-Hellman key agreement. 135Forward security is provided through a Diffie-Hellman key agreement.
136This key agreement results in a shared session key. 136This key agreement results in a shared session key.
137.Pp
137The rest of the session is encrypted using a symmetric cipher, currently 138The rest of the session is encrypted using a symmetric cipher, currently
138Blowfish, 3DES, CAST128, Arcfour, 128 bit AES, or 256 bit AES. 139128 bit AES, Blowfish, 3DES, CAST128, Arcfour, 192 bit AES, or 256 bit AES.
139The client selects the encryption algorithm 140The client selects the encryption algorithm
140to use from those offered by the server. 141to use from those offered by the server.
141Additionally, session integrity is provided 142Additionally, session integrity is provided
@@ -143,8 +144,9 @@ through a cryptographic message authentication code
143(hmac-sha1 or hmac-md5). 144(hmac-sha1 or hmac-md5).
144.Pp 145.Pp
145Protocol version 2 provides a public key based 146Protocol version 2 provides a public key based
146user authentication method (PubkeyAuthentication) 147user (PubkeyAuthentication) or
147and conventional password authentication. 148client host (HostbasedAuthentication) authentication method,
149conventional password authentication and challenge response based methods.
148.Pp 150.Pp
149.Ss Command execution and data forwarding 151.Ss Command execution and data forwarding
150.Pp 152.Pp
@@ -180,7 +182,8 @@ by executing itself with the name it was started as, ie.
180The options are as follows: 182The options are as follows:
181.Bl -tag -width Ds 183.Bl -tag -width Ds
182.It Fl b Ar bits 184.It Fl b Ar bits
183Specifies the number of bits in the server key (default 768). 185Specifies the number of bits in the ephemeral protocol version 1
186server key (default 768).
184.Pp 187.Pp
185.It Fl d 188.It Fl d
186Debug mode. 189Debug mode.
@@ -188,8 +191,12 @@ The server sends verbose debug output to the system
188log, and does not put itself in the background. 191log, and does not put itself in the background.
189The server also will not fork and will only process one connection. 192The server also will not fork and will only process one connection.
190This option is only intended for debugging for the server. 193This option is only intended for debugging for the server.
191Multiple -d options increases the debugging level. 194Multiple -d options increase the debugging level.
192Maximum is 3. 195Maximum is 3.
196.It Fl e
197When this option is specified,
198.Nm
199will send the output to the standard error instead of the system log.
193.It Fl f Ar configuration_file 200.It Fl f Ar configuration_file
194Specifies the name of the configuration file. 201Specifies the name of the configuration file.
195The default is 202The default is
@@ -210,7 +217,7 @@ This option must be given if
210is not run as root (as the normal 217is not run as root (as the normal
211host file is normally not readable by anyone but root). 218host file is normally not readable by anyone but root).
212It is possible to have multiple host key files for 219It is possible to have multiple host key files for
213the different protocol versions. 220the different protocol versions and host key algorithms.
214.It Fl i 221.It Fl i
215Specifies that 222Specifies that
216.Nm 223.Nm
@@ -225,8 +232,8 @@ However, with small key sizes (e.g., 512) using
225from inetd may 232from inetd may
226be feasible. 233be feasible.
227.It Fl k Ar key_gen_time 234.It Fl k Ar key_gen_time
228Specifies how often the server key is regenerated (default 3600 235Specifies how often the ephemeral protocol version 1 server key is
229seconds, or one hour). 236regenerated (default 3600 seconds, or one hour).
230The motivation for regenerating the key fairly 237The motivation for regenerating the key fairly
231often is that the key is not stored anywhere, and after about an hour, 238often is that the key is not stored anywhere, and after about an hour,
232it becomes impossible to recover the key for decrypting intercepted 239it becomes impossible to recover the key for decrypting intercepted
@@ -263,18 +270,6 @@ When this option is specified
263will not detach and does not become a daemon. 270will not detach and does not become a daemon.
264This allows easy monitoring of 271This allows easy monitoring of
265.Nm sshd . 272.Nm sshd .
266.It Fl e
267When this option is specified,
268.Nm
269will send the output to the standard error instead of the system log.
270.It Fl V Ar client_protocol_id
271SSH-2 compatibility mode.
272When this option is specified
273.Nm
274assumes the client has sent the supplied version string
275and skips the
276Protocol Version Identification Exchange.
277This option is not intended to be called directly.
278.It Fl 4 273.It Fl 4
279Forces 274Forces
280.Nm 275.Nm
@@ -426,6 +421,15 @@ or
426.Dq no . 421.Dq no .
427The default is 422The default is
428.Dq no . 423.Dq no .
424.It Cm HostbasedAuthentication
425Specifies whether rhosts or /etc/hosts.equiv authentication together
426with successful public key client host authentication is allowed
427(hostbased authentication).
428This option is similar to
429.Cm RhostsRSAAuthentication
430and applies to protocol version 2 only.
431The default is
432.Dq no .
429.It Cm HostKey 433.It Cm HostKey
430Specifies the file containing the private host keys (default 434Specifies the file containing the private host keys (default
431.Pa /etc/ssh_host_key ) 435.Pa /etc/ssh_host_key )
@@ -445,7 +449,12 @@ Specifies that
445.Pa .rhosts 449.Pa .rhosts
446and 450and
447.Pa .shosts 451.Pa .shosts
448files will not be used in authentication. 452files will not be used in
453.Cm RhostsAuthentication ,
454.Cm RhostsRSAAuthentication
455or
456.Cm HostbasedAuthentication .
457.Pp
449.Pa /etc/hosts.equiv 458.Pa /etc/hosts.equiv
450and 459and
451.Pa /etc/shosts.equiv 460.Pa /etc/shosts.equiv
@@ -458,7 +467,9 @@ Specifies whether
458should ignore the user's 467should ignore the user's
459.Pa $HOME/.ssh/known_hosts 468.Pa $HOME/.ssh/known_hosts
460during 469during
461.Cm RhostsRSAAuthentication . 470.Cm RhostsRSAAuthentication
471or
472.Cm HostbasedAuthentication .
462The default is 473The default is
463.Dq no . 474.Dq no .
464.It Cm KeepAlive 475.It Cm KeepAlive
@@ -511,8 +522,8 @@ file on logout.
511Default is 522Default is
512.Dq yes . 523.Dq yes .
513.It Cm KeyRegenerationInterval 524.It Cm KeyRegenerationInterval
514The server key is automatically regenerated after this many seconds 525In protocol version 1, the ephemeral server key is automatically regenerated
515(if it has been used). 526after this many seconds (if it has been used).
516The purpose of regeneration is to prevent 527The purpose of regeneration is to prevent
517decrypting captured sessions by later breaking into the machine and 528decrypting captured sessions by later breaking into the machine and
518stealing the keys. 529stealing the keys.
@@ -521,7 +532,7 @@ If the value is 0, the key is never regenerated.
521The default is 3600 (seconds). 532The default is 3600 (seconds).
522.It Cm ListenAddress 533.It Cm ListenAddress
523Specifies the local addresses 534Specifies the local addresses
524.Xr sshd 8 535.Nm
525should listen on. 536should listen on.
526The following forms may be used: 537The following forms may be used:
527.Pp 538.Pp
@@ -547,7 +558,7 @@ The following forms may be used:
547If 558If
548.Ar port 559.Ar port
549is not specified, 560is not specified,
550.Xr sshd 8 561.Nm
551will listen on the address and all prior 562will listen on the address and all prior
552.Cm Port 563.Cm Port
553options specified. The default is to listen on all local 564options specified. The default is to listen on all local
@@ -609,7 +620,6 @@ are refused if the number of unauthenticated connections reaches
609Specifies whether password authentication is allowed. 620Specifies whether password authentication is allowed.
610The default is 621The default is
611.Dq yes . 622.Dq yes .
612Note that this option applies to both protocol versions 1 and 2.
613.It Cm PermitEmptyPasswords 623.It Cm PermitEmptyPasswords
614When password authentication is allowed, it specifies whether the 624When password authentication is allowed, it specifies whether the
615server allows login to accounts with empty password strings. 625server allows login to accounts with empty password strings.
@@ -656,6 +666,8 @@ Specifies the port number that
656listens on. 666listens on.
657The default is 22. 667The default is 22.
658Multiple options of this type are permitted. 668Multiple options of this type are permitted.
669See also
670.Cm ListenAddress .
659.It Cm PrintLastLog 671.It Cm PrintLastLog
660Specifies whether 672Specifies whether
661.Nm 673.Nm
@@ -707,18 +719,20 @@ instead, because it performs RSA-based host authentication in addition
707to normal rhosts or /etc/hosts.equiv authentication. 719to normal rhosts or /etc/hosts.equiv authentication.
708The default is 720The default is
709.Dq no . 721.Dq no .
722This option applies to protocol version 1 only.
710.It Cm RhostsRSAAuthentication 723.It Cm RhostsRSAAuthentication
711Specifies whether rhosts or /etc/hosts.equiv authentication together 724Specifies whether rhosts or /etc/hosts.equiv authentication together
712with successful RSA host authentication is allowed. 725with successful RSA host authentication is allowed.
713The default is 726The default is
714.Dq no . 727.Dq no .
728This option applies to protocol version 1 only.
715.It Cm RSAAuthentication 729.It Cm RSAAuthentication
716Specifies whether pure RSA authentication is allowed. 730Specifies whether pure RSA authentication is allowed.
717The default is 731The default is
718.Dq yes . 732.Dq yes .
719Note that this option applies to protocol version 1 only. 733This option applies to protocol version 1 only.
720.It Cm ServerKeyBits 734.It Cm ServerKeyBits
721Defines the number of bits in the server key. 735Defines the number of bits in the ephemeral protocol version 1 server key.
722The minimum value is 512, and the default is 768. 736The minimum value is 512, and the default is 768.
723.It Cm StrictModes 737.It Cm StrictModes
724Specifies whether 738Specifies whether
@@ -825,12 +839,12 @@ Runs user's shell or command.
825The 839The
826.Pa $HOME/.ssh/authorized_keys 840.Pa $HOME/.ssh/authorized_keys
827file lists the RSA keys that are 841file lists the RSA keys that are
828permitted for RSA authentication in SSH protocols 1.3 and 1.5 842permitted for RSA authentication in protocol version 1
829Similarly, the 843Similarly, the
830.Pa $HOME/.ssh/authorized_keys2 844.Pa $HOME/.ssh/authorized_keys2
831file lists the DSA and RSA keys that are 845file lists the DSA and RSA keys that are
832permitted for public key authentication (PubkeyAuthentication) 846permitted for public key authentication (PubkeyAuthentication)
833in SSH protocol 2.0. 847in protocol version 2.
834.Pp 848.Pp
835Each line of the file contains one 849Each line of the file contains one
836key (empty lines and lines starting with a 850key (empty lines and lines starting with a
@@ -994,7 +1008,10 @@ or by taking
994.Pa /etc/ssh_host_key.pub 1008.Pa /etc/ssh_host_key.pub
995and adding the host names at the front. 1009and adding the host names at the front.
996.Ss Examples 1010.Ss Examples
997closenet,closenet.hut.fi,.\|.\|.\|,130.233.208.41 1024 37 159.\|.\|.93 closenet.hut.fi 1011.Bd -literal
1012closenet,.\|.\|.\|,130.233.208.41 1024 37 159.\|.\|.93 closenet.hut.fi
1013cvs.openbsd.org,199.185.137.3 ssh-rsa AAAA1234.....=
1014.Ed
998.Sh FILES 1015.Sh FILES
999.Bl -tag -width Ds 1016.Bl -tag -width Ds
1000.It Pa /etc/sshd_config 1017.It Pa /etc/sshd_config
@@ -1003,16 +1020,14 @@ Contains configuration data for
1003This file should be writable by root only, but it is recommended 1020This file should be writable by root only, but it is recommended
1004(though not necessary) that it be world-readable. 1021(though not necessary) that it be world-readable.
1005.It Pa /etc/ssh_host_key, /etc/ssh_host_dsa_key, /etc/ssh_host_rsa_key 1022.It Pa /etc/ssh_host_key, /etc/ssh_host_dsa_key, /etc/ssh_host_rsa_key
1006These three files contain the private parts of the 1023These three files contain the private parts of the host keys.
1007(SSH1, SSH2 DSA, and SSH2 RSA) host keys.
1008These files should only be owned by root, readable only by root, and not 1024These files should only be owned by root, readable only by root, and not
1009accessible to others. 1025accessible to others.
1010Note that 1026Note that
1011.Nm 1027.Nm
1012does not start if this file is group/world-accessible. 1028does not start if this file is group/world-accessible.
1013.It Pa /etc/ssh_host_key.pub, /etc/ssh_host_dsa_key.pub, /etc/ssh_host_rsa_key.pub 1029.It Pa /etc/ssh_host_key.pub, /etc/ssh_host_dsa_key.pub, /etc/ssh_host_rsa_key.pub
1014These three files contain the public parts of the 1030These three files contain the public parts of the host keys.
1015(SSH1, SSH2 DSA, and SSH2 RSA) host keys.
1016These files should be world-readable but writable only by 1031These files should be world-readable but writable only by
1017root. 1032root.
1018Their contents should match the respective private parts. 1033Their contents should match the respective private parts.
@@ -1042,7 +1057,7 @@ Users will place the contents of their
1042files into this file, as described in 1057files into this file, as described in
1043.Xr ssh-keygen 1 . 1058.Xr ssh-keygen 1 .
1044.It Pa $HOME/.ssh/authorized_keys2 1059.It Pa $HOME/.ssh/authorized_keys2
1045Lists the DSA keys that can be used to log into the user's account. 1060Lists the public keys (RSA or DSA) that can be used to log into the user's account.
1046This file must be readable by root (which may on some machines imply 1061This file must be readable by root (which may on some machines imply
1047it being world-readable if the user's home directory resides on an NFS 1062it being world-readable if the user's home directory resides on an NFS
1048volume). 1063volume).
@@ -1065,6 +1080,17 @@ These files should be writable only by root/the owner.
1065should be world-readable, and 1080should be world-readable, and
1066.Pa $HOME/.ssh/known_hosts 1081.Pa $HOME/.ssh/known_hosts
1067can but need not be world-readable. 1082can but need not be world-readable.
1083.It Pa "/etc/ssh_known_hosts2" and "$HOME/.ssh/known_hosts2"
1084These files are consulted when using protocol version 2 hostbased
1085authentication to check the public key of the host.
1086The key must be listed in one of these files to be accepted.
1087The client uses the same files
1088to verify that it is connecting to the correct remote host.
1089These files should be writable only by root/the owner.
1090.Pa /etc/ssh_known_hosts2
1091should be world-readable, and
1092.Pa $HOME/.ssh/known_hosts2
1093can but need not be world-readable.
1068.It Pa /etc/nologin 1094.It Pa /etc/nologin
1069If this file exists, 1095If this file exists,
1070.Nm 1096.Nm
@@ -1162,8 +1188,12 @@ which may be needed before the user's home directory becomes
1162accessible; AFS is a particular example of such an environment. 1188accessible; AFS is a particular example of such an environment.
1163.Pp 1189.Pp
1164This file will probably contain some initialization code followed by 1190This file will probably contain some initialization code followed by
1165something similar to: "if read proto cookie; then echo add $DISPLAY 1191something similar to:
1166$proto $cookie | xauth -q -; fi". 1192.Bd -literal
1193 if read proto cookie; then
1194 echo add $DISPLAY $proto $cookie | xauth -q -
1195 fi
1196.Ed
1167.Pp 1197.Pp
1168If this file does not exist, 1198If this file does not exist,
1169.Pa /etc/sshrc 1199.Pa /etc/sshrc
@@ -1209,3 +1239,12 @@ protocol versions 1.5 and 2.0.
1209.%D January 2001 1239.%D January 2001
1210.%O work in progress material 1240.%O work in progress material
1211.Re 1241.Re
1242.Rs
1243.%A M. Friedl
1244.%A N. Provos
1245.%A W. A. Simpson
1246.%T "Diffie-Hellman Group Exchange for the SSH Transport Layer Protocol"
1247.%N draft-ietf-secsh-dh-group-exchange-00.txt
1248.%D January 2001
1249.%O work in progress material
1250.Re