summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authordjm@openbsd.org <djm@openbsd.org>2014-12-11 05:25:06 +0000
committerDamien Miller <djm@mindrot.org>2014-12-11 19:17:25 +1100
commitd663bea30a294d440fef4398e5cd816317bd4518 (patch)
treee54be6782d3573e9d536cb4a0bd7441a705c9a82
parent17bf3d81e00f2abb414a4fd271118cf4913f049f (diff)
upstream commit
mention AuthorizedKeysCommandUser must be set for AuthorizedKeysCommand to be run; bz#2287
-rw-r--r--sshd_config.519
1 files changed, 17 insertions, 2 deletions
diff --git a/sshd_config.5 b/sshd_config.5
index 78a8d00be..9f52cf441 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: sshd_config.5,v 1.180 2014/11/22 19:21:03 jmc Exp $ 36.\" $OpenBSD: sshd_config.5,v 1.181 2014/12/11 05:25:06 djm Exp $
37.Dd $Mdocdate: November 22 2014 $ 37.Dd $Mdocdate: December 11 2014 $
38.Dt SSHD_CONFIG 5 38.Dt SSHD_CONFIG 5
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -210,6 +210,18 @@ would restrict keyboard interactive authentication to the
210.Dq bsdauth 210.Dq bsdauth
211device. 211device.
212.Pp 212.Pp
213If the
214.Dq publickey
215method is listed more than one,
216.Xr sshd 8
217verifies that keys that have been successfully are not reused for subsequent
218authentications.
219For example, an
220.Cm AuthenticationMethods
221of
222.Dq publickey,publickey
223will require successful authentication using two different public keys.
224.Pp
213This option is only available for SSH protocol 2 and will yield a fatal 225This option is only available for SSH protocol 2 and will yield a fatal
214error if enabled if protocol 1 is also enabled. 226error if enabled if protocol 1 is also enabled.
215Note that each authentication method listed should also be explicitly enabled 227Note that each authentication method listed should also be explicitly enabled
@@ -232,6 +244,9 @@ By default, no AuthorizedKeysCommand is run.
232Specifies the user under whose account the AuthorizedKeysCommand is run. 244Specifies the user under whose account the AuthorizedKeysCommand is run.
233It is recommended to use a dedicated user that has no other role on the host 245It is recommended to use a dedicated user that has no other role on the host
234than running authorized keys commands. 246than running authorized keys commands.
247If no user is specified then
248.Cm AuthorizedKeysCommand
249is ignored.
235.It Cm AuthorizedKeysFile 250.It Cm AuthorizedKeysFile
236Specifies the file that contains the public keys that can be used 251Specifies the file that contains the public keys that can be used
237for user authentication. 252for user authentication.