diff options
author | Colin Watson <cjwatson@debian.org> | 2015-08-19 14:23:50 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2015-08-19 14:23:50 +0100 |
commit | baccdb349b31c47cd76fb63211f754ed33a9707e (patch) | |
tree | d03653f975fd4eb8bf71bb0c9d168614401202fa /ssh.0 | |
parent | 487bdb3a5ef6075887b830ccb8a0b14f6da78e93 (diff) | |
parent | 9f82e5a9042f2d872e98f48a876fcab3e25dd9bb (diff) |
Import openssh_6.8p1.orig.tar.gz
Diffstat (limited to 'ssh.0')
-rw-r--r-- | ssh.0 | 169 |
1 files changed, 88 insertions, 81 deletions
@@ -1,15 +1,15 @@ | |||
1 | SSH(1) General Commands Manual SSH(1) | 1 | SSH(1) General Commands Manual SSH(1) |
2 | 2 | ||
3 | NAME | 3 | NAME |
4 | ssh - OpenSSH SSH client (remote login program) | 4 | ssh M-bM-^@M-^S OpenSSH SSH client (remote login program) |
5 | 5 | ||
6 | SYNOPSIS | 6 | SYNOPSIS |
7 | ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] | 7 | ssh [-1246AaCfGgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] |
8 | [-D [bind_address:]port] [-E log_file] [-e escape_char] | 8 | [-D [bind_address:]port] [-E log_file] [-e escape_char] |
9 | [-F configfile] [-I pkcs11] [-i identity_file] | 9 | [-F configfile] [-I pkcs11] [-i identity_file] |
10 | [-L [bind_address:]port:host:hostport] [-l login_name] [-m mac_spec] | 10 | [-L [bind_address:]port:host:hostport] [-l login_name] [-m mac_spec] |
11 | [-O ctl_cmd] [-o option] [-p port] | 11 | [-O ctl_cmd] [-o option] [-p port] |
12 | [-Q cipher | cipher-auth | mac | kex | key] | 12 | [-Q cipher | cipher-auth | mac | kex | key | protocol-version] |
13 | [-R [bind_address:]port:host:hostport] [-S ctl_path] [-W host:port] | 13 | [-R [bind_address:]port:host:hostport] [-S ctl_path] [-W host:port] |
14 | [-w local_tun[:remote_tun]] [user@]hostname [command] | 14 | [-w local_tun[:remote_tun]] [user@]hostname [command] |
15 | 15 | ||
@@ -61,7 +61,7 @@ DESCRIPTION | |||
61 | -C Requests compression of all data (including stdin, stdout, | 61 | -C Requests compression of all data (including stdin, stdout, |
62 | stderr, and data for forwarded X11, TCP and UNIX-domain | 62 | stderr, and data for forwarded X11, TCP and UNIX-domain |
63 | connections). The compression algorithm is the same used by | 63 | connections). The compression algorithm is the same used by |
64 | gzip(1), and the ``level'' can be controlled by the | 64 | gzip(1), and the M-bM-^@M-^\levelM-bM-^@M-^] can be controlled by the |
65 | CompressionLevel option for protocol version 1. Compression is | 65 | CompressionLevel option for protocol version 1. Compression is |
66 | desirable on modem lines and other slow connections, but will | 66 | desirable on modem lines and other slow connections, but will |
67 | only slow down things on fast networks. The default value can be | 67 | only slow down things on fast networks. The default value can be |
@@ -72,13 +72,13 @@ DESCRIPTION | |||
72 | Selects the cipher specification for encrypting the session. | 72 | Selects the cipher specification for encrypting the session. |
73 | 73 | ||
74 | Protocol version 1 allows specification of a single cipher. The | 74 | Protocol version 1 allows specification of a single cipher. The |
75 | supported values are ``3des'', ``blowfish'', and ``des''. For | 75 | supported values are M-bM-^@M-^\3desM-bM-^@M-^], M-bM-^@M-^\blowfishM-bM-^@M-^], and M-bM-^@M-^\desM-bM-^@M-^]. For protocol |
76 | protocol version 2, cipher_spec is a comma-separated list of | 76 | version 2, cipher_spec is a comma-separated list of ciphers |
77 | ciphers listed in order of preference. See the Ciphers keyword | 77 | listed in order of preference. See the Ciphers keyword in |
78 | in ssh_config(5) for more information. | 78 | ssh_config(5) for more information. |
79 | 79 | ||
80 | -D [bind_address:]port | 80 | -D [bind_address:]port |
81 | Specifies a local ``dynamic'' application-level port forwarding. | 81 | Specifies a local M-bM-^@M-^\dynamicM-bM-^@M-^] application-level port forwarding. |
82 | This works by allocating a socket to listen to port on the local | 82 | This works by allocating a socket to listen to port on the local |
83 | side, optionally bound to the specified bind_address. Whenever a | 83 | side, optionally bound to the specified bind_address. Whenever a |
84 | connection is made to this port, the connection is forwarded over | 84 | connection is made to this port, the connection is forwarded over |
@@ -94,20 +94,20 @@ DESCRIPTION | |||
94 | ports. By default, the local port is bound in accordance with | 94 | ports. By default, the local port is bound in accordance with |
95 | the GatewayPorts setting. However, an explicit bind_address may | 95 | the GatewayPorts setting. However, an explicit bind_address may |
96 | be used to bind the connection to a specific address. The | 96 | be used to bind the connection to a specific address. The |
97 | bind_address of ``localhost'' indicates that the listening port | 97 | bind_address of M-bM-^@M-^\localhostM-bM-^@M-^] indicates that the listening port be |
98 | be bound for local use only, while an empty address or `*' | 98 | bound for local use only, while an empty address or M-bM-^@M-^X*M-bM-^@M-^Y indicates |
99 | indicates that the port should be available from all interfaces. | 99 | that the port should be available from all interfaces. |
100 | 100 | ||
101 | -E log_file | 101 | -E log_file |
102 | Append debug logs to log_file instead of standard error. | 102 | Append debug logs to log_file instead of standard error. |
103 | 103 | ||
104 | -e escape_char | 104 | -e escape_char |
105 | Sets the escape character for sessions with a pty (default: `~'). | 105 | Sets the escape character for sessions with a pty (default: M-bM-^@M-^X~M-bM-^@M-^Y). |
106 | The escape character is only recognized at the beginning of a | 106 | The escape character is only recognized at the beginning of a |
107 | line. The escape character followed by a dot (`.') closes the | 107 | line. The escape character followed by a dot (M-bM-^@M-^X.M-bM-^@M-^Y) closes the |
108 | connection; followed by control-Z suspends the connection; and | 108 | connection; followed by control-Z suspends the connection; and |
109 | followed by itself sends the escape character once. Setting the | 109 | followed by itself sends the escape character once. Setting the |
110 | character to ``none'' disables any escapes and makes the session | 110 | character to M-bM-^@M-^\noneM-bM-^@M-^] disables any escapes and makes the session |
111 | fully transparent. | 111 | fully transparent. |
112 | 112 | ||
113 | -F configfile | 113 | -F configfile |
@@ -122,10 +122,13 @@ DESCRIPTION | |||
122 | implies -n. The recommended way to start X11 programs at a | 122 | implies -n. The recommended way to start X11 programs at a |
123 | remote site is with something like ssh -f host xterm. | 123 | remote site is with something like ssh -f host xterm. |
124 | 124 | ||
125 | If the ExitOnForwardFailure configuration option is set to | 125 | If the ExitOnForwardFailure configuration option is set to M-bM-^@M-^\yesM-bM-^@M-^], |
126 | ``yes'', then a client started with -f will wait for all remote | 126 | then a client started with -f will wait for all remote port |
127 | port forwards to be successfully established before placing | 127 | forwards to be successfully established before placing itself in |
128 | itself in the background. | 128 | the background. |
129 | |||
130 | -G Causes ssh to print its configuration after evaluating Host and | ||
131 | Match blocks and exit. | ||
129 | 132 | ||
130 | -g Allows remote hosts to connect to local forwarded ports. If used | 133 | -g Allows remote hosts to connect to local forwarded ports. If used |
131 | on a multiplexed connection, then this option must be specified | 134 | on a multiplexed connection, then this option must be specified |
@@ -166,17 +169,17 @@ DESCRIPTION | |||
166 | port is bound in accordance with the GatewayPorts setting. | 169 | port is bound in accordance with the GatewayPorts setting. |
167 | However, an explicit bind_address may be used to bind the | 170 | However, an explicit bind_address may be used to bind the |
168 | connection to a specific address. The bind_address of | 171 | connection to a specific address. The bind_address of |
169 | ``localhost'' indicates that the listening port be bound for | 172 | M-bM-^@M-^\localhostM-bM-^@M-^] indicates that the listening port be bound for local |
170 | local use only, while an empty address or `*' indicates that the | 173 | use only, while an empty address or M-bM-^@M-^X*M-bM-^@M-^Y indicates that the port |
171 | port should be available from all interfaces. | 174 | should be available from all interfaces. |
172 | 175 | ||
173 | -l login_name | 176 | -l login_name |
174 | Specifies the user to log in as on the remote machine. This also | 177 | Specifies the user to log in as on the remote machine. This also |
175 | may be specified on a per-host basis in the configuration file. | 178 | may be specified on a per-host basis in the configuration file. |
176 | 179 | ||
177 | -M Places the ssh client into ``master'' mode for connection | 180 | -M Places the ssh client into M-bM-^@M-^\masterM-bM-^@M-^] mode for connection sharing. |
178 | sharing. Multiple -M options places ssh into ``master'' mode | 181 | Multiple -M options places ssh into M-bM-^@M-^\masterM-bM-^@M-^] mode with |
179 | with confirmation required before slave connections are accepted. | 182 | confirmation required before slave connections are accepted. |
180 | Refer to the description of ControlMaster in ssh_config(5) for | 183 | Refer to the description of ControlMaster in ssh_config(5) for |
181 | details. | 184 | details. |
182 | 185 | ||
@@ -201,10 +204,10 @@ DESCRIPTION | |||
201 | -O ctl_cmd | 204 | -O ctl_cmd |
202 | Control an active connection multiplexing master process. When | 205 | Control an active connection multiplexing master process. When |
203 | the -O option is specified, the ctl_cmd argument is interpreted | 206 | the -O option is specified, the ctl_cmd argument is interpreted |
204 | and passed to the master process. Valid commands are: ``check'' | 207 | and passed to the master process. Valid commands are: M-bM-^@M-^\checkM-bM-^@M-^] |
205 | (check that the master process is running), ``forward'' (request | 208 | (check that the master process is running), M-bM-^@M-^\forwardM-bM-^@M-^] (request |
206 | forwardings without command execution), ``cancel'' (cancel | 209 | forwardings without command execution), M-bM-^@M-^\cancelM-bM-^@M-^] (cancel |
207 | forwardings), ``exit'' (request the master to exit), and ``stop'' | 210 | forwardings), M-bM-^@M-^\exitM-bM-^@M-^] (request the master to exit), and M-bM-^@M-^\stopM-bM-^@M-^] |
208 | (request the master to stop accepting further multiplexing | 211 | (request the master to stop accepting further multiplexing |
209 | requests). | 212 | requests). |
210 | 213 | ||
@@ -238,6 +241,7 @@ DESCRIPTION | |||
238 | DynamicForward | 241 | DynamicForward |
239 | EscapeChar | 242 | EscapeChar |
240 | ExitOnForwardFailure | 243 | ExitOnForwardFailure |
244 | FingerprintHash | ||
241 | ForwardAgent | 245 | ForwardAgent |
242 | ForwardX11 | 246 | ForwardX11 |
243 | ForwardX11Timeout | 247 | ForwardX11Timeout |
@@ -249,6 +253,7 @@ DESCRIPTION | |||
249 | HashKnownHosts | 253 | HashKnownHosts |
250 | Host | 254 | Host |
251 | HostbasedAuthentication | 255 | HostbasedAuthentication |
256 | HostbasedKeyTypes | ||
252 | HostKeyAlgorithms | 257 | HostKeyAlgorithms |
253 | HostKeyAlias | 258 | HostKeyAlias |
254 | HostName | 259 | HostName |
@@ -288,6 +293,7 @@ DESCRIPTION | |||
288 | TCPKeepAlive | 293 | TCPKeepAlive |
289 | Tunnel | 294 | Tunnel |
290 | TunnelDevice | 295 | TunnelDevice |
296 | UpdateHostKeys | ||
291 | UsePrivilegedPort | 297 | UsePrivilegedPort |
292 | User | 298 | User |
293 | UserKnownHostsFile | 299 | UserKnownHostsFile |
@@ -299,12 +305,13 @@ DESCRIPTION | |||
299 | Port to connect to on the remote host. This can be specified on | 305 | Port to connect to on the remote host. This can be specified on |
300 | a per-host basis in the configuration file. | 306 | a per-host basis in the configuration file. |
301 | 307 | ||
302 | -Q cipher | cipher-auth | mac | kex | key | 308 | -Q cipher | cipher-auth | mac | kex | key | protocol-version |
303 | Queries ssh for the algorithms supported for the specified | 309 | Queries ssh for the algorithms supported for the specified |
304 | version 2. The available features are: cipher (supported | 310 | version 2. The available features are: cipher (supported |
305 | symmetric ciphers), cipher-auth (supported symmetric ciphers that | 311 | symmetric ciphers), cipher-auth (supported symmetric ciphers that |
306 | support authenticated encryption), mac (supported message | 312 | support authenticated encryption), mac (supported message |
307 | integrity codes), kex (key exchange algorithms), key (key types). | 313 | integrity codes), kex (key exchange algorithms), key (key types) |
314 | and protocol-version (supported SSH protocol versions). | ||
308 | 315 | ||
309 | -q Quiet mode. Causes most warning and diagnostic messages to be | 316 | -q Quiet mode. Causes most warning and diagnostic messages to be |
310 | suppressed. | 317 | suppressed. |
@@ -325,19 +332,19 @@ DESCRIPTION | |||
325 | By default, the listening socket on the server will be bound to | 332 | By default, the listening socket on the server will be bound to |
326 | the loopback interface only. This may be overridden by | 333 | the loopback interface only. This may be overridden by |
327 | specifying a bind_address. An empty bind_address, or the address | 334 | specifying a bind_address. An empty bind_address, or the address |
328 | `*', indicates that the remote socket should listen on all | 335 | M-bM-^@M-^X*M-bM-^@M-^Y, indicates that the remote socket should listen on all |
329 | interfaces. Specifying a remote bind_address will only succeed | 336 | interfaces. Specifying a remote bind_address will only succeed |
330 | if the server's GatewayPorts option is enabled (see | 337 | if the server's GatewayPorts option is enabled (see |
331 | sshd_config(5)). | 338 | sshd_config(5)). |
332 | 339 | ||
333 | If the port argument is `0', the listen port will be dynamically | 340 | If the port argument is M-bM-^@M-^X0M-bM-^@M-^Y, the listen port will be dynamically |
334 | allocated on the server and reported to the client at run time. | 341 | allocated on the server and reported to the client at run time. |
335 | When used together with -O forward the allocated port will be | 342 | When used together with -O forward the allocated port will be |
336 | printed to the standard output. | 343 | printed to the standard output. |
337 | 344 | ||
338 | -S ctl_path | 345 | -S ctl_path |
339 | Specifies the location of a control socket for connection | 346 | Specifies the location of a control socket for connection |
340 | sharing, or the string ``none'' to disable connection sharing. | 347 | sharing, or the string M-bM-^@M-^\noneM-bM-^@M-^] to disable connection sharing. |
341 | Refer to the description of ControlPath and ControlMaster in | 348 | Refer to the description of ControlPath and ControlMaster in |
342 | ssh_config(5) for details. | 349 | ssh_config(5) for details. |
343 | 350 | ||
@@ -373,11 +380,11 @@ DESCRIPTION | |||
373 | (remote_tun). | 380 | (remote_tun). |
374 | 381 | ||
375 | The devices may be specified by numerical ID or the keyword | 382 | The devices may be specified by numerical ID or the keyword |
376 | ``any'', which uses the next available tunnel device. If | 383 | M-bM-^@M-^\anyM-bM-^@M-^], which uses the next available tunnel device. If |
377 | remote_tun is not specified, it defaults to ``any''. See also | 384 | remote_tun is not specified, it defaults to M-bM-^@M-^\anyM-bM-^@M-^]. See also the |
378 | the Tunnel and TunnelDevice directives in ssh_config(5). If the | 385 | Tunnel and TunnelDevice directives in ssh_config(5). If the |
379 | Tunnel directive is unset, it is set to the default tunnel mode, | 386 | Tunnel directive is unset, it is set to the default tunnel mode, |
380 | which is ``point-to-point''. | 387 | which is M-bM-^@M-^\point-to-pointM-bM-^@M-^]. |
381 | 388 | ||
382 | -X Enables X11 forwarding. This can also be specified on a per-host | 389 | -X Enables X11 forwarding. This can also be specified on a per-host |
383 | basis in a configuration file. | 390 | basis in a configuration file. |
@@ -444,7 +451,7 @@ AUTHENTICATION | |||
444 | creates a public/private key pair for authentication purposes. The | 451 | creates a public/private key pair for authentication purposes. The |
445 | server knows the public key, and only the user knows the private key. | 452 | server knows the public key, and only the user knows the private key. |
446 | ssh implements public key authentication protocol automatically, using | 453 | ssh implements public key authentication protocol automatically, using |
447 | one of the DSA, ECDSA, ED25519 or RSA algorithms. Protocol 1 is | 454 | one of the DSA, ECDSA, Ed25519 or RSA algorithms. Protocol 1 is |
448 | restricted to using only RSA keys, but protocol 2 may use any. The | 455 | restricted to using only RSA keys, but protocol 2 may use any. The |
449 | HISTORY section of ssl(8) contains a brief discussion of the DSA and RSA | 456 | HISTORY section of ssl(8) contains a brief discussion of the DSA and RSA |
450 | algorithms. | 457 | algorithms. |
@@ -458,10 +465,10 @@ AUTHENTICATION | |||
458 | The user creates his/her key pair by running ssh-keygen(1). This stores | 465 | The user creates his/her key pair by running ssh-keygen(1). This stores |
459 | the private key in ~/.ssh/identity (protocol 1), ~/.ssh/id_dsa (protocol | 466 | the private key in ~/.ssh/identity (protocol 1), ~/.ssh/id_dsa (protocol |
460 | 2 DSA), ~/.ssh/id_ecdsa (protocol 2 ECDSA), ~/.ssh/id_ed25519 (protocol 2 | 467 | 2 DSA), ~/.ssh/id_ecdsa (protocol 2 ECDSA), ~/.ssh/id_ed25519 (protocol 2 |
461 | ED25519), or ~/.ssh/id_rsa (protocol 2 RSA) and stores the public key in | 468 | Ed25519), or ~/.ssh/id_rsa (protocol 2 RSA) and stores the public key in |
462 | ~/.ssh/identity.pub (protocol 1), ~/.ssh/id_dsa.pub (protocol 2 DSA), | 469 | ~/.ssh/identity.pub (protocol 1), ~/.ssh/id_dsa.pub (protocol 2 DSA), |
463 | ~/.ssh/id_ecdsa.pub (protocol 2 ECDSA), ~/.ssh/id_ed25519.pub (protocol 2 | 470 | ~/.ssh/id_ecdsa.pub (protocol 2 ECDSA), ~/.ssh/id_ed25519.pub (protocol 2 |
464 | ED25519), or ~/.ssh/id_rsa.pub (protocol 2 RSA) in the user's home | 471 | Ed25519), or ~/.ssh/id_rsa.pub (protocol 2 RSA) in the user's home |
465 | directory. The user should then copy the public key to | 472 | directory. The user should then copy the public key to |
466 | ~/.ssh/authorized_keys in his/her home directory on the remote machine. | 473 | ~/.ssh/authorized_keys in his/her home directory on the remote machine. |
467 | The authorized_keys file corresponds to the conventional ~/.rhosts file, | 474 | The authorized_keys file corresponds to the conventional ~/.rhosts file, |
@@ -512,8 +519,8 @@ AUTHENTICATION | |||
512 | 519 | ||
513 | If no pseudo-tty has been allocated, the session is transparent and can | 520 | If no pseudo-tty has been allocated, the session is transparent and can |
514 | be used to reliably transfer binary data. On most systems, setting the | 521 | be used to reliably transfer binary data. On most systems, setting the |
515 | escape character to ``none'' will also make the session transparent even | 522 | escape character to M-bM-^@M-^\noneM-bM-^@M-^] will also make the session transparent even if |
516 | if a tty is used. | 523 | a tty is used. |
517 | 524 | ||
518 | The session terminates when the command or shell on the remote machine | 525 | The session terminates when the command or shell on the remote machine |
519 | exits and all X11 and TCP connections have been closed. | 526 | exits and all X11 and TCP connections have been closed. |
@@ -528,7 +535,7 @@ ESCAPE CHARACTERS | |||
528 | character can be changed in configuration files using the EscapeChar | 535 | character can be changed in configuration files using the EscapeChar |
529 | configuration directive or on the command line by the -e option. | 536 | configuration directive or on the command line by the -e option. |
530 | 537 | ||
531 | The supported escapes (assuming the default `~') are: | 538 | The supported escapes (assuming the default M-bM-^@M-^X~M-bM-^@M-^Y) are: |
532 | 539 | ||
533 | ~. Disconnect. | 540 | ~. Disconnect. |
534 | 541 | ||
@@ -577,26 +584,26 @@ TCP FORWARDING | |||
577 | same local port, and ssh will encrypt and forward the connection. | 584 | same local port, and ssh will encrypt and forward the connection. |
578 | 585 | ||
579 | The following example tunnels an IRC session from client machine | 586 | The following example tunnels an IRC session from client machine |
580 | ``127.0.0.1'' (localhost) to remote server ``server.example.com'': | 587 | M-bM-^@M-^\127.0.0.1M-bM-^@M-^] (localhost) to remote server M-bM-^@M-^\server.example.comM-bM-^@M-^]: |
581 | 588 | ||
582 | $ ssh -f -L 1234:localhost:6667 server.example.com sleep 10 | 589 | $ ssh -f -L 1234:localhost:6667 server.example.com sleep 10 |
583 | $ irc -c '#users' -p 1234 pinky 127.0.0.1 | 590 | $ irc -c '#users' -p 1234 pinky 127.0.0.1 |
584 | 591 | ||
585 | This tunnels a connection to IRC server ``server.example.com'', joining | 592 | This tunnels a connection to IRC server M-bM-^@M-^\server.example.comM-bM-^@M-^], joining |
586 | channel ``#users'', nickname ``pinky'', using port 1234. It doesn't | 593 | channel M-bM-^@M-^\#usersM-bM-^@M-^], nickname M-bM-^@M-^\pinkyM-bM-^@M-^], using port 1234. It doesn't matter |
587 | matter which port is used, as long as it's greater than 1023 (remember, | 594 | which port is used, as long as it's greater than 1023 (remember, only |
588 | only root can open sockets on privileged ports) and doesn't conflict with | 595 | root can open sockets on privileged ports) and doesn't conflict with any |
589 | any ports already in use. The connection is forwarded to port 6667 on | 596 | ports already in use. The connection is forwarded to port 6667 on the |
590 | the remote server, since that's the standard port for IRC services. | 597 | remote server, since that's the standard port for IRC services. |
591 | 598 | ||
592 | The -f option backgrounds ssh and the remote command ``sleep 10'' is | 599 | The -f option backgrounds ssh and the remote command M-bM-^@M-^\sleep 10M-bM-^@M-^] is |
593 | specified to allow an amount of time (10 seconds, in the example) to | 600 | specified to allow an amount of time (10 seconds, in the example) to |
594 | start the service which is to be tunnelled. If no connections are made | 601 | start the service which is to be tunnelled. If no connections are made |
595 | within the time specified, ssh will exit. | 602 | within the time specified, ssh will exit. |
596 | 603 | ||
597 | X11 FORWARDING | 604 | X11 FORWARDING |
598 | If the ForwardX11 variable is set to ``yes'' (or see the description of | 605 | If the ForwardX11 variable is set to M-bM-^@M-^\yesM-bM-^@M-^] (or see the description of the |
599 | the -X, -x, and -Y options above) and the user is using X11 (the DISPLAY | 606 | -X, -x, and -Y options above) and the user is using X11 (the DISPLAY |
600 | environment variable is set), the connection to the X11 display is | 607 | environment variable is set), the connection to the X11 display is |
601 | automatically forwarded to the remote side in such a way that any X11 | 608 | automatically forwarded to the remote side in such a way that any X11 |
602 | programs started from the shell (or command) will go through the | 609 | programs started from the shell (or command) will go through the |
@@ -607,7 +614,7 @@ X11 FORWARDING | |||
607 | 614 | ||
608 | The DISPLAY value set by ssh will point to the server machine, but with a | 615 | The DISPLAY value set by ssh will point to the server machine, but with a |
609 | display number greater than zero. This is normal, and happens because | 616 | display number greater than zero. This is normal, and happens because |
610 | ssh creates a ``proxy'' X server on the server machine for forwarding the | 617 | ssh creates a M-bM-^@M-^\proxyM-bM-^@M-^] X server on the server machine for forwarding the |
611 | connections over the encrypted channel. | 618 | connections over the encrypted channel. |
612 | 619 | ||
613 | ssh will also automatically set up Xauthority data on the server machine. | 620 | ssh will also automatically set up Xauthority data on the server machine. |
@@ -617,7 +624,7 @@ X11 FORWARDING | |||
617 | is opened. The real authentication cookie is never sent to the server | 624 | is opened. The real authentication cookie is never sent to the server |
618 | machine (and no cookies are sent in the plain). | 625 | machine (and no cookies are sent in the plain). |
619 | 626 | ||
620 | If the ForwardAgent variable is set to ``yes'' (or see the description of | 627 | If the ForwardAgent variable is set to M-bM-^@M-^\yesM-bM-^@M-^] (or see the description of |
621 | the -A and -a options above) and the user is using an authentication | 628 | the -A and -a options above) and the user is using an authentication |
622 | agent, the connection to the agent is automatically forwarded to the | 629 | agent, the connection to the agent is automatically forwarded to the |
623 | remote side. | 630 | remote side. |
@@ -632,15 +639,15 @@ VERIFYING HOST KEYS | |||
632 | 639 | ||
633 | If the fingerprint is already known, it can be matched and the key can be | 640 | If the fingerprint is already known, it can be matched and the key can be |
634 | accepted or rejected. Because of the difficulty of comparing host keys | 641 | accepted or rejected. Because of the difficulty of comparing host keys |
635 | just by looking at hex strings, there is also support to compare host | 642 | just by looking at fingerprint strings, there is also support to compare |
636 | keys visually, using random art. By setting the VisualHostKey option to | 643 | host keys visually, using random art. By setting the VisualHostKey |
637 | ``yes'', a small ASCII graphic gets displayed on every login to a server, | 644 | option to M-bM-^@M-^\yesM-bM-^@M-^], a small ASCII graphic gets displayed on every login to a |
638 | no matter if the session itself is interactive or not. By learning the | 645 | server, no matter if the session itself is interactive or not. By |
639 | pattern a known server produces, a user can easily find out that the host | 646 | learning the pattern a known server produces, a user can easily find out |
640 | key has changed when a completely different pattern is displayed. | 647 | that the host key has changed when a completely different pattern is |
641 | Because these patterns are not unambiguous however, a pattern that looks | 648 | displayed. Because these patterns are not unambiguous however, a pattern |
642 | similar to the pattern remembered only gives a good probability that the | 649 | that looks similar to the pattern remembered only gives a good |
643 | host key is the same, not guaranteed proof. | 650 | probability that the host key is the same, not guaranteed proof. |
644 | 651 | ||
645 | To get a listing of the fingerprints along with their random art for all | 652 | To get a listing of the fingerprints along with their random art for all |
646 | known hosts, the following command line can be used: | 653 | known hosts, the following command line can be used: |
@@ -653,8 +660,8 @@ VERIFYING HOST KEYS | |||
653 | able to match the fingerprint with that of the key presented. | 660 | able to match the fingerprint with that of the key presented. |
654 | 661 | ||
655 | In this example, we are connecting a client to a server, | 662 | In this example, we are connecting a client to a server, |
656 | ``host.example.com''. The SSHFP resource records should first be added | 663 | M-bM-^@M-^\host.example.comM-bM-^@M-^]. The SSHFP resource records should first be added to |
657 | to the zonefile for host.example.com: | 664 | the zonefile for host.example.com: |
658 | 665 | ||
659 | $ ssh-keygen -r host.example.com. | 666 | $ ssh-keygen -r host.example.com. |
660 | 667 | ||
@@ -697,9 +704,9 @@ SSH-BASED VIRTUAL PRIVATE NETWORKS | |||
697 | 704 | ||
698 | Client access may be more finely tuned via the /root/.ssh/authorized_keys | 705 | Client access may be more finely tuned via the /root/.ssh/authorized_keys |
699 | file (see below) and the PermitRootLogin server option. The following | 706 | file (see below) and the PermitRootLogin server option. The following |
700 | entry would permit connections on tun(4) device 1 from user ``jane'' and | 707 | entry would permit connections on tun(4) device 1 from user M-bM-^@M-^\janeM-bM-^@M-^] and on |
701 | on tun device 2 from user ``john'', if PermitRootLogin is set to | 708 | tun device 2 from user M-bM-^@M-^\johnM-bM-^@M-^], if PermitRootLogin is set to |
702 | ``forced-commands-only'': | 709 | M-bM-^@M-^\forced-commands-onlyM-bM-^@M-^]: |
703 | 710 | ||
704 | tunnel="1",command="sh /etc/netstart tun1" ssh-rsa ... jane | 711 | tunnel="1",command="sh /etc/netstart tun1" ssh-rsa ... jane |
705 | tunnel="2",command="sh /etc/netstart tun2" ssh-rsa ... john | 712 | tunnel="2",command="sh /etc/netstart tun2" ssh-rsa ... john |
@@ -714,14 +721,14 @@ ENVIRONMENT | |||
714 | 721 | ||
715 | DISPLAY The DISPLAY variable indicates the location of the | 722 | DISPLAY The DISPLAY variable indicates the location of the |
716 | X11 server. It is automatically set by ssh to | 723 | X11 server. It is automatically set by ssh to |
717 | point to a value of the form ``hostname:n'', where | 724 | point to a value of the form M-bM-^@M-^\hostname:nM-bM-^@M-^], where |
718 | ``hostname'' indicates the host where the shell | 725 | M-bM-^@M-^\hostnameM-bM-^@M-^] indicates the host where the shell runs, |
719 | runs, and `n' is an integer >= 1. ssh uses this | 726 | and M-bM-^@M-^XnM-bM-^@M-^Y is an integer M-bM-^IM-% 1. ssh uses this special |
720 | special value to forward X11 connections over the | 727 | value to forward X11 connections over the secure |
721 | secure channel. The user should normally not set | 728 | channel. The user should normally not set DISPLAY |
722 | DISPLAY explicitly, as that will render the X11 | 729 | explicitly, as that will render the X11 connection |
723 | connection insecure (and will require the user to | 730 | insecure (and will require the user to manually |
724 | manually copy any required authorization cookies). | 731 | copy any required authorization cookies). |
725 | 732 | ||
726 | HOME Set to the path of the user's home directory. | 733 | HOME Set to the path of the user's home directory. |
727 | 734 | ||
@@ -770,7 +777,7 @@ ENVIRONMENT | |||
770 | USER Set to the name of the user logging in. | 777 | USER Set to the name of the user logging in. |
771 | 778 | ||
772 | Additionally, ssh reads ~/.ssh/environment, and adds lines of the format | 779 | Additionally, ssh reads ~/.ssh/environment, and adds lines of the format |
773 | ``VARNAME=value'' to the environment if the file exists and users are | 780 | M-bM-^@M-^\VARNAME=valueM-bM-^@M-^] to the environment if the file exists and users are |
774 | allowed to change their environment. For more information, see the | 781 | allowed to change their environment. For more information, see the |
775 | PermitUserEnvironment option in sshd_config(5). | 782 | PermitUserEnvironment option in sshd_config(5). |
776 | 783 | ||
@@ -797,7 +804,7 @@ FILES | |||
797 | for the user, and not accessible by others. | 804 | for the user, and not accessible by others. |
798 | 805 | ||
799 | ~/.ssh/authorized_keys | 806 | ~/.ssh/authorized_keys |
800 | Lists the public keys (DSA, ECDSA, ED25519, RSA) that can be used | 807 | Lists the public keys (DSA, ECDSA, Ed25519, RSA) that can be used |
801 | for logging in as this user. The format of this file is | 808 | for logging in as this user. The format of this file is |
802 | described in the sshd(8) manual page. This file is not highly | 809 | described in the sshd(8) manual page. This file is not highly |
803 | sensitive, but the recommended permissions are read/write for the | 810 | sensitive, but the recommended permissions are read/write for the |
@@ -941,4 +948,4 @@ AUTHORS | |||
941 | created OpenSSH. Markus Friedl contributed the support for SSH protocol | 948 | created OpenSSH. Markus Friedl contributed the support for SSH protocol |
942 | versions 1.5 and 2.0. | 949 | versions 1.5 and 2.0. |
943 | 950 | ||
944 | OpenBSD 5.6 July 24, 2014 OpenBSD 5.6 | 951 | OpenBSD 5.7 March 3, 2015 OpenBSD 5.7 |