summaryrefslogtreecommitdiff
path: root/ssh.0
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2018-04-03 08:20:28 +0100
committerColin Watson <cjwatson@debian.org>2018-04-03 08:20:28 +0100
commited6ae9c1a014a08ff5db3d768f01f2e427eeb476 (patch)
tree601025e307745d351946c01ab13f419ddb6dae29 /ssh.0
parent62f54f20bf351468e0124f63cc2902ee40d9b0e9 (diff)
parenta0349a1cc4a18967ad1dbff5389bcdf9da098814 (diff)
Import openssh_7.7p1.orig.tar.gz
Diffstat (limited to 'ssh.0')
-rw-r--r--ssh.050
1 files changed, 33 insertions, 17 deletions
diff --git a/ssh.0 b/ssh.0
index f920dd97e..228553c8b 100644
--- a/ssh.0
+++ b/ssh.0
@@ -4,13 +4,13 @@ NAME
4 ssh M-bM-^@M-^S OpenSSH SSH client (remote login program) 4 ssh M-bM-^@M-^S OpenSSH SSH client (remote login program)
5 5
6SYNOPSIS 6SYNOPSIS
7 ssh [-46AaCfGgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] 7 ssh [-46AaCfGgKkMNnqsTtVvXxYy] [-B bind_interface] [-b bind_address]
8 [-D [bind_address:]port] [-E log_file] [-e escape_char] 8 [-c cipher_spec] [-D [bind_address:]port] [-E log_file]
9 [-F configfile] [-I pkcs11] [-i identity_file] 9 [-e escape_char] [-F configfile] [-I pkcs11] [-i identity_file]
10 [-J [user@]host[:port]] [-L address] [-l login_name] [-m mac_spec] 10 [-J destination] [-L address] [-l login_name] [-m mac_spec]
11 [-O ctl_cmd] [-o option] [-p port] [-Q query_option] [-R address] 11 [-O ctl_cmd] [-o option] [-p port] [-Q query_option] [-R address]
12 [-S ctl_path] [-W host:port] [-w local_tun[:remote_tun]] 12 [-S ctl_path] [-W host:port] [-w local_tun[:remote_tun]] destination
13 [user@]hostname [command] 13 [command]
14 14
15DESCRIPTION 15DESCRIPTION
16 ssh (SSH client) is a program for logging into a remote machine and for 16 ssh (SSH client) is a program for logging into a remote machine and for
@@ -19,11 +19,12 @@ DESCRIPTION
19 network. X11 connections, arbitrary TCP ports and UNIX-domain sockets 19 network. X11 connections, arbitrary TCP ports and UNIX-domain sockets
20 can also be forwarded over the secure channel. 20 can also be forwarded over the secure channel.
21 21
22 ssh connects and logs into the specified hostname (with optional user 22 ssh connects and logs into the specified destination, which may be
23 name). The user must prove his/her identity to the remote machine using 23 specified as either [user@]hostname or a URI of the form
24 one of several methods (see below). 24 ssh://[user@]hostname[:port]. The user must prove his/her identity to
25 the remote machine using one of several methods (see below).
25 26
26 If command is specified, it is executed on the remote host instead of a 27 If a command is specified, it is executed on the remote host instead of a
27 login shell. 28 login shell.
28 29
29 The options are as follows: 30 The options are as follows:
@@ -46,6 +47,11 @@ DESCRIPTION
46 47
47 -a Disables forwarding of the authentication agent connection. 48 -a Disables forwarding of the authentication agent connection.
48 49
50 -B bind_interface
51 Bind to the address of bind_interface before attempting to
52 connect to the destination host. This is only useful on systems
53 with more than one address.
54
49 -b bind_address 55 -b bind_address
50 Use bind_address on the local machine as the source address of 56 Use bind_address on the local machine as the source address of
51 the connection. Only useful on systems with more than one 57 the connection. Only useful on systems with more than one
@@ -138,12 +144,12 @@ DESCRIPTION
138 information from the filename obtained by appending -cert.pub to 144 information from the filename obtained by appending -cert.pub to
139 identity filenames. 145 identity filenames.
140 146
141 -J [user@]host[:port] 147 -J destination
142 Connect to the target host by first making a ssh connection to 148 Connect to the target host by first making a ssh connection to
143 the jump host and then establishing a TCP forwarding to the 149 the jump host described by destination and then establishing a
144 ultimate destination from there. Multiple jump hops may be 150 TCP forwarding to the ultimate destination from there. Multiple
145 specified separated by comma characters. This is a shortcut to 151 jump hops may be specified separated by comma characters. This
146 specify a ProxyJump configuration directive. 152 is a shortcut to specify a ProxyJump configuration directive.
147 153
148 -K Enables GSSAPI-based authentication and forwarding (delegation) 154 -K Enables GSSAPI-based authentication and forwarding (delegation)
149 of GSSAPI credentials to the server. 155 of GSSAPI credentials to the server.
@@ -785,6 +791,16 @@ ENVIRONMENT
785 command. If the current session has no tty, this 791 command. If the current session has no tty, this
786 variable is not set. 792 variable is not set.
787 793
794 SSH_TUNNEL Optionally set by sshd(8) to contain the interface
795 names assigned if tunnel forwarding was requested
796 by the client.
797
798 SSH_USER_AUTH Optionally set by sshd(8), this variable may
799 contain a pathname to a file that lists the
800 authentication methods successfully used when the
801 session was established, including any public keys
802 that were used.
803
788 TZ This variable is set to indicate the present time 804 TZ This variable is set to indicate the present time
789 zone if it was set when the daemon was started 805 zone if it was set when the daemon was started
790 (i.e. the daemon passes the value on to new 806 (i.e. the daemon passes the value on to new
@@ -846,7 +862,7 @@ FILES
846 ignore a private key file if it is accessible by others. It is 862 ignore a private key file if it is accessible by others. It is
847 possible to specify a passphrase when generating the key which 863 possible to specify a passphrase when generating the key which
848 will be used to encrypt the sensitive part of this file using 864 will be used to encrypt the sensitive part of this file using
849 3DES. 865 AES-128.
850 866
851 ~/.ssh/id_dsa.pub 867 ~/.ssh/id_dsa.pub
852 ~/.ssh/id_ecdsa.pub 868 ~/.ssh/id_ecdsa.pub
@@ -957,4 +973,4 @@ AUTHORS
957 created OpenSSH. Markus Friedl contributed the support for SSH protocol 973 created OpenSSH. Markus Friedl contributed the support for SSH protocol
958 versions 1.5 and 2.0. 974 versions 1.5 and 2.0.
959 975
960OpenBSD 6.2 September 21, 2017 OpenBSD 6.2 976OpenBSD 6.2 February 23, 2018 OpenBSD 6.2