summaryrefslogtreecommitdiff
path: root/ssh.0
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2015-08-19 14:23:50 +0100
committerColin Watson <cjwatson@debian.org>2015-08-19 14:23:50 +0100
commitbaccdb349b31c47cd76fb63211f754ed33a9707e (patch)
treed03653f975fd4eb8bf71bb0c9d168614401202fa /ssh.0
parent487bdb3a5ef6075887b830ccb8a0b14f6da78e93 (diff)
parent9f82e5a9042f2d872e98f48a876fcab3e25dd9bb (diff)
Import openssh_6.8p1.orig.tar.gz
Diffstat (limited to 'ssh.0')
-rw-r--r--ssh.0169
1 files changed, 88 insertions, 81 deletions
diff --git a/ssh.0 b/ssh.0
index 70ea37733..5e5f3b5e9 100644
--- a/ssh.0
+++ b/ssh.0
@@ -1,15 +1,15 @@
1SSH(1) General Commands Manual SSH(1) 1SSH(1) General Commands Manual SSH(1)
2 2
3NAME 3NAME
4 ssh - OpenSSH SSH client (remote login program) 4 ssh M-bM-^@M-^S OpenSSH SSH client (remote login program)
5 5
6SYNOPSIS 6SYNOPSIS
7 ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] 7 ssh [-1246AaCfGgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec]
8 [-D [bind_address:]port] [-E log_file] [-e escape_char] 8 [-D [bind_address:]port] [-E log_file] [-e escape_char]
9 [-F configfile] [-I pkcs11] [-i identity_file] 9 [-F configfile] [-I pkcs11] [-i identity_file]
10 [-L [bind_address:]port:host:hostport] [-l login_name] [-m mac_spec] 10 [-L [bind_address:]port:host:hostport] [-l login_name] [-m mac_spec]
11 [-O ctl_cmd] [-o option] [-p port] 11 [-O ctl_cmd] [-o option] [-p port]
12 [-Q cipher | cipher-auth | mac | kex | key] 12 [-Q cipher | cipher-auth | mac | kex | key | protocol-version]
13 [-R [bind_address:]port:host:hostport] [-S ctl_path] [-W host:port] 13 [-R [bind_address:]port:host:hostport] [-S ctl_path] [-W host:port]
14 [-w local_tun[:remote_tun]] [user@]hostname [command] 14 [-w local_tun[:remote_tun]] [user@]hostname [command]
15 15
@@ -61,7 +61,7 @@ DESCRIPTION
61 -C Requests compression of all data (including stdin, stdout, 61 -C Requests compression of all data (including stdin, stdout,
62 stderr, and data for forwarded X11, TCP and UNIX-domain 62 stderr, and data for forwarded X11, TCP and UNIX-domain
63 connections). The compression algorithm is the same used by 63 connections). The compression algorithm is the same used by
64 gzip(1), and the ``level'' can be controlled by the 64 gzip(1), and the M-bM-^@M-^\levelM-bM-^@M-^] can be controlled by the
65 CompressionLevel option for protocol version 1. Compression is 65 CompressionLevel option for protocol version 1. Compression is
66 desirable on modem lines and other slow connections, but will 66 desirable on modem lines and other slow connections, but will
67 only slow down things on fast networks. The default value can be 67 only slow down things on fast networks. The default value can be
@@ -72,13 +72,13 @@ DESCRIPTION
72 Selects the cipher specification for encrypting the session. 72 Selects the cipher specification for encrypting the session.
73 73
74 Protocol version 1 allows specification of a single cipher. The 74 Protocol version 1 allows specification of a single cipher. The
75 supported values are ``3des'', ``blowfish'', and ``des''. For 75 supported values are M-bM-^@M-^\3desM-bM-^@M-^], M-bM-^@M-^\blowfishM-bM-^@M-^], and M-bM-^@M-^\desM-bM-^@M-^]. For protocol
76 protocol version 2, cipher_spec is a comma-separated list of 76 version 2, cipher_spec is a comma-separated list of ciphers
77 ciphers listed in order of preference. See the Ciphers keyword 77 listed in order of preference. See the Ciphers keyword in
78 in ssh_config(5) for more information. 78 ssh_config(5) for more information.
79 79
80 -D [bind_address:]port 80 -D [bind_address:]port
81 Specifies a local ``dynamic'' application-level port forwarding. 81 Specifies a local M-bM-^@M-^\dynamicM-bM-^@M-^] application-level port forwarding.
82 This works by allocating a socket to listen to port on the local 82 This works by allocating a socket to listen to port on the local
83 side, optionally bound to the specified bind_address. Whenever a 83 side, optionally bound to the specified bind_address. Whenever a
84 connection is made to this port, the connection is forwarded over 84 connection is made to this port, the connection is forwarded over
@@ -94,20 +94,20 @@ DESCRIPTION
94 ports. By default, the local port is bound in accordance with 94 ports. By default, the local port is bound in accordance with
95 the GatewayPorts setting. However, an explicit bind_address may 95 the GatewayPorts setting. However, an explicit bind_address may
96 be used to bind the connection to a specific address. The 96 be used to bind the connection to a specific address. The
97 bind_address of ``localhost'' indicates that the listening port 97 bind_address of M-bM-^@M-^\localhostM-bM-^@M-^] indicates that the listening port be
98 be bound for local use only, while an empty address or `*' 98 bound for local use only, while an empty address or M-bM-^@M-^X*M-bM-^@M-^Y indicates
99 indicates that the port should be available from all interfaces. 99 that the port should be available from all interfaces.
100 100
101 -E log_file 101 -E log_file
102 Append debug logs to log_file instead of standard error. 102 Append debug logs to log_file instead of standard error.
103 103
104 -e escape_char 104 -e escape_char
105 Sets the escape character for sessions with a pty (default: `~'). 105 Sets the escape character for sessions with a pty (default: M-bM-^@M-^X~M-bM-^@M-^Y).
106 The escape character is only recognized at the beginning of a 106 The escape character is only recognized at the beginning of a
107 line. The escape character followed by a dot (`.') closes the 107 line. The escape character followed by a dot (M-bM-^@M-^X.M-bM-^@M-^Y) closes the
108 connection; followed by control-Z suspends the connection; and 108 connection; followed by control-Z suspends the connection; and
109 followed by itself sends the escape character once. Setting the 109 followed by itself sends the escape character once. Setting the
110 character to ``none'' disables any escapes and makes the session 110 character to M-bM-^@M-^\noneM-bM-^@M-^] disables any escapes and makes the session
111 fully transparent. 111 fully transparent.
112 112
113 -F configfile 113 -F configfile
@@ -122,10 +122,13 @@ DESCRIPTION
122 implies -n. The recommended way to start X11 programs at a 122 implies -n. The recommended way to start X11 programs at a
123 remote site is with something like ssh -f host xterm. 123 remote site is with something like ssh -f host xterm.
124 124
125 If the ExitOnForwardFailure configuration option is set to 125 If the ExitOnForwardFailure configuration option is set to M-bM-^@M-^\yesM-bM-^@M-^],
126 ``yes'', then a client started with -f will wait for all remote 126 then a client started with -f will wait for all remote port
127 port forwards to be successfully established before placing 127 forwards to be successfully established before placing itself in
128 itself in the background. 128 the background.
129
130 -G Causes ssh to print its configuration after evaluating Host and
131 Match blocks and exit.
129 132
130 -g Allows remote hosts to connect to local forwarded ports. If used 133 -g Allows remote hosts to connect to local forwarded ports. If used
131 on a multiplexed connection, then this option must be specified 134 on a multiplexed connection, then this option must be specified
@@ -166,17 +169,17 @@ DESCRIPTION
166 port is bound in accordance with the GatewayPorts setting. 169 port is bound in accordance with the GatewayPorts setting.
167 However, an explicit bind_address may be used to bind the 170 However, an explicit bind_address may be used to bind the
168 connection to a specific address. The bind_address of 171 connection to a specific address. The bind_address of
169 ``localhost'' indicates that the listening port be bound for 172 M-bM-^@M-^\localhostM-bM-^@M-^] indicates that the listening port be bound for local
170 local use only, while an empty address or `*' indicates that the 173 use only, while an empty address or M-bM-^@M-^X*M-bM-^@M-^Y indicates that the port
171 port should be available from all interfaces. 174 should be available from all interfaces.
172 175
173 -l login_name 176 -l login_name
174 Specifies the user to log in as on the remote machine. This also 177 Specifies the user to log in as on the remote machine. This also
175 may be specified on a per-host basis in the configuration file. 178 may be specified on a per-host basis in the configuration file.
176 179
177 -M Places the ssh client into ``master'' mode for connection 180 -M Places the ssh client into M-bM-^@M-^\masterM-bM-^@M-^] mode for connection sharing.
178 sharing. Multiple -M options places ssh into ``master'' mode 181 Multiple -M options places ssh into M-bM-^@M-^\masterM-bM-^@M-^] mode with
179 with confirmation required before slave connections are accepted. 182 confirmation required before slave connections are accepted.
180 Refer to the description of ControlMaster in ssh_config(5) for 183 Refer to the description of ControlMaster in ssh_config(5) for
181 details. 184 details.
182 185
@@ -201,10 +204,10 @@ DESCRIPTION
201 -O ctl_cmd 204 -O ctl_cmd
202 Control an active connection multiplexing master process. When 205 Control an active connection multiplexing master process. When
203 the -O option is specified, the ctl_cmd argument is interpreted 206 the -O option is specified, the ctl_cmd argument is interpreted
204 and passed to the master process. Valid commands are: ``check'' 207 and passed to the master process. Valid commands are: M-bM-^@M-^\checkM-bM-^@M-^]
205 (check that the master process is running), ``forward'' (request 208 (check that the master process is running), M-bM-^@M-^\forwardM-bM-^@M-^] (request
206 forwardings without command execution), ``cancel'' (cancel 209 forwardings without command execution), M-bM-^@M-^\cancelM-bM-^@M-^] (cancel
207 forwardings), ``exit'' (request the master to exit), and ``stop'' 210 forwardings), M-bM-^@M-^\exitM-bM-^@M-^] (request the master to exit), and M-bM-^@M-^\stopM-bM-^@M-^]
208 (request the master to stop accepting further multiplexing 211 (request the master to stop accepting further multiplexing
209 requests). 212 requests).
210 213
@@ -238,6 +241,7 @@ DESCRIPTION
238 DynamicForward 241 DynamicForward
239 EscapeChar 242 EscapeChar
240 ExitOnForwardFailure 243 ExitOnForwardFailure
244 FingerprintHash
241 ForwardAgent 245 ForwardAgent
242 ForwardX11 246 ForwardX11
243 ForwardX11Timeout 247 ForwardX11Timeout
@@ -249,6 +253,7 @@ DESCRIPTION
249 HashKnownHosts 253 HashKnownHosts
250 Host 254 Host
251 HostbasedAuthentication 255 HostbasedAuthentication
256 HostbasedKeyTypes
252 HostKeyAlgorithms 257 HostKeyAlgorithms
253 HostKeyAlias 258 HostKeyAlias
254 HostName 259 HostName
@@ -288,6 +293,7 @@ DESCRIPTION
288 TCPKeepAlive 293 TCPKeepAlive
289 Tunnel 294 Tunnel
290 TunnelDevice 295 TunnelDevice
296 UpdateHostKeys
291 UsePrivilegedPort 297 UsePrivilegedPort
292 User 298 User
293 UserKnownHostsFile 299 UserKnownHostsFile
@@ -299,12 +305,13 @@ DESCRIPTION
299 Port to connect to on the remote host. This can be specified on 305 Port to connect to on the remote host. This can be specified on
300 a per-host basis in the configuration file. 306 a per-host basis in the configuration file.
301 307
302 -Q cipher | cipher-auth | mac | kex | key 308 -Q cipher | cipher-auth | mac | kex | key | protocol-version
303 Queries ssh for the algorithms supported for the specified 309 Queries ssh for the algorithms supported for the specified
304 version 2. The available features are: cipher (supported 310 version 2. The available features are: cipher (supported
305 symmetric ciphers), cipher-auth (supported symmetric ciphers that 311 symmetric ciphers), cipher-auth (supported symmetric ciphers that
306 support authenticated encryption), mac (supported message 312 support authenticated encryption), mac (supported message
307 integrity codes), kex (key exchange algorithms), key (key types). 313 integrity codes), kex (key exchange algorithms), key (key types)
314 and protocol-version (supported SSH protocol versions).
308 315
309 -q Quiet mode. Causes most warning and diagnostic messages to be 316 -q Quiet mode. Causes most warning and diagnostic messages to be
310 suppressed. 317 suppressed.
@@ -325,19 +332,19 @@ DESCRIPTION
325 By default, the listening socket on the server will be bound to 332 By default, the listening socket on the server will be bound to
326 the loopback interface only. This may be overridden by 333 the loopback interface only. This may be overridden by
327 specifying a bind_address. An empty bind_address, or the address 334 specifying a bind_address. An empty bind_address, or the address
328 `*', indicates that the remote socket should listen on all 335 M-bM-^@M-^X*M-bM-^@M-^Y, indicates that the remote socket should listen on all
329 interfaces. Specifying a remote bind_address will only succeed 336 interfaces. Specifying a remote bind_address will only succeed
330 if the server's GatewayPorts option is enabled (see 337 if the server's GatewayPorts option is enabled (see
331 sshd_config(5)). 338 sshd_config(5)).
332 339
333 If the port argument is `0', the listen port will be dynamically 340 If the port argument is M-bM-^@M-^X0M-bM-^@M-^Y, the listen port will be dynamically
334 allocated on the server and reported to the client at run time. 341 allocated on the server and reported to the client at run time.
335 When used together with -O forward the allocated port will be 342 When used together with -O forward the allocated port will be
336 printed to the standard output. 343 printed to the standard output.
337 344
338 -S ctl_path 345 -S ctl_path
339 Specifies the location of a control socket for connection 346 Specifies the location of a control socket for connection
340 sharing, or the string ``none'' to disable connection sharing. 347 sharing, or the string M-bM-^@M-^\noneM-bM-^@M-^] to disable connection sharing.
341 Refer to the description of ControlPath and ControlMaster in 348 Refer to the description of ControlPath and ControlMaster in
342 ssh_config(5) for details. 349 ssh_config(5) for details.
343 350
@@ -373,11 +380,11 @@ DESCRIPTION
373 (remote_tun). 380 (remote_tun).
374 381
375 The devices may be specified by numerical ID or the keyword 382 The devices may be specified by numerical ID or the keyword
376 ``any'', which uses the next available tunnel device. If 383 M-bM-^@M-^\anyM-bM-^@M-^], which uses the next available tunnel device. If
377 remote_tun is not specified, it defaults to ``any''. See also 384 remote_tun is not specified, it defaults to M-bM-^@M-^\anyM-bM-^@M-^]. See also the
378 the Tunnel and TunnelDevice directives in ssh_config(5). If the 385 Tunnel and TunnelDevice directives in ssh_config(5). If the
379 Tunnel directive is unset, it is set to the default tunnel mode, 386 Tunnel directive is unset, it is set to the default tunnel mode,
380 which is ``point-to-point''. 387 which is M-bM-^@M-^\point-to-pointM-bM-^@M-^].
381 388
382 -X Enables X11 forwarding. This can also be specified on a per-host 389 -X Enables X11 forwarding. This can also be specified on a per-host
383 basis in a configuration file. 390 basis in a configuration file.
@@ -444,7 +451,7 @@ AUTHENTICATION
444 creates a public/private key pair for authentication purposes. The 451 creates a public/private key pair for authentication purposes. The
445 server knows the public key, and only the user knows the private key. 452 server knows the public key, and only the user knows the private key.
446 ssh implements public key authentication protocol automatically, using 453 ssh implements public key authentication protocol automatically, using
447 one of the DSA, ECDSA, ED25519 or RSA algorithms. Protocol 1 is 454 one of the DSA, ECDSA, Ed25519 or RSA algorithms. Protocol 1 is
448 restricted to using only RSA keys, but protocol 2 may use any. The 455 restricted to using only RSA keys, but protocol 2 may use any. The
449 HISTORY section of ssl(8) contains a brief discussion of the DSA and RSA 456 HISTORY section of ssl(8) contains a brief discussion of the DSA and RSA
450 algorithms. 457 algorithms.
@@ -458,10 +465,10 @@ AUTHENTICATION
458 The user creates his/her key pair by running ssh-keygen(1). This stores 465 The user creates his/her key pair by running ssh-keygen(1). This stores
459 the private key in ~/.ssh/identity (protocol 1), ~/.ssh/id_dsa (protocol 466 the private key in ~/.ssh/identity (protocol 1), ~/.ssh/id_dsa (protocol
460 2 DSA), ~/.ssh/id_ecdsa (protocol 2 ECDSA), ~/.ssh/id_ed25519 (protocol 2 467 2 DSA), ~/.ssh/id_ecdsa (protocol 2 ECDSA), ~/.ssh/id_ed25519 (protocol 2
461 ED25519), or ~/.ssh/id_rsa (protocol 2 RSA) and stores the public key in 468 Ed25519), or ~/.ssh/id_rsa (protocol 2 RSA) and stores the public key in
462 ~/.ssh/identity.pub (protocol 1), ~/.ssh/id_dsa.pub (protocol 2 DSA), 469 ~/.ssh/identity.pub (protocol 1), ~/.ssh/id_dsa.pub (protocol 2 DSA),
463 ~/.ssh/id_ecdsa.pub (protocol 2 ECDSA), ~/.ssh/id_ed25519.pub (protocol 2 470 ~/.ssh/id_ecdsa.pub (protocol 2 ECDSA), ~/.ssh/id_ed25519.pub (protocol 2
464 ED25519), or ~/.ssh/id_rsa.pub (protocol 2 RSA) in the user's home 471 Ed25519), or ~/.ssh/id_rsa.pub (protocol 2 RSA) in the user's home
465 directory. The user should then copy the public key to 472 directory. The user should then copy the public key to
466 ~/.ssh/authorized_keys in his/her home directory on the remote machine. 473 ~/.ssh/authorized_keys in his/her home directory on the remote machine.
467 The authorized_keys file corresponds to the conventional ~/.rhosts file, 474 The authorized_keys file corresponds to the conventional ~/.rhosts file,
@@ -512,8 +519,8 @@ AUTHENTICATION
512 519
513 If no pseudo-tty has been allocated, the session is transparent and can 520 If no pseudo-tty has been allocated, the session is transparent and can
514 be used to reliably transfer binary data. On most systems, setting the 521 be used to reliably transfer binary data. On most systems, setting the
515 escape character to ``none'' will also make the session transparent even 522 escape character to M-bM-^@M-^\noneM-bM-^@M-^] will also make the session transparent even if
516 if a tty is used. 523 a tty is used.
517 524
518 The session terminates when the command or shell on the remote machine 525 The session terminates when the command or shell on the remote machine
519 exits and all X11 and TCP connections have been closed. 526 exits and all X11 and TCP connections have been closed.
@@ -528,7 +535,7 @@ ESCAPE CHARACTERS
528 character can be changed in configuration files using the EscapeChar 535 character can be changed in configuration files using the EscapeChar
529 configuration directive or on the command line by the -e option. 536 configuration directive or on the command line by the -e option.
530 537
531 The supported escapes (assuming the default `~') are: 538 The supported escapes (assuming the default M-bM-^@M-^X~M-bM-^@M-^Y) are:
532 539
533 ~. Disconnect. 540 ~. Disconnect.
534 541
@@ -577,26 +584,26 @@ TCP FORWARDING
577 same local port, and ssh will encrypt and forward the connection. 584 same local port, and ssh will encrypt and forward the connection.
578 585
579 The following example tunnels an IRC session from client machine 586 The following example tunnels an IRC session from client machine
580 ``127.0.0.1'' (localhost) to remote server ``server.example.com'': 587 M-bM-^@M-^\127.0.0.1M-bM-^@M-^] (localhost) to remote server M-bM-^@M-^\server.example.comM-bM-^@M-^]:
581 588
582 $ ssh -f -L 1234:localhost:6667 server.example.com sleep 10 589 $ ssh -f -L 1234:localhost:6667 server.example.com sleep 10
583 $ irc -c '#users' -p 1234 pinky 127.0.0.1 590 $ irc -c '#users' -p 1234 pinky 127.0.0.1
584 591
585 This tunnels a connection to IRC server ``server.example.com'', joining 592 This tunnels a connection to IRC server M-bM-^@M-^\server.example.comM-bM-^@M-^], joining
586 channel ``#users'', nickname ``pinky'', using port 1234. It doesn't 593 channel M-bM-^@M-^\#usersM-bM-^@M-^], nickname M-bM-^@M-^\pinkyM-bM-^@M-^], using port 1234. It doesn't matter
587 matter which port is used, as long as it's greater than 1023 (remember, 594 which port is used, as long as it's greater than 1023 (remember, only
588 only root can open sockets on privileged ports) and doesn't conflict with 595 root can open sockets on privileged ports) and doesn't conflict with any
589 any ports already in use. The connection is forwarded to port 6667 on 596 ports already in use. The connection is forwarded to port 6667 on the
590 the remote server, since that's the standard port for IRC services. 597 remote server, since that's the standard port for IRC services.
591 598
592 The -f option backgrounds ssh and the remote command ``sleep 10'' is 599 The -f option backgrounds ssh and the remote command M-bM-^@M-^\sleep 10M-bM-^@M-^] is
593 specified to allow an amount of time (10 seconds, in the example) to 600 specified to allow an amount of time (10 seconds, in the example) to
594 start the service which is to be tunnelled. If no connections are made 601 start the service which is to be tunnelled. If no connections are made
595 within the time specified, ssh will exit. 602 within the time specified, ssh will exit.
596 603
597X11 FORWARDING 604X11 FORWARDING
598 If the ForwardX11 variable is set to ``yes'' (or see the description of 605 If the ForwardX11 variable is set to M-bM-^@M-^\yesM-bM-^@M-^] (or see the description of the
599 the -X, -x, and -Y options above) and the user is using X11 (the DISPLAY 606 -X, -x, and -Y options above) and the user is using X11 (the DISPLAY
600 environment variable is set), the connection to the X11 display is 607 environment variable is set), the connection to the X11 display is
601 automatically forwarded to the remote side in such a way that any X11 608 automatically forwarded to the remote side in such a way that any X11
602 programs started from the shell (or command) will go through the 609 programs started from the shell (or command) will go through the
@@ -607,7 +614,7 @@ X11 FORWARDING
607 614
608 The DISPLAY value set by ssh will point to the server machine, but with a 615 The DISPLAY value set by ssh will point to the server machine, but with a
609 display number greater than zero. This is normal, and happens because 616 display number greater than zero. This is normal, and happens because
610 ssh creates a ``proxy'' X server on the server machine for forwarding the 617 ssh creates a M-bM-^@M-^\proxyM-bM-^@M-^] X server on the server machine for forwarding the
611 connections over the encrypted channel. 618 connections over the encrypted channel.
612 619
613 ssh will also automatically set up Xauthority data on the server machine. 620 ssh will also automatically set up Xauthority data on the server machine.
@@ -617,7 +624,7 @@ X11 FORWARDING
617 is opened. The real authentication cookie is never sent to the server 624 is opened. The real authentication cookie is never sent to the server
618 machine (and no cookies are sent in the plain). 625 machine (and no cookies are sent in the plain).
619 626
620 If the ForwardAgent variable is set to ``yes'' (or see the description of 627 If the ForwardAgent variable is set to M-bM-^@M-^\yesM-bM-^@M-^] (or see the description of
621 the -A and -a options above) and the user is using an authentication 628 the -A and -a options above) and the user is using an authentication
622 agent, the connection to the agent is automatically forwarded to the 629 agent, the connection to the agent is automatically forwarded to the
623 remote side. 630 remote side.
@@ -632,15 +639,15 @@ VERIFYING HOST KEYS
632 639
633 If the fingerprint is already known, it can be matched and the key can be 640 If the fingerprint is already known, it can be matched and the key can be
634 accepted or rejected. Because of the difficulty of comparing host keys 641 accepted or rejected. Because of the difficulty of comparing host keys
635 just by looking at hex strings, there is also support to compare host 642 just by looking at fingerprint strings, there is also support to compare
636 keys visually, using random art. By setting the VisualHostKey option to 643 host keys visually, using random art. By setting the VisualHostKey
637 ``yes'', a small ASCII graphic gets displayed on every login to a server, 644 option to M-bM-^@M-^\yesM-bM-^@M-^], a small ASCII graphic gets displayed on every login to a
638 no matter if the session itself is interactive or not. By learning the 645 server, no matter if the session itself is interactive or not. By
639 pattern a known server produces, a user can easily find out that the host 646 learning the pattern a known server produces, a user can easily find out
640 key has changed when a completely different pattern is displayed. 647 that the host key has changed when a completely different pattern is
641 Because these patterns are not unambiguous however, a pattern that looks 648 displayed. Because these patterns are not unambiguous however, a pattern
642 similar to the pattern remembered only gives a good probability that the 649 that looks similar to the pattern remembered only gives a good
643 host key is the same, not guaranteed proof. 650 probability that the host key is the same, not guaranteed proof.
644 651
645 To get a listing of the fingerprints along with their random art for all 652 To get a listing of the fingerprints along with their random art for all
646 known hosts, the following command line can be used: 653 known hosts, the following command line can be used:
@@ -653,8 +660,8 @@ VERIFYING HOST KEYS
653 able to match the fingerprint with that of the key presented. 660 able to match the fingerprint with that of the key presented.
654 661
655 In this example, we are connecting a client to a server, 662 In this example, we are connecting a client to a server,
656 ``host.example.com''. The SSHFP resource records should first be added 663 M-bM-^@M-^\host.example.comM-bM-^@M-^]. The SSHFP resource records should first be added to
657 to the zonefile for host.example.com: 664 the zonefile for host.example.com:
658 665
659 $ ssh-keygen -r host.example.com. 666 $ ssh-keygen -r host.example.com.
660 667
@@ -697,9 +704,9 @@ SSH-BASED VIRTUAL PRIVATE NETWORKS
697 704
698 Client access may be more finely tuned via the /root/.ssh/authorized_keys 705 Client access may be more finely tuned via the /root/.ssh/authorized_keys
699 file (see below) and the PermitRootLogin server option. The following 706 file (see below) and the PermitRootLogin server option. The following
700 entry would permit connections on tun(4) device 1 from user ``jane'' and 707 entry would permit connections on tun(4) device 1 from user M-bM-^@M-^\janeM-bM-^@M-^] and on
701 on tun device 2 from user ``john'', if PermitRootLogin is set to 708 tun device 2 from user M-bM-^@M-^\johnM-bM-^@M-^], if PermitRootLogin is set to
702 ``forced-commands-only'': 709 M-bM-^@M-^\forced-commands-onlyM-bM-^@M-^]:
703 710
704 tunnel="1",command="sh /etc/netstart tun1" ssh-rsa ... jane 711 tunnel="1",command="sh /etc/netstart tun1" ssh-rsa ... jane
705 tunnel="2",command="sh /etc/netstart tun2" ssh-rsa ... john 712 tunnel="2",command="sh /etc/netstart tun2" ssh-rsa ... john
@@ -714,14 +721,14 @@ ENVIRONMENT
714 721
715 DISPLAY The DISPLAY variable indicates the location of the 722 DISPLAY The DISPLAY variable indicates the location of the
716 X11 server. It is automatically set by ssh to 723 X11 server. It is automatically set by ssh to
717 point to a value of the form ``hostname:n'', where 724 point to a value of the form M-bM-^@M-^\hostname:nM-bM-^@M-^], where
718 ``hostname'' indicates the host where the shell 725 M-bM-^@M-^\hostnameM-bM-^@M-^] indicates the host where the shell runs,
719 runs, and `n' is an integer >= 1. ssh uses this 726 and M-bM-^@M-^XnM-bM-^@M-^Y is an integer M-bM-^IM-% 1. ssh uses this special
720 special value to forward X11 connections over the 727 value to forward X11 connections over the secure
721 secure channel. The user should normally not set 728 channel. The user should normally not set DISPLAY
722 DISPLAY explicitly, as that will render the X11 729 explicitly, as that will render the X11 connection
723 connection insecure (and will require the user to 730 insecure (and will require the user to manually
724 manually copy any required authorization cookies). 731 copy any required authorization cookies).
725 732
726 HOME Set to the path of the user's home directory. 733 HOME Set to the path of the user's home directory.
727 734
@@ -770,7 +777,7 @@ ENVIRONMENT
770 USER Set to the name of the user logging in. 777 USER Set to the name of the user logging in.
771 778
772 Additionally, ssh reads ~/.ssh/environment, and adds lines of the format 779 Additionally, ssh reads ~/.ssh/environment, and adds lines of the format
773 ``VARNAME=value'' to the environment if the file exists and users are 780 M-bM-^@M-^\VARNAME=valueM-bM-^@M-^] to the environment if the file exists and users are
774 allowed to change their environment. For more information, see the 781 allowed to change their environment. For more information, see the
775 PermitUserEnvironment option in sshd_config(5). 782 PermitUserEnvironment option in sshd_config(5).
776 783
@@ -797,7 +804,7 @@ FILES
797 for the user, and not accessible by others. 804 for the user, and not accessible by others.
798 805
799 ~/.ssh/authorized_keys 806 ~/.ssh/authorized_keys
800 Lists the public keys (DSA, ECDSA, ED25519, RSA) that can be used 807 Lists the public keys (DSA, ECDSA, Ed25519, RSA) that can be used
801 for logging in as this user. The format of this file is 808 for logging in as this user. The format of this file is
802 described in the sshd(8) manual page. This file is not highly 809 described in the sshd(8) manual page. This file is not highly
803 sensitive, but the recommended permissions are read/write for the 810 sensitive, but the recommended permissions are read/write for the
@@ -941,4 +948,4 @@ AUTHORS
941 created OpenSSH. Markus Friedl contributed the support for SSH protocol 948 created OpenSSH. Markus Friedl contributed the support for SSH protocol
942 versions 1.5 and 2.0. 949 versions 1.5 and 2.0.
943 950
944OpenBSD 5.6 July 24, 2014 OpenBSD 5.6 951OpenBSD 5.7 March 3, 2015 OpenBSD 5.7