summaryrefslogtreecommitdiff
path: root/ssh.0
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2014-10-07 12:13:50 +0100
committerColin Watson <cjwatson@debian.org>2014-10-07 12:13:50 +0100
commit487bdb3a5ef6075887b830ccb8a0b14f6da78e93 (patch)
treea2cff6fec1e6c4b4153a170a3e172cfe6bfdec46 /ssh.0
parent796ba4fd011b5d0d9d78d592ba2f30fc9d5ed2e7 (diff)
parent28453d58058a4d60c3ebe7d7f0c31a510cbf6158 (diff)
Import openssh_6.7p1.orig.tar.gz
Diffstat (limited to 'ssh.0')
-rw-r--r--ssh.044
1 files changed, 21 insertions, 23 deletions
diff --git a/ssh.0 b/ssh.0
index 16868cfca..70ea37733 100644
--- a/ssh.0
+++ b/ssh.0
@@ -1,4 +1,4 @@
1SSH(1) OpenBSD Reference Manual SSH(1) 1SSH(1) General Commands Manual SSH(1)
2 2
3NAME 3NAME
4 ssh - OpenSSH SSH client (remote login program) 4 ssh - OpenSSH SSH client (remote login program)
@@ -17,8 +17,9 @@ DESCRIPTION
17 ssh (SSH client) is a program for logging into a remote machine and for 17 ssh (SSH client) is a program for logging into a remote machine and for
18 executing commands on a remote machine. It is intended to replace rlogin 18 executing commands on a remote machine. It is intended to replace rlogin
19 and rsh, and provide secure encrypted communications between two 19 and rsh, and provide secure encrypted communications between two
20 untrusted hosts over an insecure network. X11 connections and arbitrary 20 untrusted hosts over an insecure network. X11 connections, arbitrary TCP
21 TCP ports can also be forwarded over the secure channel. 21 ports and UNIX-domain sockets can also be forwarded over the secure
22 channel.
22 23
23 ssh connects and logs into the specified hostname (with optional user 24 ssh connects and logs into the specified hostname (with optional user
24 name). The user must prove his/her identity to the remote machine using 25 name). The user must prove his/her identity to the remote machine using
@@ -58,28 +59,21 @@ DESCRIPTION
58 address. 59 address.
59 60
60 -C Requests compression of all data (including stdin, stdout, 61 -C Requests compression of all data (including stdin, stdout,
61 stderr, and data for forwarded X11 and TCP connections). The 62 stderr, and data for forwarded X11, TCP and UNIX-domain
62 compression algorithm is the same used by gzip(1), and the 63 connections). The compression algorithm is the same used by
63 ``level'' can be controlled by the CompressionLevel option for 64 gzip(1), and the ``level'' can be controlled by the
64 protocol version 1. Compression is desirable on modem lines and 65 CompressionLevel option for protocol version 1. Compression is
65 other slow connections, but will only slow down things on fast 66 desirable on modem lines and other slow connections, but will
66 networks. The default value can be set on a host-by-host basis 67 only slow down things on fast networks. The default value can be
67 in the configuration files; see the Compression option. 68 set on a host-by-host basis in the configuration files; see the
69 Compression option.
68 70
69 -c cipher_spec 71 -c cipher_spec
70 Selects the cipher specification for encrypting the session. 72 Selects the cipher specification for encrypting the session.
71 73
72 Protocol version 1 allows specification of a single cipher. The 74 Protocol version 1 allows specification of a single cipher. The
73 supported values are ``3des'', ``blowfish'', and ``des''. 3des 75 supported values are ``3des'', ``blowfish'', and ``des''. For
74 (triple-des) is an encrypt-decrypt-encrypt triple with three 76 protocol version 2, cipher_spec is a comma-separated list of
75 different keys. It is believed to be secure. blowfish is a fast
76 block cipher; it appears very secure and is much faster than
77 3des. des is only supported in the ssh client for
78 interoperability with legacy protocol 1 implementations that do
79 not support the 3des cipher. Its use is strongly discouraged due
80 to cryptographic weaknesses. The default is ``3des''.
81
82 For protocol version 2, cipher_spec is a comma-separated list of
83 ciphers listed in order of preference. See the Ciphers keyword 77 ciphers listed in order of preference. See the Ciphers keyword
84 in ssh_config(5) for more information. 78 in ssh_config(5) for more information.
85 79
@@ -133,7 +127,9 @@ DESCRIPTION
133 port forwards to be successfully established before placing 127 port forwards to be successfully established before placing
134 itself in the background. 128 itself in the background.
135 129
136 -g Allows remote hosts to connect to local forwarded ports. 130 -g Allows remote hosts to connect to local forwarded ports. If used
131 on a multiplexed connection, then this option must be specified
132 on the master process.
137 133
138 -I pkcs11 134 -I pkcs11
139 Specify the PKCS#11 shared library ssh should use to communicate 135 Specify the PKCS#11 shared library ssh should use to communicate
@@ -286,6 +282,8 @@ DESCRIPTION
286 SendEnv 282 SendEnv
287 ServerAliveInterval 283 ServerAliveInterval
288 ServerAliveCountMax 284 ServerAliveCountMax
285 StreamLocalBindMask
286 StreamLocalBindUnlink
289 StrictHostKeyChecking 287 StrictHostKeyChecking
290 TCPKeepAlive 288 TCPKeepAlive
291 Tunnel 289 Tunnel
@@ -890,7 +888,7 @@ EXIT STATUS
890 888
891SEE ALSO 889SEE ALSO
892 scp(1), sftp(1), ssh-add(1), ssh-agent(1), ssh-keygen(1), ssh-keyscan(1), 890 scp(1), sftp(1), ssh-add(1), ssh-agent(1), ssh-keygen(1), ssh-keyscan(1),
893 tun(4), hosts.equiv(5), ssh_config(5), ssh-keysign(8), sshd(8) 891 tun(4), ssh_config(5), ssh-keysign(8), sshd(8)
894 892
895STANDARDS 893STANDARDS
896 S. Lehtinen and C. Lonvick, The Secure Shell (SSH) Protocol Assigned 894 S. Lehtinen and C. Lonvick, The Secure Shell (SSH) Protocol Assigned
@@ -943,4 +941,4 @@ AUTHORS
943 created OpenSSH. Markus Friedl contributed the support for SSH protocol 941 created OpenSSH. Markus Friedl contributed the support for SSH protocol
944 versions 1.5 and 2.0. 942 versions 1.5 and 2.0.
945 943
946OpenBSD 5.5 December 7, 2013 OpenBSD 5.5 944OpenBSD 5.6 July 24, 2014 OpenBSD 5.6