summaryrefslogtreecommitdiff
path: root/ssh.1
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2013-09-14 23:42:11 +0100
committerColin Watson <cjwatson@debian.org>2013-09-14 23:42:11 +0100
commit327155e6824b3ee13837bdde04e4eb47e147ff46 (patch)
tree8f8743122403c7a2e6ed919156711fb1520c657f /ssh.1
parent0334ce32304e9ba2a10ee5ca49ca6e8ff3ba6cf4 (diff)
parent74e339b8f8936bc0d985e053a076d0c9b5e9ea51 (diff)
* New upstream release (http://www.openssh.com/txt/release-6.3).
- sftp(1): add support for resuming partial downloads using the "reget" command and on the sftp commandline or on the "get" commandline using the "-a" (append) option (closes: #158590). - ssh(1): add an "IgnoreUnknown" configuration option to selectively suppress errors arising from unknown configuration directives (closes: #436052). - sftp(1): update progressmeter when data is acknowledged, not when it's sent (partially addresses #708372). - ssh(1): do not fatally exit when attempting to cleanup multiplexing- created channels that are incompletely opened (closes: #651357).
Diffstat (limited to 'ssh.1')
-rw-r--r--ssh.136
1 files changed, 27 insertions, 9 deletions
diff --git a/ssh.1 b/ssh.1
index 5ac75e992..c0cc12f43 100644
--- a/ssh.1
+++ b/ssh.1
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: ssh.1,v 1.330 2012/10/04 13:21:50 markus Exp $ 36.\" $OpenBSD: ssh.1,v 1.334 2013/07/18 01:12:26 djm Exp $
37.Dd $Mdocdate: October 4 2012 $ 37.Dd $Mdocdate: July 18 2013 $
38.Dt SSH 1 38.Dt SSH 1
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -47,6 +47,7 @@
47.Op Fl b Ar bind_address 47.Op Fl b Ar bind_address
48.Op Fl c Ar cipher_spec 48.Op Fl c Ar cipher_spec
49.Op Fl D Oo Ar bind_address : Oc Ns Ar port 49.Op Fl D Oo Ar bind_address : Oc Ns Ar port
50.Op Fl E Ar log_file
50.Op Fl e Ar escape_char 51.Op Fl e Ar escape_char
51.Op Fl F Ar configfile 52.Op Fl F Ar configfile
52.Op Fl I Ar pkcs11 53.Op Fl I Ar pkcs11
@@ -64,6 +65,8 @@
64.Oo Ar user Ns @ Oc Ns Ar hostname 65.Oo Ar user Ns @ Oc Ns Ar hostname
65.Op Ar command 66.Op Ar command
66.Ek 67.Ek
68.Nm
69.Fl Q Ar protocol_feature
67.Sh DESCRIPTION 70.Sh DESCRIPTION
68.Nm 71.Nm
69(SSH client) is a program for logging into a remote machine and for 72(SSH client) is a program for logging into a remote machine and for
@@ -217,6 +220,10 @@ indicates that the listening port be bound for local use only, while an
217empty address or 220empty address or
218.Sq * 221.Sq *
219indicates that the port should be available from all interfaces. 222indicates that the port should be available from all interfaces.
223.It Fl E Ar log_file
224Append debug logs to
225.Ar log_file
226instead of standard error.
220.It Fl e Ar escape_char 227.It Fl e Ar escape_char
221Sets the escape character for sessions with a pty (default: 228Sets the escape character for sessions with a pty (default:
222.Ql ~ ) . 229.Ql ~ ) .
@@ -482,6 +489,21 @@ For full details of the options listed below, and their possible values, see
482Port to connect to on the remote host. 489Port to connect to on the remote host.
483This can be specified on a 490This can be specified on a
484per-host basis in the configuration file. 491per-host basis in the configuration file.
492.It Fl Q Ar protocol_feature
493Queries
494.Nm
495for the algorithms supported for the specified version 2
496.Ar protocol_feature .
497The queriable features are:
498.Dq cipher
499(supported symmetric ciphers),
500.Dq MAC
501(supported message integrity codes),
502.Dq KEX
503(key exchange algorithms),
504.Dq key
505(key types).
506Protocol features are treated case-insensitively.
485.It Fl q 507.It Fl q
486Quiet mode. 508Quiet mode.
487Causes most warning and diagnostic messages to be suppressed. 509Causes most warning and diagnostic messages to be suppressed.
@@ -732,9 +754,7 @@ implements public key authentication protocol automatically,
732using one of the DSA, ECDSA or RSA algorithms. 754using one of the DSA, ECDSA or RSA algorithms.
733Protocol 1 is restricted to using only RSA keys, 755Protocol 1 is restricted to using only RSA keys,
734but protocol 2 may use any. 756but protocol 2 may use any.
735The 757The HISTORY section of
736.Sx HISTORY
737section of
738.Xr ssl 8 758.Xr ssl 8
739(on non-OpenBSD systems, see 759(on non-OpenBSD systems, see
740.nh 760.nh
@@ -794,9 +814,7 @@ instead of a set of public/private keys,
794signed certificates are used. 814signed certificates are used.
795This has the advantage that a single trusted certification authority 815This has the advantage that a single trusted certification authority
796can be used in place of many public/private keys. 816can be used in place of many public/private keys.
797See the 817See the CERTIFICATES section of
798.Sx CERTIFICATES
799section of
800.Xr ssh-keygen 1 818.Xr ssh-keygen 1
801for more information. 819for more information.
802.Pp 820.Pp
@@ -1323,7 +1341,7 @@ This is the per-user configuration file.
1323The file format and configuration options are described in 1341The file format and configuration options are described in
1324.Xr ssh_config 5 . 1342.Xr ssh_config 5 .
1325Because of the potential for abuse, this file must have strict permissions: 1343Because of the potential for abuse, this file must have strict permissions:
1326read/write for the user, and not accessible by others. 1344read/write for the user, and not writable by others.
1327It may be group-writable provided that the group in question contains only 1345It may be group-writable provided that the group in question contains only
1328the user. 1346the user.
1329.Pp 1347.Pp