summaryrefslogtreecommitdiff
path: root/ssh.1
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2001-04-23 13:02:16 +0000
committerBen Lindstrom <mouring@eviladmin.org>2001-04-23 13:02:16 +0000
commitc65e6a0fec9d96722d268003c2b89c2a8906aee9 (patch)
tree6fe9ae19926c5300895e21212aa5a40a37eae7ff /ssh.1
parent2857d9cf771ffa561e6e6e535632bd7ef74c0f7d (diff)
- markus@cvs.openbsd.org 2001/04/22 23:58:36
[ssh-keygen.1 ssh.1 sshd.8] document hostbased and other cleanup
Diffstat (limited to 'ssh.1')
-rw-r--r--ssh.1100
1 files changed, 63 insertions, 37 deletions
diff --git a/ssh.1 b/ssh.1
index 4757a12d7..0d26197b6 100644
--- a/ssh.1
+++ b/ssh.1
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: ssh.1,v 1.106 2001/04/22 13:32:27 markus Exp $ 37.\" $OpenBSD: ssh.1,v 1.107 2001/04/22 23:58:36 markus Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSH 1 39.Dt SSH 1
40.Os 40.Os
@@ -110,7 +110,7 @@ permitted to log in.
110This form of authentication alone is normally not 110This form of authentication alone is normally not
111allowed by the server because it is not secure. 111allowed by the server because it is not secure.
112.Pp 112.Pp
113The second (and primary) authentication method is the 113The second authentication method is the
114.Pa rhosts 114.Pa rhosts
115or 115or
116.Pa hosts.equiv 116.Pa hosts.equiv
@@ -205,13 +205,18 @@ the password cannot be seen by someone listening on the network.
205.Ss SSH protocol version 2 205.Ss SSH protocol version 2
206.Pp 206.Pp
207When a user connects using the protocol version 2 207When a user connects using the protocol version 2
208different authentication methods are available: 208different authentication methods are available.
209At first, the client attempts to authenticate using the public key method. 209Using the default values for
210If this method fails password authentication is tried. 210.Cm PreferredAuthentications ,
211the client will try to authenticate first using the public key method;
212if this method fails password authentication is attempted,
213and finally if this method fails keyboard-interactive authentication
214is attempted.
215If this method fails password authentication is
216tried.
211.Pp 217.Pp
212The public key method is similar to RSA authentication described 218The public key method is similar to RSA authentication described
213in the previous section except that the DSA or RSA algorithm is used 219in the previous section and allows the RSA or DSA algorithm to be used:
214instead.
215The client uses his private key, 220The client uses his private key,
216.Pa $HOME/.ssh/id_dsa 221.Pa $HOME/.ssh/id_dsa
217or 222or
@@ -225,8 +230,10 @@ and is only known to the client and the server.
225.Pp 230.Pp
226If public key authentication fails or is not available a password 231If public key authentication fails or is not available a password
227can be sent encrypted to the remote host for proving the user's identity. 232can be sent encrypted to the remote host for proving the user's identity.
228This protocol 2 implementation does not yet support Kerberos or 233.Pp
229S/Key authentication. 234Additionally,
235.Nm
236supports hostbased or challenge response authentication.
230.Pp 237.Pp
231Protocol 2 provides additional mechanisms for confidentiality 238Protocol 2 provides additional mechanisms for confidentiality
232(the traffic is encrypted using 3DES, Blowfish, CAST128 or Arcfour) 239(the traffic is encrypted using 3DES, Blowfish, CAST128 or Arcfour)
@@ -286,7 +293,7 @@ Background ssh
286List forwarded connections 293List forwarded connections
287.It Cm ~& 294.It Cm ~&
288Background ssh at logout when waiting for forwarded connection / X11 sessions 295Background ssh at logout when waiting for forwarded connection / X11 sessions
289to terminate (this does not currently work for SSH protocol version 2) 296to terminate (protocol version 1 only)
290.It Cm ~? 297.It Cm ~?
291Display a list of escape characters 298Display a list of escape characters
292.It Cm ~R 299.It Cm ~R
@@ -573,6 +580,8 @@ from the local machine.
573Port forwardings can also be specified in the configuration file. 580Port forwardings can also be specified in the configuration file.
574Privileged ports can be forwarded only when 581Privileged ports can be forwarded only when
575logging in as root on the remote machine. 582logging in as root on the remote machine.
583IPv6 addresses can be specified with an alternative syntax:
584.Ar port/host/hostport
576.It Fl 1 585.It Fl 1
577Forces 586Forces
578.Nm 587.Nm
@@ -645,6 +654,7 @@ The argument to this keyword must be
645.Dq yes 654.Dq yes
646or 655or
647.Dq no . 656.Dq no .
657This option applies to protocol version 1 only.
648.It Cm BatchMode 658.It Cm BatchMode
649If set to 659If set to
650.Dq yes , 660.Dq yes ,
@@ -687,8 +697,7 @@ The default is
687.Pp 697.Pp
688.Bd -literal 698.Bd -literal
689 ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour, 699 ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,
690 aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc, 700 aes192-cbc,aes256-cbc''
691 rijndael256-cbc,rijndael-cbc@lysator.liu.se''
692.Ed 701.Ed
693.It Cm Compression 702.It Cm Compression
694Specifies whether to use compression. 703Specifies whether to use compression.
@@ -704,21 +713,13 @@ The argument must be an integer from 1 (fast) to 9 (slow, best).
704The default level is 6, which is good for most applications. 713The default level is 6, which is good for most applications.
705The meaning of the values is the same as in 714The meaning of the values is the same as in
706.Xr gzip 1 . 715.Xr gzip 1 .
716Note that this option applies to protocol version 1 only.
707.It Cm ConnectionAttempts 717.It Cm ConnectionAttempts
708Specifies the number of tries (one per second) to make before falling 718Specifies the number of tries (one per second) to make before falling
709back to rsh or exiting. 719back to rsh or exiting.
710The argument must be an integer. 720The argument must be an integer.
711This may be useful in scripts if the connection sometimes fails. 721This may be useful in scripts if the connection sometimes fails.
712The default is 4. 722The default is 4.
713.It Cm PubkeyAuthentication
714Specifies whether to try public key authentication.
715The argument to this keyword must be
716.Dq yes
717or
718.Dq no .
719The default is
720.Dq yes .
721Note that this option applies to protocol version 2 only.
722.It Cm EscapeChar 723.It Cm EscapeChar
723Sets the escape character (default: 724Sets the escape character (default:
724.Ql ~ ) . 725.Ql ~ ) .
@@ -783,17 +784,29 @@ host key database instead of
783Specifies a file to use for the protocol version 2 global 784Specifies a file to use for the protocol version 2 global
784host key database instead of 785host key database instead of
785.Pa /etc/ssh_known_hosts2 . 786.Pa /etc/ssh_known_hosts2 .
786.It Cm HostKeyAlias 787.It Cm HostbasedAuthentication
787Specifies an alias that should be used instead of the 788Specifies whether to try rhosts based authentication with public key
788real host name when looking up or saving the host key 789authentication.
789in the known_hosts files. 790The argument must be
790This option is useful for tunneling ssh connections 791.Dq yes
791or if you have multiple servers running on a single host. 792or
793.Dq no .
794The default is
795.Dq yes .
796This option applies to protocol version 2 only and
797is similar to
798.Cm RhostsRSAAuthentication .
792.It Cm HostKeyAlgorithms 799.It Cm HostKeyAlgorithms
793Specfies the protocol version 2 host key algorithms 800Specfies the protocol version 2 host key algorithms
794that the client wants to use in order of preference. 801that the client wants to use in order of preference.
795The default for this option is: 802The default for this option is:
796.Dq ssh-rsa,ssh-dss 803.Dq ssh-rsa,ssh-dss
804.It Cm HostKeyAlias
805Specifies an alias that should be used instead of the
806real host name when looking up or saving the host key
807in the host key database files.
808This option is useful for tunneling ssh connections
809or if you have multiple servers running on a single host.
797.It Cm HostName 810.It Cm HostName
798Specifies the real host name to log into. 811Specifies the real host name to log into.
799This can be used to specify nicknames or abbreviations for hosts. 812This can be used to specify nicknames or abbreviations for hosts.
@@ -802,7 +815,7 @@ Numeric IP addresses are also permitted (both on the command line and in
802.Cm HostName 815.Cm HostName
803specifications). 816specifications).
804.It Cm IdentityFile 817.It Cm IdentityFile
805Specifies the file from which the user's RSA authentication identity 818Specifies the file from which the user's RSA or DSA authentication identity
806is read (default 819is read (default
807.Pa $HOME/.ssh/identity 820.Pa $HOME/.ssh/identity
808in the user's home directory). 821in the user's home directory).
@@ -882,7 +895,6 @@ or
882.Dq no . 895.Dq no .
883The default is 896The default is
884.Dq yes . 897.Dq yes .
885Note that this option applies to both protocol version 1 and 2.
886.It Cm Port 898.It Cm Port
887Specifies the port number to connect on the remote host. 899Specifies the port number to connect on the remote host.
888Default is 22. 900Default is 22.
@@ -934,6 +946,15 @@ Note that
934.Cm CheckHostIP 946.Cm CheckHostIP
935is not available for connects with a proxy command. 947is not available for connects with a proxy command.
936.Pp 948.Pp
949.It Cm PubkeyAuthentication
950Specifies whether to try public key authentication.
951The argument to this keyword must be
952.Dq yes
953or
954.Dq no .
955The default is
956.Dq yes .
957This option applies to protocol version 2 only.
937.It Cm RemoteForward 958.It Cm RemoteForward
938Specifies that a TCP/IP port on the remote machine be forwarded over 959Specifies that a TCP/IP port on the remote machine be forwarded over
939the secure channel to given host:port from the local machine. 960the secure channel to given host:port from the local machine.
@@ -951,13 +972,15 @@ Disabling rhosts authentication may reduce
951authentication time on slow connections when rhosts authentication is 972authentication time on slow connections when rhosts authentication is
952not used. 973not used.
953Most servers do not permit RhostsAuthentication because it 974Most servers do not permit RhostsAuthentication because it
954is not secure (see RhostsRSAAuthentication). 975is not secure (see
976.Cm RhostsRSAAuthentication ).
955The argument to this keyword must be 977The argument to this keyword must be
956.Dq yes 978.Dq yes
957or 979or
958.Dq no . 980.Dq no .
959The default is 981The default is
960.Dq yes . 982.Dq yes .
983This option applies to protocol version 1 only.
961.It Cm RhostsRSAAuthentication 984.It Cm RhostsRSAAuthentication
962Specifies whether to try rhosts based authentication with RSA host 985Specifies whether to try rhosts based authentication with RSA host
963authentication. 986authentication.
@@ -967,6 +990,7 @@ or
967.Dq no . 990.Dq no .
968The default is 991The default is
969.Dq yes . 992.Dq yes .
993This option applies to protocol version 1 only.
970.It Cm RSAAuthentication 994.It Cm RSAAuthentication
971Specifies whether to try RSA authentication. 995Specifies whether to try RSA authentication.
972The argument to this keyword must be 996The argument to this keyword must be
@@ -1037,13 +1061,13 @@ or
1037.Dq no . 1061.Dq no .
1038The default is 1062The default is
1039.Dq no . 1063.Dq no .
1040Note that setting this option to 1064Note that you need to set this option to
1041.Dq no 1065.Dq yes
1042turns off 1066if you want to use
1043.Cm RhostsAuthentication 1067.Cm RhostsAuthentication
1044and 1068and
1045.Cm RhostsRSAAuthentication 1069.Cm RhostsRSAAuthentication
1046for older servers. 1070with older servers.
1047.It Cm User 1071.It Cm User
1048Specifies the user to log in as. 1072Specifies the user to log in as.
1049This can be useful if you have a different user name on different machines. 1073This can be useful if you have a different user name on different machines.
@@ -1097,7 +1121,9 @@ the host where the shell runs, and n is an integer >= 1.
1097.Nm 1121.Nm
1098uses this special value to forward X11 connections over the secure 1122uses this special value to forward X11 connections over the secure
1099channel. 1123channel.
1100The user should normally not set DISPLAY explicitly, as that 1124The user should normally not set
1125.Ev DISPLAY
1126explicitly, as that
1101will render the X11 connection insecure (and will require the user to 1127will render the X11 connection insecure (and will require the user to
1102manually copy any required authorization cookies). 1128manually copy any required authorization cookies).
1103.It Ev HOME 1129.It Ev HOME
@@ -1211,7 +1237,7 @@ spaces).
1211This file is not highly sensitive, but the recommended 1237This file is not highly sensitive, but the recommended
1212permissions are read/write for the user, and not accessible by others. 1238permissions are read/write for the user, and not accessible by others.
1213.It Pa $HOME/.ssh/authorized_keys2 1239.It Pa $HOME/.ssh/authorized_keys2
1214Lists the public keys (DSA/RSA) that can be used for logging in as this user. 1240Lists the public keys (RSA/DSA) that can be used for logging in as this user.
1215This file is not highly sensitive, but the recommended 1241This file is not highly sensitive, but the recommended
1216permissions are read/write for the user, and not accessible by others. 1242permissions are read/write for the user, and not accessible by others.
1217.It Pa /etc/ssh_known_hosts, /etc/ssh_known_hosts2 1243.It Pa /etc/ssh_known_hosts, /etc/ssh_known_hosts2
@@ -1219,7 +1245,7 @@ Systemwide list of known host keys.
1219.Pa /etc/ssh_known_hosts 1245.Pa /etc/ssh_known_hosts
1220contains RSA and 1246contains RSA and
1221.Pa /etc/ssh_known_hosts2 1247.Pa /etc/ssh_known_hosts2
1222contains DSA or RSA keys for protocol version 2. 1248contains RSA or DSA keys for protocol version 2.
1223These files should be prepared by the 1249These files should be prepared by the
1224system administrator to contain the public host keys of all machines in the 1250system administrator to contain the public host keys of all machines in the
1225organization. 1251organization.