summaryrefslogtreecommitdiff
path: root/ssh.1
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2001-06-25 05:08:11 +0000
committerBen Lindstrom <mouring@eviladmin.org>2001-06-25 05:08:11 +0000
commit2464322d7ee41dcd8beee12903775f7f2a80a164 (patch)
tree211b60ad7793b335208f5e53d9cf97c6725f558d /ssh.1
parente586c4ce3f4af32ef9eed72344f0fc7f43b9e58a (diff)
- itojun@cvs.openbsd.org 2001/06/23 17:48:18
[sftp.1 ssh.1 sshd.8 ssh-keyscan.1] kill whitespace at EOL.
Diffstat (limited to 'ssh.1')
-rw-r--r--ssh.120
1 files changed, 10 insertions, 10 deletions
diff --git a/ssh.1 b/ssh.1
index 94a22f1e4..f56b330f1 100644
--- a/ssh.1
+++ b/ssh.1
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: ssh.1,v 1.116 2001/06/23 02:34:31 markus Exp $ 37.\" $OpenBSD: ssh.1,v 1.117 2001/06/23 17:48:19 itojun Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSH 1 39.Dt SSH 1
40.Os 40.Os
@@ -269,7 +269,7 @@ of
269.Ss Escape Characters 269.Ss Escape Characters
270.Pp 270.Pp
271When a pseudo terminal has been requested, ssh supports a number of functions 271When a pseudo terminal has been requested, ssh supports a number of functions
272through the use of an escape character. 272through the use of an escape character.
273.Pp 273.Pp
274A single tilde character can be sent as 274A single tilde character can be sent as
275.Ic ~~ 275.Ic ~~
@@ -278,7 +278,7 @@ The escape character must always follow a newline to be interpreted as
278special. 278special.
279The escape character can be changed in configuration files using the 279The escape character can be changed in configuration files using the
280.Cm EscapeChar 280.Cm EscapeChar
281configuration directive or on the command line by the 281configuration directive or on the command line by the
282.Fl e 282.Fl e
283option. 283option.
284.Pp 284.Pp
@@ -510,8 +510,8 @@ Quiet mode.
510Causes all warning and diagnostic messages to be suppressed. 510Causes all warning and diagnostic messages to be suppressed.
511Only fatal errors are displayed. 511Only fatal errors are displayed.
512.It Fl s 512.It Fl s
513May be used to request invocation of a subsystem on the remote system. Subsystems are a feature of the SSH2 protocol which facilitate the use 513May be used to request invocation of a subsystem on the remote system. Subsystems are a feature of the SSH2 protocol which facilitate the use
514of SSH as a secure transport for other applications (eg. sftp). The 514of SSH as a secure transport for other applications (eg. sftp). The
515subsystem is specified as the remote command. 515subsystem is specified as the remote command.
516.It Fl t 516.It Fl t
517Force pseudo-tty allocation. 517Force pseudo-tty allocation.
@@ -698,7 +698,7 @@ The default is
698Specifies the cipher to use for encrypting the session 698Specifies the cipher to use for encrypting the session
699in protocol version 1. 699in protocol version 1.
700Currently, 700Currently,
701.Dq blowfish 701.Dq blowfish
702and 702and
703.Dq 3des 703.Dq 3des
704are supported. 704are supported.
@@ -883,7 +883,7 @@ The possible values are:
883QUIET, FATAL, ERROR, INFO, VERBOSE and DEBUG. 883QUIET, FATAL, ERROR, INFO, VERBOSE and DEBUG.
884The default is INFO. 884The default is INFO.
885.It Cm MACs 885.It Cm MACs
886Specifies the MAC (message authentication code) algorithms 886Specifies the MAC (message authentication code) algorithms
887in order of preference. 887in order of preference.
888The MAC algorithm is used in protocol version 2 888The MAC algorithm is used in protocol version 2
889for data integrity protection. 889for data integrity protection.
@@ -906,8 +906,8 @@ The default is
906Specifies the port number to connect on the remote host. 906Specifies the port number to connect on the remote host.
907Default is 22. 907Default is 22.
908.It Cm PreferredAuthentications 908.It Cm PreferredAuthentications
909Specifies the order in which the client should try protocol 2 909Specifies the order in which the client should try protocol 2
910authentication methods. This allows a client to prefer one method (e.g. 910authentication methods. This allows a client to prefer one method (e.g.
911.Cm keyboard-interactive ) 911.Cm keyboard-interactive )
912over another method (e.g. 912over another method (e.g.
913.Cm password ) 913.Cm password )
@@ -979,7 +979,7 @@ Disabling rhosts authentication may reduce
979authentication time on slow connections when rhosts authentication is 979authentication time on slow connections when rhosts authentication is
980not used. 980not used.
981Most servers do not permit RhostsAuthentication because it 981Most servers do not permit RhostsAuthentication because it
982is not secure (see 982is not secure (see
983.Cm RhostsRSAAuthentication ) . 983.Cm RhostsRSAAuthentication ) .
984The argument to this keyword must be 984The argument to this keyword must be
985.Dq yes 985.Dq yes