summaryrefslogtreecommitdiff
path: root/ssh.1
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2001-09-12 18:35:30 +0000
committerBen Lindstrom <mouring@eviladmin.org>2001-09-12 18:35:30 +0000
commit594e20389490bf91724dc903cb9aaa92d037b7a4 (patch)
tree8bcf855dccd896ee87ae815aeeb80f87d6035e08 /ssh.1
parentedc0cf26d11d708320ade92e066d4f3e84e20112 (diff)
- deraadt@cvs.openbsd.org 2001/09/05 06:23:07
[scp.1 sftp.1 ssh.1 ssh-agent.1 sshd.8 ssh-keygen.1 ssh-keyscan.1] avoid first person in manual pages
Diffstat (limited to 'ssh.1')
-rw-r--r--ssh.136
1 files changed, 18 insertions, 18 deletions
diff --git a/ssh.1 b/ssh.1
index d7529d7a9..c7a19e3b4 100644
--- a/ssh.1
+++ b/ssh.1
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: ssh.1,v 1.136 2001/08/30 16:04:35 stevesk Exp $ 37.\" $OpenBSD: ssh.1,v 1.137 2001/09/05 06:23:07 deraadt Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSH 1 39.Dt SSH 1
40.Os 40.Os
@@ -495,7 +495,7 @@ needs to ask for a password or passphrase; see also the
495option.) 495option.)
496.It Fl N 496.It Fl N
497Do not execute a remote command. 497Do not execute a remote command.
498This is useful if you just want to forward ports 498This is useful for just forwarding ports
499(protocol version 2 only). 499(protocol version 2 only).
500.It Fl o Ar option 500.It Fl o Ar option
501Can be used to give options in the format used in the configuration file. 501Can be used to give options in the format used in the configuration file.
@@ -507,7 +507,7 @@ This can be specified on a
507per-host basis in the configuration file. 507per-host basis in the configuration file.
508.It Fl P 508.It Fl P
509Use a non-privileged port for outgoing connections. 509Use a non-privileged port for outgoing connections.
510This can be used if your firewall does 510This can be used if a firewall does
511not permit connections from privileged ports. 511not permit connections from privileged ports.
512Note that this option turns off 512Note that this option turns off
513.Cm RhostsAuthentication 513.Cm RhostsAuthentication
@@ -711,8 +711,8 @@ This option applies to protocol version 1 only.
711If set to 711If set to
712.Dq yes , 712.Dq yes ,
713passphrase/password querying will be disabled. 713passphrase/password querying will be disabled.
714This option is useful in scripts and other batch jobs where you have no 714This option is useful in scripts and other batch jobs where no user
715user to supply the password. 715is present to supply the password.
716The argument must be 716The argument must be
717.Dq yes 717.Dq yes
718or 718or
@@ -890,7 +890,7 @@ Specifies an alias that should be used instead of the
890real host name when looking up or saving the host key 890real host name when looking up or saving the host key
891in the host key database files. 891in the host key database files.
892This option is useful for tunneling ssh connections 892This option is useful for tunneling ssh connections
893or if you have multiple servers running on a single host. 893or for multiple servers running on a single host.
894.It Cm HostName 894.It Cm HostName
895Specifies the real host name to log into. 895Specifies the real host name to log into.
896This can be used to specify nicknames or abbreviations for hosts. 896This can be used to specify nicknames or abbreviations for hosts.
@@ -1109,11 +1109,11 @@ If this flag is set to
1109will never automatically add host keys to the 1109will never automatically add host keys to the
1110.Pa $HOME/.ssh/known_hosts 1110.Pa $HOME/.ssh/known_hosts
1111file, and refuses to connect to hosts whose host key has changed. 1111file, and refuses to connect to hosts whose host key has changed.
1112This provides maximum protection against trojan horse attacks. 1112This provides maximum protection against trojan horse attacks,
1113However, it can be somewhat annoying if you don't have good 1113however, can be annoying when the
1114.Pa /etc/ssh_known_hosts 1114.Pa /etc/ssh_known_hosts
1115files installed and frequently 1115file is poorly maintained, or connections to new hosts are
1116connect to new hosts. 1116frequently made.
1117This option forces the user to manually 1117This option forces the user to manually
1118add all new hosts. 1118add all new hosts.
1119If this flag is set to 1119If this flag is set to
@@ -1145,16 +1145,16 @@ or
1145.Dq no . 1145.Dq no .
1146The default is 1146The default is
1147.Dq no . 1147.Dq no .
1148Note that you need to set this option to 1148Note that this option must be set to
1149.Dq yes 1149.Dq yes
1150if you want to use 1150if
1151.Cm RhostsAuthentication 1151.Cm RhostsAuthentication
1152and 1152and
1153.Cm RhostsRSAAuthentication 1153.Cm RhostsRSAAuthentication
1154with older servers. 1154authentications are needed with older servers.
1155.It Cm User 1155.It Cm User
1156Specifies the user to log in as. 1156Specifies the user to log in as.
1157This can be useful if you have a different user name on different machines. 1157This can be useful when a different user name is used on different machines.
1158This saves the trouble of 1158This saves the trouble of
1159having to remember to give the user name on the command line. 1159having to remember to give the user name on the command line.
1160.It Cm UserKnownHostsFile 1160.It Cm UserKnownHostsFile
@@ -1302,7 +1302,7 @@ The contents of the
1302file should be added to 1302file should be added to
1303.Pa $HOME/.ssh/authorized_keys 1303.Pa $HOME/.ssh/authorized_keys
1304on all machines 1304on all machines
1305where you wish to log in using protocol version 1 RSA authentication. 1305where the user wishes to log in using protocol version 1 RSA authentication.
1306The contents of the 1306The contents of the
1307.Pa $HOME/.ssh/id_dsa.pub 1307.Pa $HOME/.ssh/id_dsa.pub
1308and 1308and
@@ -1310,7 +1310,7 @@ and
1310file should be added to 1310file should be added to
1311.Pa $HOME/.ssh/authorized_keys 1311.Pa $HOME/.ssh/authorized_keys
1312on all machines 1312on all machines
1313where you wish to log in using protocol version 2 DSA/RSA authentication. 1313where the user wishes to log in using protocol version 2 DSA/RSA authentication.
1314These files are not 1314These files are not
1315sensitive and can (but need not) be readable by anyone. 1315sensitive and can (but need not) be readable by anyone.
1316These files are 1316These files are
@@ -1388,9 +1388,9 @@ Note that by default
1388.Xr sshd 8 1388.Xr sshd 8
1389will be installed so that it requires successful RSA host 1389will be installed so that it requires successful RSA host
1390authentication before permitting \s+2.\s0rhosts authentication. 1390authentication before permitting \s+2.\s0rhosts authentication.
1391If your server machine does not have the client's host key in 1391If the server machine does not have the client's host key in
1392.Pa /etc/ssh_known_hosts , 1392.Pa /etc/ssh_known_hosts ,
1393you can store it in 1393it can be stored in
1394.Pa $HOME/.ssh/known_hosts . 1394.Pa $HOME/.ssh/known_hosts .
1395The easiest way to do this is to 1395The easiest way to do this is to
1396connect back to the client from the server machine using ssh; this 1396connect back to the client from the server machine using ssh; this