diff options
author | Colin Watson <cjwatson@debian.org> | 2005-05-25 11:01:01 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2005-05-25 11:01:01 +0000 |
commit | e88de75a1a236779a10e8ccbcc51d25308be8840 (patch) | |
tree | 7495477a2a7d0cac17a9fcded020b6ea816182ef /ssh.1 | |
parent | 30a0f9443782cd9d7308acd09430bf586186aa55 (diff) | |
parent | 5d05471f6657646d1d6500c7c43134462c407ee6 (diff) |
Merge 4.0p1 to the trunk.
Diffstat (limited to 'ssh.1')
-rw-r--r-- | ssh.1 | 179 |
1 files changed, 115 insertions, 64 deletions
@@ -34,7 +34,7 @@ | |||
34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
36 | .\" | 36 | .\" |
37 | .\" $OpenBSD: ssh.1,v 1.194 2004/08/12 21:41:13 jakob Exp $ | 37 | .\" $OpenBSD: ssh.1,v 1.205 2005/03/07 23:41:54 jmc Exp $ |
38 | .Dd September 25, 1999 | 38 | .Dd September 25, 1999 |
39 | .Dt SSH 1 | 39 | .Dt SSH 1 |
40 | .Os | 40 | .Os |
@@ -43,40 +43,35 @@ | |||
43 | .Nd OpenSSH SSH client (remote login program) | 43 | .Nd OpenSSH SSH client (remote login program) |
44 | .Sh SYNOPSIS | 44 | .Sh SYNOPSIS |
45 | .Nm ssh | 45 | .Nm ssh |
46 | .Bk -words | ||
46 | .Op Fl 1246AaCfgkMNnqsTtVvXxY | 47 | .Op Fl 1246AaCfgkMNnqsTtVvXxY |
47 | .Op Fl b Ar bind_address | 48 | .Op Fl b Ar bind_address |
48 | .Op Fl c Ar cipher_spec | 49 | .Op Fl c Ar cipher_spec |
49 | .Bk -words | ||
50 | .Op Fl D Ar port | 50 | .Op Fl D Ar port |
51 | .Op Fl e Ar escape_char | 51 | .Op Fl e Ar escape_char |
52 | .Op Fl F Ar configfile | 52 | .Op Fl F Ar configfile |
53 | .Op Fl i Ar identity_file | 53 | .Op Fl i Ar identity_file |
54 | .Oo Fl L Xo | 54 | .Oo Fl L\ \& |
55 | .Sm off | 55 | .Sm off |
56 | .Ar port : | 56 | .Oo Ar bind_address : Oc |
57 | .Ar host : | 57 | .Ar port : host : hostport |
58 | .Ar hostport | ||
59 | .Sm on | 58 | .Sm on |
60 | .Xc | ||
61 | .Oc | 59 | .Oc |
62 | .Ek | ||
63 | .Op Fl l Ar login_name | 60 | .Op Fl l Ar login_name |
64 | .Op Fl m Ar mac_spec | 61 | .Op Fl m Ar mac_spec |
62 | .Op Fl O Ar ctl_cmd | ||
65 | .Op Fl o Ar option | 63 | .Op Fl o Ar option |
66 | .Bk -words | ||
67 | .Op Fl p Ar port | 64 | .Op Fl p Ar port |
68 | .Ek | 65 | .Oo Fl R\ \& |
69 | .Oo Fl R Xo | ||
70 | .Sm off | 66 | .Sm off |
71 | .Ar port : | 67 | .Oo Ar bind_address : Oc |
72 | .Ar host : | 68 | .Ar port : host : hostport |
73 | .Ar hostport | ||
74 | .Sm on | 69 | .Sm on |
75 | .Xc | ||
76 | .Oc | 70 | .Oc |
77 | .Op Fl S Ar ctl | 71 | .Op Fl S Ar ctl_path |
78 | .Oo Ar user Ns @ Oc Ns Ar hostname | 72 | .Oo Ar user Ns @ Oc Ns Ar hostname |
79 | .Op Ar command | 73 | .Op Ar command |
74 | .Ek | ||
80 | .Sh DESCRIPTION | 75 | .Sh DESCRIPTION |
81 | .Nm | 76 | .Nm |
82 | (SSH client) is a program for logging into a remote machine and for | 77 | (SSH client) is a program for logging into a remote machine and for |
@@ -103,35 +98,25 @@ is specified, | |||
103 | .Ar command | 98 | .Ar command |
104 | is executed on the remote host instead of a login shell. | 99 | is executed on the remote host instead of a login shell. |
105 | .Ss SSH protocol version 1 | 100 | .Ss SSH protocol version 1 |
106 | First, if the machine the user logs in from is listed in | 101 | The first authentication method is the |
102 | .Em rhosts | ||
103 | or | ||
104 | .Em hosts.equiv | ||
105 | method combined with RSA-based host authentication. | ||
106 | If the machine the user logs in from is listed in | ||
107 | .Pa /etc/hosts.equiv | 107 | .Pa /etc/hosts.equiv |
108 | or | 108 | or |
109 | .Pa /etc/shosts.equiv | 109 | .Pa /etc/shosts.equiv |
110 | on the remote machine, and the user names are | 110 | on the remote machine, and the user names are |
111 | the same on both sides, the user is immediately permitted to log in. | 111 | the same on both sides, or if the files |
112 | Second, if | 112 | .Pa $HOME/.rhosts |
113 | .Pa .rhosts | ||
114 | or | 113 | or |
115 | .Pa .shosts | 114 | .Pa $HOME/.shosts |
116 | exists in the user's home directory on the | 115 | exist in the user's home directory on the |
117 | remote machine and contains a line containing the name of the client | 116 | remote machine and contain a line containing the name of the client |
118 | machine and the name of the user on that machine, the user is | 117 | machine and the name of the user on that machine, the user is |
119 | permitted to log in. | 118 | considered for log in. |
120 | This form of authentication alone is normally not | 119 | Additionally, if the server can verify the client's |
121 | allowed by the server because it is not secure. | ||
122 | .Pp | ||
123 | The second authentication method is the | ||
124 | .Em rhosts | ||
125 | or | ||
126 | .Em hosts.equiv | ||
127 | method combined with RSA-based host authentication. | ||
128 | It means that if the login would be permitted by | ||
129 | .Pa $HOME/.rhosts , | ||
130 | .Pa $HOME/.shosts , | ||
131 | .Pa /etc/hosts.equiv , | ||
132 | or | ||
133 | .Pa /etc/shosts.equiv , | ||
134 | and if additionally the server can verify the client's | ||
135 | host key (see | 120 | host key (see |
136 | .Pa /etc/ssh/ssh_known_hosts | 121 | .Pa /etc/ssh/ssh_known_hosts |
137 | and | 122 | and |
@@ -147,7 +132,7 @@ spoofing, DNS spoofing and routing spoofing. | |||
147 | and the rlogin/rsh protocol in general, are inherently insecure and should be | 132 | and the rlogin/rsh protocol in general, are inherently insecure and should be |
148 | disabled if security is desired.] | 133 | disabled if security is desired.] |
149 | .Pp | 134 | .Pp |
150 | As a third authentication method, | 135 | As a second authentication method, |
151 | .Nm | 136 | .Nm |
152 | supports RSA based authentication. | 137 | supports RSA based authentication. |
153 | The scheme is based on public-key cryptography: there are cryptosystems | 138 | The scheme is based on public-key cryptography: there are cryptosystems |
@@ -195,9 +180,6 @@ file corresponds to the conventional | |||
195 | file, and has one key | 180 | file, and has one key |
196 | per line, though the lines can be very long). | 181 | per line, though the lines can be very long). |
197 | After this, the user can log in without giving the password. | 182 | After this, the user can log in without giving the password. |
198 | RSA authentication is much more secure than | ||
199 | .Em rhosts | ||
200 | authentication. | ||
201 | .Pp | 183 | .Pp |
202 | The most convenient way to use RSA authentication may be with an | 184 | The most convenient way to use RSA authentication may be with an |
203 | authentication agent. | 185 | authentication agent. |
@@ -582,6 +564,7 @@ configuration files). | |||
582 | Disables forwarding (delegation) of GSSAPI credentials to the server. | 564 | Disables forwarding (delegation) of GSSAPI credentials to the server. |
583 | .It Fl L Xo | 565 | .It Fl L Xo |
584 | .Sm off | 566 | .Sm off |
567 | .Oo Ar bind_address : Oc | ||
585 | .Ar port : host : hostport | 568 | .Ar port : host : hostport |
586 | .Sm on | 569 | .Sm on |
587 | .Xc | 570 | .Xc |
@@ -589,7 +572,9 @@ Specifies that the given port on the local (client) host is to be | |||
589 | forwarded to the given host and port on the remote side. | 572 | forwarded to the given host and port on the remote side. |
590 | This works by allocating a socket to listen to | 573 | This works by allocating a socket to listen to |
591 | .Ar port | 574 | .Ar port |
592 | on the local side, and whenever a connection is made to this port, the | 575 | on the local side, optionally bound to the specified |
576 | .Ar bind_address . | ||
577 | Whenever a connection is made to this port, the | ||
593 | connection is forwarded over the secure channel, and a connection is | 578 | connection is forwarded over the secure channel, and a connection is |
594 | made to | 579 | made to |
595 | .Ar host | 580 | .Ar host |
@@ -597,14 +582,30 @@ port | |||
597 | .Ar hostport | 582 | .Ar hostport |
598 | from the remote machine. | 583 | from the remote machine. |
599 | Port forwardings can also be specified in the configuration file. | 584 | Port forwardings can also be specified in the configuration file. |
600 | Only root can forward privileged ports. | ||
601 | IPv6 addresses can be specified with an alternative syntax: | 585 | IPv6 addresses can be specified with an alternative syntax: |
602 | .Sm off | 586 | .Sm off |
603 | .Xo | 587 | .Xo |
588 | .Op Ar bind_address No / | ||
604 | .Ar port No / Ar host No / | 589 | .Ar port No / Ar host No / |
605 | .Ar hostport . | 590 | .Ar hostport |
606 | .Xc | 591 | .Xc |
607 | .Sm on | 592 | .Sm on |
593 | or by enclosing the address in square brackets. | ||
594 | Only the superuser can forward privileged ports. | ||
595 | By default, the local port is bound in accordance with the | ||
596 | .Cm GatewayPorts | ||
597 | setting. | ||
598 | However, an explicit | ||
599 | .Ar bind_address | ||
600 | may be used to bind the connection to a specific address. | ||
601 | The | ||
602 | .Ar bind_address | ||
603 | of | ||
604 | .Dq localhost | ||
605 | indicates that the listening port be bound for local use only, while an | ||
606 | empty address or | ||
607 | .Sq * | ||
608 | indicates that the port should be available from all interfaces. | ||
608 | .It Fl l Ar login_name | 609 | .It Fl l Ar login_name |
609 | Specifies the user to log in as on the remote machine. | 610 | Specifies the user to log in as on the remote machine. |
610 | This also may be specified on a per-host basis in the configuration file. | 611 | This also may be specified on a per-host basis in the configuration file. |
@@ -650,6 +651,18 @@ program will be put in the background. | |||
650 | needs to ask for a password or passphrase; see also the | 651 | needs to ask for a password or passphrase; see also the |
651 | .Fl f | 652 | .Fl f |
652 | option.) | 653 | option.) |
654 | .It Fl O Ar ctl_cmd | ||
655 | Control an active connection multiplexing master process. | ||
656 | When the | ||
657 | .Fl O | ||
658 | option is specified, the | ||
659 | .Ar ctl_cmd | ||
660 | argument is interpreted and passed to the master process. | ||
661 | Valid commands are: | ||
662 | .Dq check | ||
663 | (check that the master process is running) and | ||
664 | .Dq exit | ||
665 | (request the master to exit). | ||
653 | .It Fl o Ar option | 666 | .It Fl o Ar option |
654 | Can be used to give options in the format used in the configuration file. | 667 | Can be used to give options in the format used in the configuration file. |
655 | This is useful for specifying options for which there is no separate | 668 | This is useful for specifying options for which there is no separate |
@@ -681,6 +694,7 @@ For full details of the options listed below, and their possible values, see | |||
681 | .It GlobalKnownHostsFile | 694 | .It GlobalKnownHostsFile |
682 | .It GSSAPIAuthentication | 695 | .It GSSAPIAuthentication |
683 | .It GSSAPIDelegateCredentials | 696 | .It GSSAPIDelegateCredentials |
697 | .It HashKnownHosts | ||
684 | .It Host | 698 | .It Host |
685 | .It HostbasedAuthentication | 699 | .It HostbasedAuthentication |
686 | .It HostKeyAlgorithms | 700 | .It HostKeyAlgorithms |
@@ -688,6 +702,7 @@ For full details of the options listed below, and their possible values, see | |||
688 | .It HostName | 702 | .It HostName |
689 | .It IdentityFile | 703 | .It IdentityFile |
690 | .It IdentitiesOnly | 704 | .It IdentitiesOnly |
705 | .It KbdInteractiveDevices | ||
691 | .It LocalForward | 706 | .It LocalForward |
692 | .It LogLevel | 707 | .It LogLevel |
693 | .It MACs | 708 | .It MACs |
@@ -727,6 +742,7 @@ If a second | |||
727 | is given then even fatal errors are suppressed. | 742 | is given then even fatal errors are suppressed. |
728 | .It Fl R Xo | 743 | .It Fl R Xo |
729 | .Sm off | 744 | .Sm off |
745 | .Oo Ar bind_address : Oc | ||
730 | .Ar port : host : hostport | 746 | .Ar port : host : hostport |
731 | .Sm on | 747 | .Sm on |
732 | .Xc | 748 | .Xc |
@@ -741,17 +757,36 @@ made to | |||
741 | port | 757 | port |
742 | .Ar hostport | 758 | .Ar hostport |
743 | from the local machine. | 759 | from the local machine. |
760 | .Pp | ||
744 | Port forwardings can also be specified in the configuration file. | 761 | Port forwardings can also be specified in the configuration file. |
745 | Privileged ports can be forwarded only when | 762 | Privileged ports can be forwarded only when |
746 | logging in as root on the remote machine. | 763 | logging in as root on the remote machine. |
747 | IPv6 addresses can be specified with an alternative syntax: | 764 | IPv6 addresses can be specified by enclosing the address in square braces or |
765 | using an alternative syntax: | ||
748 | .Sm off | 766 | .Sm off |
749 | .Xo | 767 | .Xo |
750 | .Ar port No / Ar host No / | 768 | .Op Ar bind_address No / |
751 | .Ar hostport . | 769 | .Ar host No / Ar port No / |
752 | .Xc | 770 | .Ar hostport |
771 | .Xc . | ||
753 | .Sm on | 772 | .Sm on |
754 | .It Fl S Ar ctl | 773 | .Pp |
774 | By default, the listening socket on the server will be bound to the loopback | ||
775 | interface only. | ||
776 | This may be overriden by specifying a | ||
777 | .Ar bind_address . | ||
778 | An empty | ||
779 | .Ar bind_address , | ||
780 | or the address | ||
781 | .Ql * , | ||
782 | indicates that the remote socket should listen on all interfaces. | ||
783 | Specifying a remote | ||
784 | .Ar bind_address | ||
785 | will only succeed if the server's | ||
786 | .Cm GatewayPorts | ||
787 | option is enabled (see | ||
788 | .Xr sshd_config 5 ) . | ||
789 | .It Fl S Ar ctl_path | ||
755 | Specifies the location of a control socket for connection sharing. | 790 | Specifies the location of a control socket for connection sharing. |
756 | Refer to the description of | 791 | Refer to the description of |
757 | .Cm ControlPath | 792 | .Cm ControlPath |
@@ -800,10 +835,23 @@ Users with the ability to bypass file permissions on the remote host | |||
800 | (for the user's X authorization database) | 835 | (for the user's X authorization database) |
801 | can access the local X11 display through the forwarded connection. | 836 | can access the local X11 display through the forwarded connection. |
802 | An attacker may then be able to perform activities such as keystroke monitoring. | 837 | An attacker may then be able to perform activities such as keystroke monitoring. |
838 | .Pp | ||
839 | For this reason, X11 forwarding is subjected to X11 SECURITY extension | ||
840 | restrictions by default. | ||
841 | Please refer to the | ||
842 | .Nm | ||
843 | .Fl Y | ||
844 | option and the | ||
845 | .Cm ForwardX11Trusted | ||
846 | directive in | ||
847 | .Xr ssh_config 5 | ||
848 | for more information. | ||
803 | .It Fl x | 849 | .It Fl x |
804 | Disables X11 forwarding. | 850 | Disables X11 forwarding. |
805 | .It Fl Y | 851 | .It Fl Y |
806 | Enables trusted X11 forwarding. | 852 | Enables trusted X11 forwarding. |
853 | Trusted X11 forwardings are not subjected to the X11 SECURITY extension | ||
854 | controls. | ||
807 | .El | 855 | .El |
808 | .Sh CONFIGURATION FILES | 856 | .Sh CONFIGURATION FILES |
809 | .Nm | 857 | .Nm |
@@ -863,7 +911,7 @@ and open an X11 window to read the passphrase. | |||
863 | This is particularly useful when calling | 911 | This is particularly useful when calling |
864 | .Nm | 912 | .Nm |
865 | from a | 913 | from a |
866 | .Pa .Xsession | 914 | .Pa .xsession |
867 | or related script. | 915 | or related script. |
868 | (Note that on some machines it | 916 | (Note that on some machines it |
869 | may be necessary to redirect the input from | 917 | may be necessary to redirect the input from |
@@ -1016,7 +1064,9 @@ By default | |||
1016 | is not setuid root. | 1064 | is not setuid root. |
1017 | .It Pa $HOME/.rhosts | 1065 | .It Pa $HOME/.rhosts |
1018 | This file is used in | 1066 | This file is used in |
1019 | .Em rhosts | 1067 | .Cm RhostsRSAAuthentication |
1068 | and | ||
1069 | .Cm HostbasedAuthentication | ||
1020 | authentication to list the | 1070 | authentication to list the |
1021 | host/user pairs that are permitted to log in. | 1071 | host/user pairs that are permitted to log in. |
1022 | (Note that this file is | 1072 | (Note that this file is |
@@ -1035,12 +1085,10 @@ The recommended | |||
1035 | permission for most machines is read/write for the user, and not | 1085 | permission for most machines is read/write for the user, and not |
1036 | accessible by others. | 1086 | accessible by others. |
1037 | .Pp | 1087 | .Pp |
1038 | Note that by default | 1088 | Note that |
1039 | .Xr sshd 8 | 1089 | .Xr sshd 8 |
1040 | will be installed so that it requires successful RSA host | 1090 | allows authentication only in combination with client host key |
1041 | authentication before permitting | 1091 | authentication before permitting log in. |
1042 | .Em rhosts | ||
1043 | authentication. | ||
1044 | If the server machine does not have the client's host key in | 1092 | If the server machine does not have the client's host key in |
1045 | .Pa /etc/ssh/ssh_known_hosts , | 1093 | .Pa /etc/ssh/ssh_known_hosts , |
1046 | it can be stored in | 1094 | it can be stored in |
@@ -1053,15 +1101,19 @@ will automatically add the host key to | |||
1053 | This file is used exactly the same way as | 1101 | This file is used exactly the same way as |
1054 | .Pa .rhosts . | 1102 | .Pa .rhosts . |
1055 | The purpose for | 1103 | The purpose for |
1056 | having this file is to be able to use rhosts authentication with | 1104 | having this file is to be able to use |
1057 | .Nm | 1105 | .Cm RhostsRSAAuthentication |
1058 | without permitting login with | 1106 | and |
1107 | .Cm HostbasedAuthentication | ||
1108 | authentication without permitting login with | ||
1059 | .Xr rlogin | 1109 | .Xr rlogin |
1060 | or | 1110 | or |
1061 | .Xr rsh 1 . | 1111 | .Xr rsh 1 . |
1062 | .It Pa /etc/hosts.equiv | 1112 | .It Pa /etc/hosts.equiv |
1063 | This file is used during | 1113 | This file is used during |
1064 | .Em rhosts | 1114 | .Cm RhostsRSAAuthentication |
1115 | and | ||
1116 | .Cm HostbasedAuthentication | ||
1065 | authentication. | 1117 | authentication. |
1066 | It contains | 1118 | It contains |
1067 | canonical hosts names, one per line (the full format is described in the | 1119 | canonical hosts names, one per line (the full format is described in the |
@@ -1070,8 +1122,7 @@ manual page). | |||
1070 | If the client host is found in this file, login is | 1122 | If the client host is found in this file, login is |
1071 | automatically permitted provided client and server user names are the | 1123 | automatically permitted provided client and server user names are the |
1072 | same. | 1124 | same. |
1073 | Additionally, successful RSA host authentication is normally | 1125 | Additionally, successful client host key authentication is required. |
1074 | required. | ||
1075 | This file should only be writable by root. | 1126 | This file should only be writable by root. |
1076 | .It Pa /etc/shosts.equiv | 1127 | .It Pa /etc/shosts.equiv |
1077 | This file is processed exactly as | 1128 | This file is processed exactly as |