summaryrefslogtreecommitdiff
path: root/ssh.1
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2000-11-13 22:57:25 +1100
committerDamien Miller <djm@mindrot.org>2000-11-13 22:57:25 +1100
commit0bc1bd814e3c2b5e92d6f595930051960d17f47f (patch)
tree176c7dc2844ecc2c1de0f72d221449556ffa5209 /ssh.1
parent559d383037b0872fcde4e6c40188b649c574be74 (diff)
- (djm) Merge OpenBSD changes:
- markus@cvs.openbsd.org 2000/11/06 16:04:56 [channels.c channels.h clientloop.c nchan.c serverloop.c] [session.c ssh.c] agent forwarding and -R for ssh2, based on work from jhuuskon@messi.uku.fi - markus@cvs.openbsd.org 2000/11/06 16:13:27 [ssh.c sshconnect.c sshd.c] do not disabled rhosts(rsa) if server port > 1024; from pekkas@netcore.fi - markus@cvs.openbsd.org 2000/11/06 16:16:35 [sshconnect.c] downgrade client to 1.3 if server is 1.4; help from mdb@juniper.net - markus@cvs.openbsd.org 2000/11/09 18:04:40 [auth1.c] typo; from mouring@pconline.com - markus@cvs.openbsd.org 2000/11/12 12:03:28 [ssh-agent.c] off-by-one when removing a key from the agent - markus@cvs.openbsd.org 2000/11/12 12:50:39 [auth-rh-rsa.c auth2.c authfd.c authfd.h] [authfile.c hostfile.c kex.c kex.h key.c key.h myproposal.h] [readconf.c readconf.h rsa.c rsa.h servconf.c servconf.h ssh-add.c] [ssh-agent.c ssh-keygen.1 ssh-keygen.c ssh.1 ssh.c ssh_config] [sshconnect1.c sshconnect2.c sshd.8 sshd.c sshd_config ssh-dss.c] [ssh-dss.h ssh-rsa.c ssh-rsa.h dsa.c dsa.h] add support for RSA to SSH2. please test. there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. - (djm) Fix up Makefile and Redhat init script to create RSA host keys - (djm) Change to interim version
Diffstat (limited to 'ssh.1')
-rw-r--r--ssh.153
1 files changed, 29 insertions, 24 deletions
diff --git a/ssh.1 b/ssh.1
index 786df1843..4bbfe34c0 100644
--- a/ssh.1
+++ b/ssh.1
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: ssh.1,v 1.64 2000/10/16 21:46:31 markus Exp $ 37.\" $OpenBSD: ssh.1,v 1.68 2000/11/12 19:50:38 markus Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSH 1 39.Dt SSH 1
40.Os 40.Os
@@ -209,9 +209,9 @@ At first, the client attempts to authenticate using the public key method.
209If this method fails password authentication is tried. 209If this method fails password authentication is tried.
210.Pp 210.Pp
211The public key method is similar to RSA authentication described 211The public key method is similar to RSA authentication described
212in the previous section except that the DSA algorithm is used 212in the previous section except that the DSA or RSA algorithm is used
213instead of the patented RSA algorithm. 213instead.
214The client uses his private DSA key 214The client uses his private key
215.Pa $HOME/.ssh/id_dsa 215.Pa $HOME/.ssh/id_dsa
216to sign the session identifier and sends the result to the server. 216to sign the session identifier and sends the result to the server.
217The server checks whether the matching public key is listed in 217The server checks whether the matching public key is listed in
@@ -331,7 +331,7 @@ identifications for all hosts it has ever been used with.
331RSA host keys are stored in 331RSA host keys are stored in
332.Pa $HOME/.ssh/known_hosts 332.Pa $HOME/.ssh/known_hosts
333and 333and
334DSA host keys are stored in 334host keys used in the protocol version 2 are stored in
335.Pa $HOME/.ssh/known_hosts2 335.Pa $HOME/.ssh/known_hosts2
336in the user's home directory. 336in the user's home directory.
337Additionally, the files 337Additionally, the files
@@ -352,7 +352,8 @@ The
352.Cm StrictHostKeyChecking 352.Cm StrictHostKeyChecking
353option (see below) can be used to prevent logins to machines whose 353option (see below) can be used to prevent logins to machines whose
354host key is not known or has changed. 354host key is not known or has changed.
355.Sh OPTIONS 355.Pp
356The options are as follows:
356.Bl -tag -width Ds 357.Bl -tag -width Ds
357.It Fl a 358.It Fl a
358Disables forwarding of the authentication agent connection. 359Disables forwarding of the authentication agent connection.
@@ -407,7 +408,7 @@ something like
407Allows remote hosts to connect to local forwarded ports. 408Allows remote hosts to connect to local forwarded ports.
408.It Fl i Ar identity_file 409.It Fl i Ar identity_file
409Selects the file from which the identity (private key) for 410Selects the file from which the identity (private key) for
410RSA authentication is read. 411RSA or DSA authentication is read.
411Default is 412Default is
412.Pa $HOME/.ssh/identity 413.Pa $HOME/.ssh/identity
413in the user's home directory. 414in the user's home directory.
@@ -552,6 +553,22 @@ Forces
552.Nm 553.Nm
553to use IPv6 addresses only. 554to use IPv6 addresses only.
554.El 555.El
556.Pp
557If
558.Nm
559is not invoked with one of the standard program names
560.Pf ( Dq ssh ,
561.Dq slogin ,
562.Dq rsh ,
563.Dq rlogin ,
564or
565.Dq remsh ) ,
566it uses this name as its
567.Ar hostname
568argument.
569This is consistent with traditional
570.Xr rsh 1
571behavior.
555.Sh CONFIGURATION FILES 572.Sh CONFIGURATION FILES
556.Nm 573.Nm
557obtains configuration data from the following sources (in this order): 574obtains configuration data from the following sources (in this order):
@@ -660,14 +677,12 @@ Specifies the number of tries (one per second) to make before falling
660back to rsh or exiting. 677back to rsh or exiting.
661The argument must be an integer. 678The argument must be an integer.
662This may be useful in scripts if the connection sometimes fails. 679This may be useful in scripts if the connection sometimes fails.
663.It Cm DSAAuthentication 680.It Cm PubkeyAuthentication
664Specifies whether to try DSA authentication. 681Specifies whether to try public key authentication.
665The argument to this keyword must be 682The argument to this keyword must be
666.Dq yes 683.Dq yes
667or 684or
668.Dq no . 685.Dq no .
669DSA authentication will only be
670attempted if a DSA identity file exists.
671Note that this option applies to protocol version 2 only. 686Note that this option applies to protocol version 2 only.
672.It Cm EscapeChar 687.It Cm EscapeChar
673Sets the escape character (default: 688Sets the escape character (default:
@@ -745,16 +760,6 @@ syntax to refer to a user's home directory.
745It is possible to have 760It is possible to have
746multiple identity files specified in configuration files; all these 761multiple identity files specified in configuration files; all these
747identities will be tried in sequence. 762identities will be tried in sequence.
748.It Cm IdentityFile2
749Specifies the file from which the user's DSA authentication identity
750is read (default
751.Pa $HOME/.ssh/id_dsa
752in the user's home directory).
753The file name may use the tilde
754syntax to refer to a user's home directory.
755It is possible to have
756multiple identity files specified in configuration files; all these
757identities will be tried in sequence.
758.It Cm KeepAlive 763.It Cm KeepAlive
759Specifies whether the system should send keepalive messages to the 764Specifies whether the system should send keepalive messages to the
760other side. 765other side.
@@ -1096,7 +1101,7 @@ spaces).
1096This file is not highly sensitive, but the recommended 1101This file is not highly sensitive, but the recommended
1097permissions are read/write for the user, and not accessible by others. 1102permissions are read/write for the user, and not accessible by others.
1098.It Pa $HOME/.ssh/authorized_keys2 1103.It Pa $HOME/.ssh/authorized_keys2
1099Lists the DSA keys that can be used for logging in as this user. 1104Lists the public keys (DSA/RSA) that can be used for logging in as this user.
1100This file is not highly sensitive, but the recommended 1105This file is not highly sensitive, but the recommended
1101permissions are read/write for the user, and not accessible by others. 1106permissions are read/write for the user, and not accessible by others.
1102.It Pa /etc/ssh_known_hosts, /etc/ssh_known_hosts2 1107.It Pa /etc/ssh_known_hosts, /etc/ssh_known_hosts2
@@ -1104,7 +1109,7 @@ Systemwide list of known host keys.
1104.Pa /etc/ssh_known_hosts 1109.Pa /etc/ssh_known_hosts
1105contains RSA and 1110contains RSA and
1106.Pa /etc/ssh_known_hosts2 1111.Pa /etc/ssh_known_hosts2
1107contains DSA keys. 1112contains DSA or RSA keys for protocol version 2.
1108These files should be prepared by the 1113These files should be prepared by the
1109system administrator to contain the public host keys of all machines in the 1114system administrator to contain the public host keys of all machines in the
1110organization. 1115organization.
@@ -1219,7 +1224,7 @@ above.
1219A version of this library which includes support for the RSA algorithm 1224A version of this library which includes support for the RSA algorithm
1220is required for proper operation. 1225is required for proper operation.
1221.El 1226.El
1222.Sh AUTHOR 1227.Sh AUTHORS
1223OpenSSH 1228OpenSSH
1224is a derivative of the original (free) ssh 1.2.12 release by Tatu Ylonen, 1229is a derivative of the original (free) ssh 1.2.12 release by Tatu Ylonen,
1225but with bugs removed and newer features re-added. 1230but with bugs removed and newer features re-added.