diff options
author | Colin Watson <cjwatson@debian.org> | 2015-08-19 14:23:51 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2015-08-19 16:48:11 +0100 |
commit | 0f0841b2d28b7463267d4d91577e72e3340a1d3a (patch) | |
tree | ba55fcd2b6e2cc22b30f5afb561dbb3da4c8b6c7 /ssh_config.0 | |
parent | f2a5f5dae656759efb0b76c3d94890b65c197a02 (diff) | |
parent | 8698446b972003b63dfe5dcbdb86acfe986afb85 (diff) |
New upstream release (6.8p1).
Diffstat (limited to 'ssh_config.0')
-rw-r--r-- | ssh_config.0 | 513 |
1 files changed, 282 insertions, 231 deletions
diff --git a/ssh_config.0 b/ssh_config.0 index c40ce5f08..3bdd75237 100644 --- a/ssh_config.0 +++ b/ssh_config.0 | |||
@@ -1,7 +1,7 @@ | |||
1 | SSH_CONFIG(5) File Formats Manual SSH_CONFIG(5) | 1 | SSH_CONFIG(5) File Formats Manual SSH_CONFIG(5) |
2 | 2 | ||
3 | NAME | 3 | NAME |
4 | ssh_config - OpenSSH SSH client configuration files | 4 | ssh_config M-bM-^@M-^S OpenSSH SSH client configuration files |
5 | 5 | ||
6 | SYNOPSIS | 6 | SYNOPSIS |
7 | ~/.ssh/config | 7 | ~/.ssh/config |
@@ -16,10 +16,11 @@ DESCRIPTION | |||
16 | 3. system-wide configuration file (/etc/ssh/ssh_config) | 16 | 3. system-wide configuration file (/etc/ssh/ssh_config) |
17 | 17 | ||
18 | For each parameter, the first obtained value will be used. The | 18 | For each parameter, the first obtained value will be used. The |
19 | configuration files contain sections separated by ``Host'' | 19 | configuration files contain sections separated by M-bM-^@M-^\HostM-bM-^@M-^] specifications, |
20 | specifications, and that section is only applied for hosts that match one | 20 | and that section is only applied for hosts that match one of the patterns |
21 | of the patterns given in the specification. The matched host name is the | 21 | given in the specification. The matched host name is usually the one |
22 | one given on the command line. | 22 | given on the command line (see the CanonicalizeHostname option for |
23 | exceptions.) | ||
23 | 24 | ||
24 | Since the first obtained value for each parameter is used, more host- | 25 | Since the first obtained value for each parameter is used, more host- |
25 | specific declarations should be given near the beginning of the file, and | 26 | specific declarations should be given near the beginning of the file, and |
@@ -27,9 +28,9 @@ DESCRIPTION | |||
27 | 28 | ||
28 | The configuration file has the following format: | 29 | The configuration file has the following format: |
29 | 30 | ||
30 | Empty lines and lines starting with `#' are comments. Otherwise a line | 31 | Empty lines and lines starting with M-bM-^@M-^X#M-bM-^@M-^Y are comments. Otherwise a line |
31 | is of the format ``keyword arguments''. Configuration options may be | 32 | is of the format M-bM-^@M-^\keyword argumentsM-bM-^@M-^]. Configuration options may be |
32 | separated by whitespace or optional whitespace and exactly one `='; the | 33 | separated by whitespace or optional whitespace and exactly one M-bM-^@M-^X=M-bM-^@M-^Y; the |
33 | latter format is useful to avoid the need to quote whitespace when | 34 | latter format is useful to avoid the need to quote whitespace when |
34 | specifying configuration options using the ssh, scp, and sftp -o option. | 35 | specifying configuration options using the ssh, scp, and sftp -o option. |
35 | Arguments may optionally be enclosed in double quotes (") in order to | 36 | Arguments may optionally be enclosed in double quotes (") in order to |
@@ -41,14 +42,14 @@ DESCRIPTION | |||
41 | Host Restricts the following declarations (up to the next Host or | 42 | Host Restricts the following declarations (up to the next Host or |
42 | Match keyword) to be only for those hosts that match one of the | 43 | Match keyword) to be only for those hosts that match one of the |
43 | patterns given after the keyword. If more than one pattern is | 44 | patterns given after the keyword. If more than one pattern is |
44 | provided, they should be separated by whitespace. A single `*' | 45 | provided, they should be separated by whitespace. A single M-bM-^@M-^X*M-bM-^@M-^Y |
45 | as a pattern can be used to provide global defaults for all | 46 | as a pattern can be used to provide global defaults for all |
46 | hosts. The host is the hostname argument given on the command | 47 | hosts. The host is usually the hostname argument given on the |
47 | line (i.e. the name is not converted to a canonicalized host name | 48 | command line (see the CanonicalizeHostname option for |
48 | before matching). | 49 | exceptions.) |
49 | 50 | ||
50 | A pattern entry may be negated by prefixing it with an | 51 | A pattern entry may be negated by prefixing it with an |
51 | exclamation mark (`!'). If a negated entry is matched, then the | 52 | exclamation mark (M-bM-^@M-^X!M-bM-^@M-^Y). If a negated entry is matched, then the |
52 | Host entry is ignored, regardless of whether any other patterns | 53 | Host entry is ignored, regardless of whether any other patterns |
53 | on the line match. Negated matches are therefore useful to | 54 | on the line match. Negated matches are therefore useful to |
54 | provide exceptions for wildcard matches. | 55 | provide exceptions for wildcard matches. |
@@ -58,50 +59,57 @@ DESCRIPTION | |||
58 | Match Restricts the following declarations (up to the next Host or | 59 | Match Restricts the following declarations (up to the next Host or |
59 | Match keyword) to be used only when the conditions following the | 60 | Match keyword) to be used only when the conditions following the |
60 | Match keyword are satisfied. Match conditions are specified | 61 | Match keyword are satisfied. Match conditions are specified |
61 | using one or more keyword/criteria pairs or the single token all | 62 | using one or more critera or the single token all which always |
62 | which matches all criteria. The available keywords are: exec, | 63 | matches. The available criteria keywords are: canonical, exec, |
63 | host, originalhost, user, and localuser. | 64 | host, originalhost, user, and localuser. The all criteria must |
64 | 65 | appear alone or immediately after canonical. Other criteria may | |
65 | The exec keyword executes the specified command under the user's | 66 | be combined arbitrarily. All criteria but all and canonical |
66 | shell. If the command returns a zero exit status then the | 67 | require an argument. Criteria may be negated by prepending an |
67 | condition is considered true. Commands containing whitespace | 68 | exclamation mark (M-bM-^@M-^X!M-bM-^@M-^Y). |
68 | characters must be quoted. The following character sequences in | 69 | |
69 | the command will be expanded prior to execution: `%L' will be | 70 | The canonical keywork matches only when the configuration file is |
70 | substituted by the first component of the local host name, `%l' | 71 | being re-parsed after hostname canonicalization (see the |
71 | will be substituted by the local host name (including any domain | 72 | CanonicalizeHostname option.) This may be useful to specify |
72 | name), `%h' will be substituted by the target host name, `%n' | 73 | conditions that work with canonical host names only. The exec |
73 | will be substituted by the original target host name specified on | 74 | keyword executes the specified command under the user's shell. |
74 | the command-line, `%p' the destination port, `%r' by the remote | 75 | If the command returns a zero exit status then the condition is |
75 | login username, and `%u' by the username of the user running | 76 | considered true. Commands containing whitespace characters must |
76 | ssh(1). | 77 | be quoted. The following character sequences in the command will |
78 | be expanded prior to execution: M-bM-^@M-^X%LM-bM-^@M-^Y will be substituted by the | ||
79 | first component of the local host name, M-bM-^@M-^X%lM-bM-^@M-^Y will be substituted | ||
80 | by the local host name (including any domain name), M-bM-^@M-^X%hM-bM-^@M-^Y will be | ||
81 | substituted by the target host name, M-bM-^@M-^X%nM-bM-^@M-^Y will be substituted by | ||
82 | the original target host name specified on the command-line, M-bM-^@M-^X%pM-bM-^@M-^Y | ||
83 | the destination port, M-bM-^@M-^X%rM-bM-^@M-^Y by the remote login username, and M-bM-^@M-^X%uM-bM-^@M-^Y | ||
84 | by the username of the user running ssh(1). | ||
77 | 85 | ||
78 | The other keywords' criteria must be single entries or comma- | 86 | The other keywords' criteria must be single entries or comma- |
79 | separated lists and may use the wildcard and negation operators | 87 | separated lists and may use the wildcard and negation operators |
80 | described in the PATTERNS section. The criteria for the host | 88 | described in the PATTERNS section. The criteria for the host |
81 | keyword are matched against the target hostname, after any | 89 | keyword are matched against the target hostname, after any |
82 | substitution by the Hostname option. The originalhost keyword | 90 | substitution by the Hostname or CanonicalizeHostname options. |
83 | matches against the hostname as it was specified on the command- | 91 | The originalhost keyword matches against the hostname as it was |
84 | line. The user keyword matches against the target username on | 92 | specified on the command-line. The user keyword matches against |
85 | the remote host. The localuser keyword matches against the name | 93 | the target username on the remote host. The localuser keyword |
86 | of the local user running ssh(1) (this keyword may be useful in | 94 | matches against the name of the local user running ssh(1) (this |
87 | system-wide ssh_config files). | 95 | keyword may be useful in system-wide ssh_config files). |
88 | 96 | ||
89 | AddressFamily | 97 | AddressFamily |
90 | Specifies which address family to use when connecting. Valid | 98 | Specifies which address family to use when connecting. Valid |
91 | arguments are ``any'', ``inet'' (use IPv4 only), or ``inet6'' | 99 | arguments are M-bM-^@M-^\anyM-bM-^@M-^], M-bM-^@M-^\inetM-bM-^@M-^] (use IPv4 only), or M-bM-^@M-^\inet6M-bM-^@M-^] (use IPv6 |
92 | (use IPv6 only). | 100 | only). |
93 | 101 | ||
94 | BatchMode | 102 | BatchMode |
95 | If set to ``yes'', passphrase/password querying will be disabled. | 103 | If set to M-bM-^@M-^\yesM-bM-^@M-^], passphrase/password querying will be disabled. |
96 | This option is useful in scripts and other batch jobs where no | 104 | This option is useful in scripts and other batch jobs where no |
97 | user is present to supply the password. The argument must be | 105 | user is present to supply the password. The argument must be |
98 | ``yes'' or ``no''. The default is ``no''. | 106 | M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The default is M-bM-^@M-^\noM-bM-^@M-^]. |
99 | 107 | ||
100 | BindAddress | 108 | BindAddress |
101 | Use the specified address on the local machine as the source | 109 | Use the specified address on the local machine as the source |
102 | address of the connection. Only useful on systems with more than | 110 | address of the connection. Only useful on systems with more than |
103 | one address. Note that this option does not work if | 111 | one address. Note that this option does not work if |
104 | UsePrivilegedPort is set to ``yes''. | 112 | UsePrivilegedPort is set to M-bM-^@M-^\yesM-bM-^@M-^]. |
105 | 113 | ||
106 | CanonicalDomains | 114 | CanonicalDomains |
107 | When CanonicalizeHostname is enabled, this option specifies the | 115 | When CanonicalizeHostname is enabled, this option specifies the |
@@ -110,33 +118,31 @@ DESCRIPTION | |||
110 | 118 | ||
111 | CanonicalizeFallbackLocal | 119 | CanonicalizeFallbackLocal |
112 | Specifies whether to fail with an error when hostname | 120 | Specifies whether to fail with an error when hostname |
113 | canonicalization fails. The default, ``yes'', will attempt to | 121 | canonicalization fails. The default, M-bM-^@M-^\yesM-bM-^@M-^], will attempt to look |
114 | look up the unqualified hostname using the system resolver's | 122 | up the unqualified hostname using the system resolver's search |
115 | search rules. A value of ``no'' will cause ssh(1) to fail | 123 | rules. A value of M-bM-^@M-^\noM-bM-^@M-^] will cause ssh(1) to fail instantly if |
116 | instantly if CanonicalizeHostname is enabled and the target | 124 | CanonicalizeHostname is enabled and the target hostname cannot be |
117 | hostname cannot be found in any of the domains specified by | 125 | found in any of the domains specified by CanonicalDomains. |
118 | CanonicalDomains. | ||
119 | 126 | ||
120 | CanonicalizeHostname | 127 | CanonicalizeHostname |
121 | Controls whether explicit hostname canonicalization is performed. | 128 | Controls whether explicit hostname canonicalization is performed. |
122 | The default, ``no'', is not to perform any name rewriting and let | 129 | The default, M-bM-^@M-^\noM-bM-^@M-^], is not to perform any name rewriting and let |
123 | the system resolver handle all hostname lookups. If set to | 130 | the system resolver handle all hostname lookups. If set to M-bM-^@M-^\yesM-bM-^@M-^] |
124 | ``yes'' then, for connections that do not use a ProxyCommand, | 131 | then, for connections that do not use a ProxyCommand, ssh(1) will |
125 | ssh(1) will attempt to canonicalize the hostname specified on the | 132 | attempt to canonicalize the hostname specified on the command |
126 | command line using the CanonicalDomains suffixes and | 133 | line using the CanonicalDomains suffixes and |
127 | CanonicalizePermittedCNAMEs rules. If CanonicalizeHostname is | 134 | CanonicalizePermittedCNAMEs rules. If CanonicalizeHostname is |
128 | set to ``always'', then canonicalization is applied to proxied | 135 | set to M-bM-^@M-^\alwaysM-bM-^@M-^], then canonicalization is applied to proxied |
129 | connections too. | 136 | connections too. |
130 | 137 | ||
131 | If this option is enabled and canonicalisation results in the | 138 | If this option is enabled, then the configuration files are |
132 | target hostname changing, then the configuration files are | ||
133 | processed again using the new target name to pick up any new | 139 | processed again using the new target name to pick up any new |
134 | configuration in matching Host stanzas. | 140 | configuration in matching Host and Match stanzas. |
135 | 141 | ||
136 | CanonicalizeMaxDots | 142 | CanonicalizeMaxDots |
137 | Specifies the maximum number of dot characters in a hostname | 143 | Specifies the maximum number of dot characters in a hostname |
138 | before canonicalization is disabled. The default, ``1'', allows | 144 | before canonicalization is disabled. The default, M-bM-^@M-^\1M-bM-^@M-^], allows a |
139 | a single dot (i.e. hostname.subdomain). | 145 | single dot (i.e. hostname.subdomain). |
140 | 146 | ||
141 | CanonicalizePermittedCNAMEs | 147 | CanonicalizePermittedCNAMEs |
142 | Specifies rules to determine whether CNAMEs should be followed | 148 | Specifies rules to determine whether CNAMEs should be followed |
@@ -146,30 +152,29 @@ DESCRIPTION | |||
146 | CNAMEs in canonicalization, and target_domain_list is a pattern- | 152 | CNAMEs in canonicalization, and target_domain_list is a pattern- |
147 | list of domains that they may resolve to. | 153 | list of domains that they may resolve to. |
148 | 154 | ||
149 | For example, ``*.a.example.com:*.b.example.com,*.c.example.com'' | 155 | For example, M-bM-^@M-^\*.a.example.com:*.b.example.com,*.c.example.comM-bM-^@M-^] |
150 | will allow hostnames matching ``*.a.example.com'' to be | 156 | will allow hostnames matching M-bM-^@M-^\*.a.example.comM-bM-^@M-^] to be |
151 | canonicalized to names in the ``*.b.example.com'' or | 157 | canonicalized to names in the M-bM-^@M-^\*.b.example.comM-bM-^@M-^] or |
152 | ``*.c.example.com'' domains. | 158 | M-bM-^@M-^\*.c.example.comM-bM-^@M-^] domains. |
153 | 159 | ||
154 | ChallengeResponseAuthentication | 160 | ChallengeResponseAuthentication |
155 | Specifies whether to use challenge-response authentication. The | 161 | Specifies whether to use challenge-response authentication. The |
156 | argument to this keyword must be ``yes'' or ``no''. The default | 162 | argument to this keyword must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The default is |
157 | is ``yes''. | 163 | M-bM-^@M-^\yesM-bM-^@M-^]. |
158 | 164 | ||
159 | CheckHostIP | 165 | CheckHostIP |
160 | If this flag is set to ``yes'', ssh(1) will additionally check | 166 | If this flag is set to M-bM-^@M-^\yesM-bM-^@M-^], ssh(1) will additionally check the |
161 | the host IP address in the known_hosts file. This allows ssh to | 167 | host IP address in the known_hosts file. This allows ssh to |
162 | detect if a host key changed due to DNS spoofing. If the option | 168 | detect if a host key changed due to DNS spoofing. If the option |
163 | is set to ``no'', the check will not be executed. The default is | 169 | is set to M-bM-^@M-^\noM-bM-^@M-^], the check will not be executed. The default is |
164 | ``yes''. | 170 | M-bM-^@M-^\yesM-bM-^@M-^]. |
165 | 171 | ||
166 | Cipher Specifies the cipher to use for encrypting the session in | 172 | Cipher Specifies the cipher to use for encrypting the session in |
167 | protocol version 1. Currently, ``blowfish'', ``3des'', and | 173 | protocol version 1. Currently, M-bM-^@M-^\blowfishM-bM-^@M-^], M-bM-^@M-^\3desM-bM-^@M-^], and M-bM-^@M-^\desM-bM-^@M-^] are |
168 | ``des'' are supported. des is only supported in the ssh(1) | 174 | supported. des is only supported in the ssh(1) client for |
169 | client for interoperability with legacy protocol 1 | 175 | interoperability with legacy protocol 1 implementations that do |
170 | implementations that do not support the 3des cipher. Its use is | 176 | not support the 3des cipher. Its use is strongly discouraged due |
171 | strongly discouraged due to cryptographic weaknesses. The | 177 | to cryptographic weaknesses. The default is M-bM-^@M-^\3desM-bM-^@M-^]. |
172 | default is ``3des''. | ||
173 | 178 | ||
174 | Ciphers | 179 | Ciphers |
175 | Specifies the ciphers allowed for protocol version 2 in order of | 180 | Specifies the ciphers allowed for protocol version 2 in order of |
@@ -202,7 +207,7 @@ DESCRIPTION | |||
202 | aes192-cbc,aes256-cbc,arcfour | 207 | aes192-cbc,aes256-cbc,arcfour |
203 | 208 | ||
204 | The list of available ciphers may also be obtained using the -Q | 209 | The list of available ciphers may also be obtained using the -Q |
205 | option of ssh(1). | 210 | option of ssh(1) with an argument of M-bM-^@M-^\cipherM-bM-^@M-^]. |
206 | 211 | ||
207 | ClearAllForwardings | 212 | ClearAllForwardings |
208 | Specifies that all local, remote, and dynamic port forwardings | 213 | Specifies that all local, remote, and dynamic port forwardings |
@@ -210,12 +215,12 @@ DESCRIPTION | |||
210 | cleared. This option is primarily useful when used from the | 215 | cleared. This option is primarily useful when used from the |
211 | ssh(1) command line to clear port forwardings set in | 216 | ssh(1) command line to clear port forwardings set in |
212 | configuration files, and is automatically set by scp(1) and | 217 | configuration files, and is automatically set by scp(1) and |
213 | sftp(1). The argument must be ``yes'' or ``no''. The default is | 218 | sftp(1). The argument must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The default is |
214 | ``no''. | 219 | M-bM-^@M-^\noM-bM-^@M-^]. |
215 | 220 | ||
216 | Compression | 221 | Compression |
217 | Specifies whether to use compression. The argument must be | 222 | Specifies whether to use compression. The argument must be M-bM-^@M-^\yesM-bM-^@M-^] |
218 | ``yes'' or ``no''. The default is ``no''. | 223 | or M-bM-^@M-^\noM-bM-^@M-^]. The default is M-bM-^@M-^\noM-bM-^@M-^]. |
219 | 224 | ||
220 | CompressionLevel | 225 | CompressionLevel |
221 | Specifies the compression level to use if compression is enabled. | 226 | Specifies the compression level to use if compression is enabled. |
@@ -237,16 +242,16 @@ DESCRIPTION | |||
237 | 242 | ||
238 | ControlMaster | 243 | ControlMaster |
239 | Enables the sharing of multiple sessions over a single network | 244 | Enables the sharing of multiple sessions over a single network |
240 | connection. When set to ``yes'', ssh(1) will listen for | 245 | connection. When set to M-bM-^@M-^\yesM-bM-^@M-^], ssh(1) will listen for |
241 | connections on a control socket specified using the ControlPath | 246 | connections on a control socket specified using the ControlPath |
242 | argument. Additional sessions can connect to this socket using | 247 | argument. Additional sessions can connect to this socket using |
243 | the same ControlPath with ControlMaster set to ``no'' (the | 248 | the same ControlPath with ControlMaster set to M-bM-^@M-^\noM-bM-^@M-^] (the |
244 | default). These sessions will try to reuse the master instance's | 249 | default). These sessions will try to reuse the master instance's |
245 | network connection rather than initiating new ones, but will fall | 250 | network connection rather than initiating new ones, but will fall |
246 | back to connecting normally if the control socket does not exist, | 251 | back to connecting normally if the control socket does not exist, |
247 | or is not listening. | 252 | or is not listening. |
248 | 253 | ||
249 | Setting this to ``ask'' will cause ssh to listen for control | 254 | Setting this to M-bM-^@M-^\askM-bM-^@M-^] will cause ssh to listen for control |
250 | connections, but require confirmation using the SSH_ASKPASS | 255 | connections, but require confirmation using the SSH_ASKPASS |
251 | program before they are accepted (see ssh-add(1) for details). | 256 | program before they are accepted (see ssh-add(1) for details). |
252 | If the ControlPath cannot be opened, ssh will continue without | 257 | If the ControlPath cannot be opened, ssh will continue without |
@@ -259,40 +264,41 @@ DESCRIPTION | |||
259 | 264 | ||
260 | Two additional options allow for opportunistic multiplexing: try | 265 | Two additional options allow for opportunistic multiplexing: try |
261 | to use a master connection but fall back to creating a new one if | 266 | to use a master connection but fall back to creating a new one if |
262 | one does not already exist. These options are: ``auto'' and | 267 | one does not already exist. These options are: M-bM-^@M-^\autoM-bM-^@M-^] and |
263 | ``autoask''. The latter requires confirmation like the ``ask'' | 268 | M-bM-^@M-^\autoaskM-bM-^@M-^]. The latter requires confirmation like the M-bM-^@M-^\askM-bM-^@M-^] |
264 | option. | 269 | option. |
265 | 270 | ||
266 | ControlPath | 271 | ControlPath |
267 | Specify the path to the control socket used for connection | 272 | Specify the path to the control socket used for connection |
268 | sharing as described in the ControlMaster section above or the | 273 | sharing as described in the ControlMaster section above or the |
269 | string ``none'' to disable connection sharing. In the path, `%L' | 274 | string M-bM-^@M-^\noneM-bM-^@M-^] to disable connection sharing. In the path, M-bM-^@M-^X%LM-bM-^@M-^Y |
270 | will be substituted by the first component of the local host | 275 | will be substituted by the first component of the local host |
271 | name, `%l' will be substituted by the local host name (including | 276 | name, M-bM-^@M-^X%lM-bM-^@M-^Y will be substituted by the local host name (including |
272 | any domain name), `%h' will be substituted by the target host | 277 | any domain name), M-bM-^@M-^X%hM-bM-^@M-^Y will be substituted by the target host |
273 | name, `%n' will be substituted by the original target host name | 278 | name, M-bM-^@M-^X%nM-bM-^@M-^Y will be substituted by the original target host name |
274 | specified on the command line, `%p' the destination port, `%r' by | 279 | specified on the command line, M-bM-^@M-^X%pM-bM-^@M-^Y the destination port, M-bM-^@M-^X%rM-bM-^@M-^Y by |
275 | the remote login username, `%u' by the username of the user | 280 | the remote login username, M-bM-^@M-^X%uM-bM-^@M-^Y by the username of the user |
276 | running ssh(1), and `%C' by a hash of the concatenation: | 281 | running ssh(1), and M-bM-^@M-^X%CM-bM-^@M-^Y by a hash of the concatenation: |
277 | %l%h%p%r. It is recommended that any ControlPath used for | 282 | %l%h%p%r. It is recommended that any ControlPath used for |
278 | opportunistic connection sharing include at least %h, %p, and %r | 283 | opportunistic connection sharing include at least %h, %p, and %r |
279 | (or alternatively %C). This ensures that shared connections are | 284 | (or alternatively %C) and be placed in a directory that is not |
280 | uniquely identified. | 285 | writable by other users. This ensures that shared connections |
286 | are uniquely identified. | ||
281 | 287 | ||
282 | ControlPersist | 288 | ControlPersist |
283 | When used in conjunction with ControlMaster, specifies that the | 289 | When used in conjunction with ControlMaster, specifies that the |
284 | master connection should remain open in the background (waiting | 290 | master connection should remain open in the background (waiting |
285 | for future client connections) after the initial client | 291 | for future client connections) after the initial client |
286 | connection has been closed. If set to ``no'', then the master | 292 | connection has been closed. If set to M-bM-^@M-^\noM-bM-^@M-^], then the master |
287 | connection will not be placed into the background, and will close | 293 | connection will not be placed into the background, and will close |
288 | as soon as the initial client connection is closed. If set to | 294 | as soon as the initial client connection is closed. If set to |
289 | ``yes'', then the master connection will remain in the background | 295 | M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\0M-bM-^@M-^], then the master connection will remain in the |
290 | indefinitely (until killed or closed via a mechanism such as the | 296 | background indefinitely (until killed or closed via a mechanism |
291 | ssh(1) ``-O exit'' option). If set to a time in seconds, or a | 297 | such as the ssh(1) M-bM-^@M-^\-O exitM-bM-^@M-^] option). If set to a time in |
292 | time in any of the formats documented in sshd_config(5), then the | 298 | seconds, or a time in any of the formats documented in |
293 | backgrounded master connection will automatically terminate after | 299 | sshd_config(5), then the backgrounded master connection will |
294 | it has remained idle (with no client connections) for the | 300 | automatically terminate after it has remained idle (with no |
295 | specified time. | 301 | client connections) for the specified time. |
296 | 302 | ||
297 | DynamicForward | 303 | DynamicForward |
298 | Specifies that a TCP port on the local machine be forwarded over | 304 | Specifies that a TCP port on the local machine be forwarded over |
@@ -304,9 +310,9 @@ DESCRIPTION | |||
304 | the local port is bound in accordance with the GatewayPorts | 310 | the local port is bound in accordance with the GatewayPorts |
305 | setting. However, an explicit bind_address may be used to bind | 311 | setting. However, an explicit bind_address may be used to bind |
306 | the connection to a specific address. The bind_address of | 312 | the connection to a specific address. The bind_address of |
307 | ``localhost'' indicates that the listening port be bound for | 313 | M-bM-^@M-^\localhostM-bM-^@M-^] indicates that the listening port be bound for local |
308 | local use only, while an empty address or `*' indicates that the | 314 | use only, while an empty address or M-bM-^@M-^X*M-bM-^@M-^Y indicates that the port |
309 | port should be available from all interfaces. | 315 | should be available from all interfaces. |
310 | 316 | ||
311 | Currently the SOCKS4 and SOCKS5 protocols are supported, and | 317 | Currently the SOCKS4 and SOCKS5 protocols are supported, and |
312 | ssh(1) will act as a SOCKS server. Multiple forwardings may be | 318 | ssh(1) will act as a SOCKS server. Multiple forwardings may be |
@@ -314,30 +320,35 @@ DESCRIPTION | |||
314 | line. Only the superuser can forward privileged ports. | 320 | line. Only the superuser can forward privileged ports. |
315 | 321 | ||
316 | EnableSSHKeysign | 322 | EnableSSHKeysign |
317 | Setting this option to ``yes'' in the global client configuration | 323 | Setting this option to M-bM-^@M-^\yesM-bM-^@M-^] in the global client configuration |
318 | file /etc/ssh/ssh_config enables the use of the helper program | 324 | file /etc/ssh/ssh_config enables the use of the helper program |
319 | ssh-keysign(8) during HostbasedAuthentication. The argument must | 325 | ssh-keysign(8) during HostbasedAuthentication. The argument must |
320 | be ``yes'' or ``no''. The default is ``no''. This option should | 326 | be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The default is M-bM-^@M-^\noM-bM-^@M-^]. This option should be |
321 | be placed in the non-hostspecific section. See ssh-keysign(8) | 327 | placed in the non-hostspecific section. See ssh-keysign(8) for |
322 | for more information. | 328 | more information. |
323 | 329 | ||
324 | EscapeChar | 330 | EscapeChar |
325 | Sets the escape character (default: `~'). The escape character | 331 | Sets the escape character (default: M-bM-^@M-^X~M-bM-^@M-^Y). The escape character |
326 | can also be set on the command line. The argument should be a | 332 | can also be set on the command line. The argument should be a |
327 | single character, `^' followed by a letter, or ``none'' to | 333 | single character, M-bM-^@M-^X^M-bM-^@M-^Y followed by a letter, or M-bM-^@M-^\noneM-bM-^@M-^] to disable |
328 | disable the escape character entirely (making the connection | 334 | the escape character entirely (making the connection transparent |
329 | transparent for binary data). | 335 | for binary data). |
330 | 336 | ||
331 | ExitOnForwardFailure | 337 | ExitOnForwardFailure |
332 | Specifies whether ssh(1) should terminate the connection if it | 338 | Specifies whether ssh(1) should terminate the connection if it |
333 | cannot set up all requested dynamic, tunnel, local, and remote | 339 | cannot set up all requested dynamic, tunnel, local, and remote |
334 | port forwardings. The argument must be ``yes'' or ``no''. The | 340 | port forwardings. The argument must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The |
335 | default is ``no''. | 341 | default is M-bM-^@M-^\noM-bM-^@M-^]. |
342 | |||
343 | FingerprintHash | ||
344 | Specifies the hash algorithm used when displaying key | ||
345 | fingerprints. Valid options are: M-bM-^@M-^\md5M-bM-^@M-^] and M-bM-^@M-^\sha256M-bM-^@M-^]. The | ||
346 | default is M-bM-^@M-^\sha256M-bM-^@M-^]. | ||
336 | 347 | ||
337 | ForwardAgent | 348 | ForwardAgent |
338 | Specifies whether the connection to the authentication agent (if | 349 | Specifies whether the connection to the authentication agent (if |
339 | any) will be forwarded to the remote machine. The argument must | 350 | any) will be forwarded to the remote machine. The argument must |
340 | be ``yes'' or ``no''. The default is ``no''. | 351 | be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The default is M-bM-^@M-^\noM-bM-^@M-^]. |
341 | 352 | ||
342 | Agent forwarding should be enabled with caution. Users with the | 353 | Agent forwarding should be enabled with caution. Users with the |
343 | ability to bypass file permissions on the remote host (for the | 354 | ability to bypass file permissions on the remote host (for the |
@@ -350,7 +361,7 @@ DESCRIPTION | |||
350 | ForwardX11 | 361 | ForwardX11 |
351 | Specifies whether X11 connections will be automatically | 362 | Specifies whether X11 connections will be automatically |
352 | redirected over the secure channel and DISPLAY set. The argument | 363 | redirected over the secure channel and DISPLAY set. The argument |
353 | must be ``yes'' or ``no''. The default is ``no''. | 364 | must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The default is M-bM-^@M-^\noM-bM-^@M-^]. |
354 | 365 | ||
355 | X11 forwarding should be enabled with caution. Users with the | 366 | X11 forwarding should be enabled with caution. Users with the |
356 | ability to bypass file permissions on the remote host (for the | 367 | ability to bypass file permissions on the remote host (for the |
@@ -367,17 +378,17 @@ DESCRIPTION | |||
367 | minutes has elapsed. | 378 | minutes has elapsed. |
368 | 379 | ||
369 | ForwardX11Trusted | 380 | ForwardX11Trusted |
370 | If this option is set to ``yes'', remote X11 clients will have | 381 | If this option is set to M-bM-^@M-^\yesM-bM-^@M-^], remote X11 clients will have full |
371 | full access to the original X11 display. | 382 | access to the original X11 display. |
372 | 383 | ||
373 | If this option is set to ``no'', remote X11 clients will be | 384 | If this option is set to M-bM-^@M-^\noM-bM-^@M-^], remote X11 clients will be |
374 | considered untrusted and prevented from stealing or tampering | 385 | considered untrusted and prevented from stealing or tampering |
375 | with data belonging to trusted X11 clients. Furthermore, the | 386 | with data belonging to trusted X11 clients. Furthermore, the |
376 | xauth(1) token used for the session will be set to expire after | 387 | xauth(1) token used for the session will be set to expire after |
377 | 20 minutes. Remote clients will be refused access after this | 388 | 20 minutes. Remote clients will be refused access after this |
378 | time. | 389 | time. |
379 | 390 | ||
380 | The default is ``no''. | 391 | The default is M-bM-^@M-^\noM-bM-^@M-^]. |
381 | 392 | ||
382 | See the X11 SECURITY extension specification for full details on | 393 | See the X11 SECURITY extension specification for full details on |
383 | the restrictions imposed on untrusted clients. | 394 | the restrictions imposed on untrusted clients. |
@@ -389,8 +400,8 @@ DESCRIPTION | |||
389 | connecting to forwarded ports. GatewayPorts can be used to | 400 | connecting to forwarded ports. GatewayPorts can be used to |
390 | specify that ssh should bind local port forwardings to the | 401 | specify that ssh should bind local port forwardings to the |
391 | wildcard address, thus allowing remote hosts to connect to | 402 | wildcard address, thus allowing remote hosts to connect to |
392 | forwarded ports. The argument must be ``yes'' or ``no''. The | 403 | forwarded ports. The argument must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The |
393 | default is ``no''. | 404 | default is M-bM-^@M-^\noM-bM-^@M-^]. |
394 | 405 | ||
395 | GlobalKnownHostsFile | 406 | GlobalKnownHostsFile |
396 | Specifies one or more files to use for the global host key | 407 | Specifies one or more files to use for the global host key |
@@ -399,28 +410,33 @@ DESCRIPTION | |||
399 | 410 | ||
400 | GSSAPIAuthentication | 411 | GSSAPIAuthentication |
401 | Specifies whether user authentication based on GSSAPI is allowed. | 412 | Specifies whether user authentication based on GSSAPI is allowed. |
402 | The default is ``no''. Note that this option applies to protocol | 413 | The default is M-bM-^@M-^\noM-bM-^@M-^]. Note that this option applies to protocol |
403 | version 2 only. | 414 | version 2 only. |
404 | 415 | ||
405 | GSSAPIDelegateCredentials | 416 | GSSAPIDelegateCredentials |
406 | Forward (delegate) credentials to the server. The default is | 417 | Forward (delegate) credentials to the server. The default is |
407 | ``no''. Note that this option applies to protocol version 2 | 418 | M-bM-^@M-^\noM-bM-^@M-^]. Note that this option applies to protocol version 2 only. |
408 | only. | ||
409 | 419 | ||
410 | HashKnownHosts | 420 | HashKnownHosts |
411 | Indicates that ssh(1) should hash host names and addresses when | 421 | Indicates that ssh(1) should hash host names and addresses when |
412 | they are added to ~/.ssh/known_hosts. These hashed names may be | 422 | they are added to ~/.ssh/known_hosts. These hashed names may be |
413 | used normally by ssh(1) and sshd(8), but they do not reveal | 423 | used normally by ssh(1) and sshd(8), but they do not reveal |
414 | identifying information should the file's contents be disclosed. | 424 | identifying information should the file's contents be disclosed. |
415 | The default is ``no''. Note that existing names and addresses in | 425 | The default is M-bM-^@M-^\noM-bM-^@M-^]. Note that existing names and addresses in |
416 | known hosts files will not be converted automatically, but may be | 426 | known hosts files will not be converted automatically, but may be |
417 | manually hashed using ssh-keygen(1). | 427 | manually hashed using ssh-keygen(1). |
418 | 428 | ||
419 | HostbasedAuthentication | 429 | HostbasedAuthentication |
420 | Specifies whether to try rhosts based authentication with public | 430 | Specifies whether to try rhosts based authentication with public |
421 | key authentication. The argument must be ``yes'' or ``no''. The | 431 | key authentication. The argument must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The |
422 | default is ``no''. This option applies to protocol version 2 | 432 | default is M-bM-^@M-^\noM-bM-^@M-^]. This option applies to protocol version 2 only |
423 | only and is similar to RhostsRSAAuthentication. | 433 | and is similar to RhostsRSAAuthentication. |
434 | |||
435 | HostbasedKeyTypes | ||
436 | Specifies the key types that will be used for hostbased | ||
437 | authentication as a comma-separated pattern list. The default | ||
438 | M-bM-^@M-^\*M-bM-^@M-^] will allow all key types. The -Q option of ssh(1) may be | ||
439 | used to list supported key types. | ||
424 | 440 | ||
425 | HostKeyAlgorithms | 441 | HostKeyAlgorithms |
426 | Specifies the protocol version 2 host key algorithms that the | 442 | Specifies the protocol version 2 host key algorithms that the |
@@ -439,6 +455,9 @@ DESCRIPTION | |||
439 | If hostkeys are known for the destination host then this default | 455 | If hostkeys are known for the destination host then this default |
440 | is modified to prefer their algorithms. | 456 | is modified to prefer their algorithms. |
441 | 457 | ||
458 | The list of available key types may also be obtained using the -Q | ||
459 | option of ssh(1) with an argument of M-bM-^@M-^\keyM-bM-^@M-^]. | ||
460 | |||
442 | HostKeyAlias | 461 | HostKeyAlias |
443 | Specifies an alias that should be used instead of the real host | 462 | Specifies an alias that should be used instead of the real host |
444 | name when looking up or saving the host key in the host key | 463 | name when looking up or saving the host key in the host key |
@@ -448,10 +467,10 @@ DESCRIPTION | |||
448 | HostName | 467 | HostName |
449 | Specifies the real host name to log into. This can be used to | 468 | Specifies the real host name to log into. This can be used to |
450 | specify nicknames or abbreviations for hosts. If the hostname | 469 | specify nicknames or abbreviations for hosts. If the hostname |
451 | contains the character sequence `%h', then this will be replaced | 470 | contains the character sequence M-bM-^@M-^X%hM-bM-^@M-^Y, then this will be replaced |
452 | with the host name specified on the command line (this is useful | 471 | with the host name specified on the command line (this is useful |
453 | for manipulating unqualified names). The character sequence `%%' | 472 | for manipulating unqualified names). The character sequence M-bM-^@M-^X%%M-bM-^@M-^Y |
454 | will be replaced by a single `%' character, which may be used | 473 | will be replaced by a single M-bM-^@M-^X%M-bM-^@M-^Y character, which may be used |
455 | when specifying IPv6 link-local addresses. | 474 | when specifying IPv6 link-local addresses. |
456 | 475 | ||
457 | The default is the name given on the command line. Numeric IP | 476 | The default is the name given on the command line. Numeric IP |
@@ -462,12 +481,12 @@ DESCRIPTION | |||
462 | Specifies that ssh(1) should only use the authentication identity | 481 | Specifies that ssh(1) should only use the authentication identity |
463 | files configured in the ssh_config files, even if ssh-agent(1) or | 482 | files configured in the ssh_config files, even if ssh-agent(1) or |
464 | a PKCS11Provider offers more identities. The argument to this | 483 | a PKCS11Provider offers more identities. The argument to this |
465 | keyword must be ``yes'' or ``no''. This option is intended for | 484 | keyword must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. This option is intended for |
466 | situations where ssh-agent offers many different identities. The | 485 | situations where ssh-agent offers many different identities. The |
467 | default is ``no''. | 486 | default is M-bM-^@M-^\noM-bM-^@M-^]. |
468 | 487 | ||
469 | IdentityFile | 488 | IdentityFile |
470 | Specifies a file from which the user's DSA, ECDSA, ED25519 or RSA | 489 | Specifies a file from which the user's DSA, ECDSA, Ed25519 or RSA |
471 | authentication identity is read. The default is ~/.ssh/identity | 490 | authentication identity is read. The default is ~/.ssh/identity |
472 | for protocol version 1, and ~/.ssh/id_dsa, ~/.ssh/id_ecdsa, | 491 | for protocol version 1, and ~/.ssh/id_dsa, ~/.ssh/id_ecdsa, |
473 | ~/.ssh/id_ed25519 and ~/.ssh/id_rsa for protocol version 2. | 492 | ~/.ssh/id_ed25519 and ~/.ssh/id_rsa for protocol version 2. |
@@ -478,9 +497,9 @@ DESCRIPTION | |||
478 | specified IdentityFile. | 497 | specified IdentityFile. |
479 | 498 | ||
480 | The file name may use the tilde syntax to refer to a user's home | 499 | The file name may use the tilde syntax to refer to a user's home |
481 | directory or one of the following escape characters: `%d' (local | 500 | directory or one of the following escape characters: M-bM-^@M-^X%dM-bM-^@M-^Y (local |
482 | user's home directory), `%u' (local user name), `%l' (local host | 501 | user's home directory), M-bM-^@M-^X%uM-bM-^@M-^Y (local user name), M-bM-^@M-^X%lM-bM-^@M-^Y (local host |
483 | name), `%h' (remote host name) or `%r' (remote user name). | 502 | name), M-bM-^@M-^X%hM-bM-^@M-^Y (remote host name) or M-bM-^@M-^X%rM-bM-^@M-^Y (remote user name). |
484 | 503 | ||
485 | It is possible to have multiple identity files specified in | 504 | It is possible to have multiple identity files specified in |
486 | configuration files; all these identities will be tried in | 505 | configuration files; all these identities will be tried in |
@@ -501,30 +520,30 @@ DESCRIPTION | |||
501 | to unknown options that appear before it. | 520 | to unknown options that appear before it. |
502 | 521 | ||
503 | IPQoS Specifies the IPv4 type-of-service or DSCP class for connections. | 522 | IPQoS Specifies the IPv4 type-of-service or DSCP class for connections. |
504 | Accepted values are ``af11'', ``af12'', ``af13'', ``af21'', | 523 | Accepted values are M-bM-^@M-^\af11M-bM-^@M-^], M-bM-^@M-^\af12M-bM-^@M-^], M-bM-^@M-^\af13M-bM-^@M-^], M-bM-^@M-^\af21M-bM-^@M-^], M-bM-^@M-^\af22M-bM-^@M-^], |
505 | ``af22'', ``af23'', ``af31'', ``af32'', ``af33'', ``af41'', | 524 | M-bM-^@M-^\af23M-bM-^@M-^], M-bM-^@M-^\af31M-bM-^@M-^], M-bM-^@M-^\af32M-bM-^@M-^], M-bM-^@M-^\af33M-bM-^@M-^], M-bM-^@M-^\af41M-bM-^@M-^], M-bM-^@M-^\af42M-bM-^@M-^], M-bM-^@M-^\af43M-bM-^@M-^], M-bM-^@M-^\cs0M-bM-^@M-^], |
506 | ``af42'', ``af43'', ``cs0'', ``cs1'', ``cs2'', ``cs3'', ``cs4'', | 525 | M-bM-^@M-^\cs1M-bM-^@M-^], M-bM-^@M-^\cs2M-bM-^@M-^], M-bM-^@M-^\cs3M-bM-^@M-^], M-bM-^@M-^\cs4M-bM-^@M-^], M-bM-^@M-^\cs5M-bM-^@M-^], M-bM-^@M-^\cs6M-bM-^@M-^], M-bM-^@M-^\cs7M-bM-^@M-^], M-bM-^@M-^\efM-bM-^@M-^], |
507 | ``cs5'', ``cs6'', ``cs7'', ``ef'', ``lowdelay'', ``throughput'', | 526 | M-bM-^@M-^\lowdelayM-bM-^@M-^], M-bM-^@M-^\throughputM-bM-^@M-^], M-bM-^@M-^\reliabilityM-bM-^@M-^], or a numeric value. |
508 | ``reliability'', or a numeric value. This option may take one or | 527 | This option may take one or two arguments, separated by |
509 | two arguments, separated by whitespace. If one argument is | 528 | whitespace. If one argument is specified, it is used as the |
510 | specified, it is used as the packet class unconditionally. If | 529 | packet class unconditionally. If two values are specified, the |
511 | two values are specified, the first is automatically selected for | 530 | first is automatically selected for interactive sessions and the |
512 | interactive sessions and the second for non-interactive sessions. | 531 | second for non-interactive sessions. The default is M-bM-^@M-^\lowdelayM-bM-^@M-^] |
513 | The default is ``lowdelay'' for interactive sessions and | 532 | for interactive sessions and M-bM-^@M-^\throughputM-bM-^@M-^] for non-interactive |
514 | ``throughput'' for non-interactive sessions. | 533 | sessions. |
515 | 534 | ||
516 | KbdInteractiveAuthentication | 535 | KbdInteractiveAuthentication |
517 | Specifies whether to use keyboard-interactive authentication. | 536 | Specifies whether to use keyboard-interactive authentication. |
518 | The argument to this keyword must be ``yes'' or ``no''. The | 537 | The argument to this keyword must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The default |
519 | default is ``yes''. | 538 | is M-bM-^@M-^\yesM-bM-^@M-^]. |
520 | 539 | ||
521 | KbdInteractiveDevices | 540 | KbdInteractiveDevices |
522 | Specifies the list of methods to use in keyboard-interactive | 541 | Specifies the list of methods to use in keyboard-interactive |
523 | authentication. Multiple method names must be comma-separated. | 542 | authentication. Multiple method names must be comma-separated. |
524 | The default is to use the server specified list. The methods | 543 | The default is to use the server specified list. The methods |
525 | available vary depending on what the server supports. For an | 544 | available vary depending on what the server supports. For an |
526 | OpenSSH server, it may be zero or more of: ``bsdauth'', ``pam'', | 545 | OpenSSH server, it may be zero or more of: M-bM-^@M-^\bsdauthM-bM-^@M-^], M-bM-^@M-^\pamM-bM-^@M-^], and |
527 | and ``skey''. | 546 | M-bM-^@M-^\skeyM-bM-^@M-^]. |
528 | 547 | ||
529 | KexAlgorithms | 548 | KexAlgorithms |
530 | Specifies the available KEX (Key Exchange) algorithms. Multiple | 549 | Specifies the available KEX (Key Exchange) algorithms. Multiple |
@@ -537,15 +556,18 @@ DESCRIPTION | |||
537 | diffie-hellman-group-exchange-sha1, | 556 | diffie-hellman-group-exchange-sha1, |
538 | diffie-hellman-group1-sha1 | 557 | diffie-hellman-group1-sha1 |
539 | 558 | ||
559 | The list of available key exchange algorithms may also be | ||
560 | obtained using the -Q option of ssh(1) with an argument of M-bM-^@M-^\kexM-bM-^@M-^]. | ||
561 | |||
540 | LocalCommand | 562 | LocalCommand |
541 | Specifies a command to execute on the local machine after | 563 | Specifies a command to execute on the local machine after |
542 | successfully connecting to the server. The command string | 564 | successfully connecting to the server. The command string |
543 | extends to the end of the line, and is executed with the user's | 565 | extends to the end of the line, and is executed with the user's |
544 | shell. The following escape character substitutions will be | 566 | shell. The following escape character substitutions will be |
545 | performed: `%d' (local user's home directory), `%h' (remote host | 567 | performed: M-bM-^@M-^X%dM-bM-^@M-^Y (local user's home directory), M-bM-^@M-^X%hM-bM-^@M-^Y (remote host |
546 | name), `%l' (local host name), `%n' (host name as provided on the | 568 | name), M-bM-^@M-^X%lM-bM-^@M-^Y (local host name), M-bM-^@M-^X%nM-bM-^@M-^Y (host name as provided on the |
547 | command line), `%p' (remote port), `%r' (remote user name) or | 569 | command line), M-bM-^@M-^X%pM-bM-^@M-^Y (remote port), M-bM-^@M-^X%rM-bM-^@M-^Y (remote user name) or |
548 | `%u' (local user name) or `%C' by a hash of the concatenation: | 570 | M-bM-^@M-^X%uM-bM-^@M-^Y (local user name) or M-bM-^@M-^X%CM-bM-^@M-^Y by a hash of the concatenation: |
549 | %l%h%p%r. | 571 | %l%h%p%r. |
550 | 572 | ||
551 | The command is run synchronously and does not have access to the | 573 | The command is run synchronously and does not have access to the |
@@ -566,9 +588,9 @@ DESCRIPTION | |||
566 | privileged ports. By default, the local port is bound in | 588 | privileged ports. By default, the local port is bound in |
567 | accordance with the GatewayPorts setting. However, an explicit | 589 | accordance with the GatewayPorts setting. However, an explicit |
568 | bind_address may be used to bind the connection to a specific | 590 | bind_address may be used to bind the connection to a specific |
569 | address. The bind_address of ``localhost'' indicates that the | 591 | address. The bind_address of M-bM-^@M-^\localhostM-bM-^@M-^] indicates that the |
570 | listening port be bound for local use only, while an empty | 592 | listening port be bound for local use only, while an empty |
571 | address or `*' indicates that the port should be available from | 593 | address or M-bM-^@M-^X*M-bM-^@M-^Y indicates that the port should be available from |
572 | all interfaces. | 594 | all interfaces. |
573 | 595 | ||
574 | LogLevel | 596 | LogLevel |
@@ -581,7 +603,7 @@ DESCRIPTION | |||
581 | MACs Specifies the MAC (message authentication code) algorithms in | 603 | MACs Specifies the MAC (message authentication code) algorithms in |
582 | order of preference. The MAC algorithm is used in protocol | 604 | order of preference. The MAC algorithm is used in protocol |
583 | version 2 for data integrity protection. Multiple algorithms | 605 | version 2 for data integrity protection. Multiple algorithms |
584 | must be comma-separated. The algorithms that contain ``-etm'' | 606 | must be comma-separated. The algorithms that contain M-bM-^@M-^\-etmM-bM-^@M-^] |
585 | calculate the MAC after encryption (encrypt-then-mac). These are | 607 | calculate the MAC after encryption (encrypt-then-mac). These are |
586 | considered safer and their use recommended. The default is: | 608 | considered safer and their use recommended. The default is: |
587 | 609 | ||
@@ -595,14 +617,17 @@ DESCRIPTION | |||
595 | hmac-md5,hmac-sha1,hmac-ripemd160, | 617 | hmac-md5,hmac-sha1,hmac-ripemd160, |
596 | hmac-sha1-96,hmac-md5-96 | 618 | hmac-sha1-96,hmac-md5-96 |
597 | 619 | ||
620 | The list of available MAC algorithms may also be obtained using | ||
621 | the -Q option of ssh(1) with an argument of M-bM-^@M-^\macM-bM-^@M-^]. | ||
622 | |||
598 | NoHostAuthenticationForLocalhost | 623 | NoHostAuthenticationForLocalhost |
599 | This option can be used if the home directory is shared across | 624 | This option can be used if the home directory is shared across |
600 | machines. In this case localhost will refer to a different | 625 | machines. In this case localhost will refer to a different |
601 | machine on each of the machines and the user will get many | 626 | machine on each of the machines and the user will get many |
602 | warnings about changed host keys. However, this option disables | 627 | warnings about changed host keys. However, this option disables |
603 | host authentication for localhost. The argument to this keyword | 628 | host authentication for localhost. The argument to this keyword |
604 | must be ``yes'' or ``no''. The default is to check the host key | 629 | must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The default is to check the host key for |
605 | for localhost. | 630 | localhost. |
606 | 631 | ||
607 | NumberOfPasswordPrompts | 632 | NumberOfPasswordPrompts |
608 | Specifies the number of password prompts before giving up. The | 633 | Specifies the number of password prompts before giving up. The |
@@ -610,13 +635,12 @@ DESCRIPTION | |||
610 | 635 | ||
611 | PasswordAuthentication | 636 | PasswordAuthentication |
612 | Specifies whether to use password authentication. The argument | 637 | Specifies whether to use password authentication. The argument |
613 | to this keyword must be ``yes'' or ``no''. The default is | 638 | to this keyword must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The default is M-bM-^@M-^\yesM-bM-^@M-^]. |
614 | ``yes''. | ||
615 | 639 | ||
616 | PermitLocalCommand | 640 | PermitLocalCommand |
617 | Allow local command execution via the LocalCommand option or | 641 | Allow local command execution via the LocalCommand option or |
618 | using the !command escape sequence in ssh(1). The argument must | 642 | using the !command escape sequence in ssh(1). The argument must |
619 | be ``yes'' or ``no''. The default is ``no''. | 643 | be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The default is M-bM-^@M-^\noM-bM-^@M-^]. |
620 | 644 | ||
621 | PKCS11Provider | 645 | PKCS11Provider |
622 | Specifies which PKCS#11 provider to use. The argument to this | 646 | Specifies which PKCS#11 provider to use. The argument to this |
@@ -638,26 +662,26 @@ DESCRIPTION | |||
638 | 662 | ||
639 | Protocol | 663 | Protocol |
640 | Specifies the protocol versions ssh(1) should support in order of | 664 | Specifies the protocol versions ssh(1) should support in order of |
641 | preference. The possible values are `1' and `2'. Multiple | 665 | preference. The possible values are M-bM-^@M-^X1M-bM-^@M-^Y and M-bM-^@M-^X2M-bM-^@M-^Y. Multiple |
642 | versions must be comma-separated. When this option is set to | 666 | versions must be comma-separated. When this option is set to |
643 | ``2,1'' ssh will try version 2 and fall back to version 1 if | 667 | M-bM-^@M-^\2,1M-bM-^@M-^] ssh will try version 2 and fall back to version 1 if |
644 | version 2 is not available. The default is `2'. | 668 | version 2 is not available. The default is M-bM-^@M-^X2M-bM-^@M-^Y. |
645 | 669 | ||
646 | ProxyCommand | 670 | ProxyCommand |
647 | Specifies the command to use to connect to the server. The | 671 | Specifies the command to use to connect to the server. The |
648 | command string extends to the end of the line, and is executed | 672 | command string extends to the end of the line, and is executed |
649 | using the user's shell `exec' directive to avoid a lingering | 673 | using the user's shell M-bM-^@M-^XexecM-bM-^@M-^Y directive to avoid a lingering |
650 | shell process. | 674 | shell process. |
651 | 675 | ||
652 | In the command string, any occurrence of `%h' will be substituted | 676 | In the command string, any occurrence of M-bM-^@M-^X%hM-bM-^@M-^Y will be substituted |
653 | by the host name to connect, `%p' by the port, and `%r' by the | 677 | by the host name to connect, M-bM-^@M-^X%pM-bM-^@M-^Y by the port, and M-bM-^@M-^X%rM-bM-^@M-^Y by the |
654 | remote user name. The command can be basically anything, and | 678 | remote user name. The command can be basically anything, and |
655 | should read from its standard input and write to its standard | 679 | should read from its standard input and write to its standard |
656 | output. It should eventually connect an sshd(8) server running | 680 | output. It should eventually connect an sshd(8) server running |
657 | on some machine, or execute sshd -i somewhere. Host key | 681 | on some machine, or execute sshd -i somewhere. Host key |
658 | management will be done using the HostName of the host being | 682 | management will be done using the HostName of the host being |
659 | connected (defaulting to the name typed by the user). Setting | 683 | connected (defaulting to the name typed by the user). Setting |
660 | the command to ``none'' disables this option entirely. Note that | 684 | the command to M-bM-^@M-^\noneM-bM-^@M-^] disables this option entirely. Note that |
661 | CheckHostIP is not available for connects with a proxy command. | 685 | CheckHostIP is not available for connects with a proxy command. |
662 | 686 | ||
663 | This directive is useful in conjunction with nc(1) and its proxy | 687 | This directive is useful in conjunction with nc(1) and its proxy |
@@ -669,27 +693,27 @@ DESCRIPTION | |||
669 | ProxyUseFdpass | 693 | ProxyUseFdpass |
670 | Specifies that ProxyCommand will pass a connected file descriptor | 694 | Specifies that ProxyCommand will pass a connected file descriptor |
671 | back to ssh(1) instead of continuing to execute and pass data. | 695 | back to ssh(1) instead of continuing to execute and pass data. |
672 | The default is ``no''. | 696 | The default is M-bM-^@M-^\noM-bM-^@M-^]. |
673 | 697 | ||
674 | PubkeyAuthentication | 698 | PubkeyAuthentication |
675 | Specifies whether to try public key authentication. The argument | 699 | Specifies whether to try public key authentication. The argument |
676 | to this keyword must be ``yes'' or ``no''. The default is | 700 | to this keyword must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The default is M-bM-^@M-^\yesM-bM-^@M-^]. |
677 | ``yes''. This option applies to protocol version 2 only. | 701 | This option applies to protocol version 2 only. |
678 | 702 | ||
679 | RekeyLimit | 703 | RekeyLimit |
680 | Specifies the maximum amount of data that may be transmitted | 704 | Specifies the maximum amount of data that may be transmitted |
681 | before the session key is renegotiated, optionally followed a | 705 | before the session key is renegotiated, optionally followed a |
682 | maximum amount of time that may pass before the session key is | 706 | maximum amount of time that may pass before the session key is |
683 | renegotiated. The first argument is specified in bytes and may | 707 | renegotiated. The first argument is specified in bytes and may |
684 | have a suffix of `K', `M', or `G' to indicate Kilobytes, | 708 | have a suffix of M-bM-^@M-^XKM-bM-^@M-^Y, M-bM-^@M-^XMM-bM-^@M-^Y, or M-bM-^@M-^XGM-bM-^@M-^Y to indicate Kilobytes, |
685 | Megabytes, or Gigabytes, respectively. The default is between | 709 | Megabytes, or Gigabytes, respectively. The default is between |
686 | `1G' and `4G', depending on the cipher. The optional second | 710 | M-bM-^@M-^X1GM-bM-^@M-^Y and M-bM-^@M-^X4GM-bM-^@M-^Y, depending on the cipher. The optional second |
687 | value is specified in seconds and may use any of the units | 711 | value is specified in seconds and may use any of the units |
688 | documented in the TIME FORMATS section of sshd_config(5). The | 712 | documented in the TIME FORMATS section of sshd_config(5). The |
689 | default value for RekeyLimit is ``default none'', which means | 713 | default value for RekeyLimit is M-bM-^@M-^\default noneM-bM-^@M-^], which means that |
690 | that rekeying is performed after the cipher's default amount of | 714 | rekeying is performed after the cipher's default amount of data |
691 | data has been sent or received and no time based rekeying is | 715 | has been sent or received and no time based rekeying is done. |
692 | done. This option applies to protocol version 2 only. | 716 | This option applies to protocol version 2 only. |
693 | 717 | ||
694 | RemoteForward | 718 | RemoteForward |
695 | Specifies that a TCP port on the remote machine be forwarded over | 719 | Specifies that a TCP port on the remote machine be forwarded over |
@@ -701,11 +725,11 @@ DESCRIPTION | |||
701 | given on the command line. Privileged ports can be forwarded | 725 | given on the command line. Privileged ports can be forwarded |
702 | only when logging in as root on the remote machine. | 726 | only when logging in as root on the remote machine. |
703 | 727 | ||
704 | If the port argument is `0', the listen port will be dynamically | 728 | If the port argument is M-bM-^@M-^X0M-bM-^@M-^Y, the listen port will be dynamically |
705 | allocated on the server and reported to the client at run time. | 729 | allocated on the server and reported to the client at run time. |
706 | 730 | ||
707 | If the bind_address is not specified, the default is to only bind | 731 | If the bind_address is not specified, the default is to only bind |
708 | to loopback addresses. If the bind_address is `*' or an empty | 732 | to loopback addresses. If the bind_address is M-bM-^@M-^X*M-bM-^@M-^Y or an empty |
709 | string, then the forwarding is requested to listen on all | 733 | string, then the forwarding is requested to listen on all |
710 | interfaces. Specifying a remote bind_address will only succeed | 734 | interfaces. Specifying a remote bind_address will only succeed |
711 | if the server's GatewayPorts option is enabled (see | 735 | if the server's GatewayPorts option is enabled (see |
@@ -713,24 +737,32 @@ DESCRIPTION | |||
713 | 737 | ||
714 | RequestTTY | 738 | RequestTTY |
715 | Specifies whether to request a pseudo-tty for the session. The | 739 | Specifies whether to request a pseudo-tty for the session. The |
716 | argument may be one of: ``no'' (never request a TTY), ``yes'' | 740 | argument may be one of: M-bM-^@M-^\noM-bM-^@M-^] (never request a TTY), M-bM-^@M-^\yesM-bM-^@M-^] (always |
717 | (always request a TTY when standard input is a TTY), ``force'' | 741 | request a TTY when standard input is a TTY), M-bM-^@M-^\forceM-bM-^@M-^] (always |
718 | (always request a TTY) or ``auto'' (request a TTY when opening a | 742 | request a TTY) or M-bM-^@M-^\autoM-bM-^@M-^] (request a TTY when opening a login |
719 | login session). This option mirrors the -t and -T flags for | 743 | session). This option mirrors the -t and -T flags for ssh(1). |
720 | ssh(1). | 744 | |
745 | RevokedHostKeys | ||
746 | Specifies revoked host public keys. Keys listed in this file | ||
747 | will be refused for host authentication. Note that if this file | ||
748 | does not exist or is not readable, then host authentication will | ||
749 | be refused for all hosts. Keys may be specified as a text file, | ||
750 | listing one public key per line, or as an OpenSSH Key Revocation | ||
751 | List (KRL) as generated by ssh-keygen(1). For more information | ||
752 | on KRLs, see the KEY REVOCATION LISTS section in ssh-keygen(1). | ||
721 | 753 | ||
722 | RhostsRSAAuthentication | 754 | RhostsRSAAuthentication |
723 | Specifies whether to try rhosts based authentication with RSA | 755 | Specifies whether to try rhosts based authentication with RSA |
724 | host authentication. The argument must be ``yes'' or ``no''. | 756 | host authentication. The argument must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The |
725 | The default is ``no''. This option applies to protocol version 1 | 757 | default is M-bM-^@M-^\noM-bM-^@M-^]. This option applies to protocol version 1 only |
726 | only and requires ssh(1) to be setuid root. | 758 | and requires ssh(1) to be setuid root. |
727 | 759 | ||
728 | RSAAuthentication | 760 | RSAAuthentication |
729 | Specifies whether to try RSA authentication. The argument to | 761 | Specifies whether to try RSA authentication. The argument to |
730 | this keyword must be ``yes'' or ``no''. RSA authentication will | 762 | this keyword must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. RSA authentication will only |
731 | only be attempted if the identity file exists, or an | 763 | be attempted if the identity file exists, or an authentication |
732 | authentication agent is running. The default is ``yes''. Note | 764 | agent is running. The default is M-bM-^@M-^\yesM-bM-^@M-^]. Note that this option |
733 | that this option applies to protocol version 1 only. | 765 | applies to protocol version 1 only. |
734 | 766 | ||
735 | SendEnv | 767 | SendEnv |
736 | Specifies what variables from the local environ(7) should be sent | 768 | Specifies what variables from the local environ(7) should be sent |
@@ -790,24 +822,24 @@ DESCRIPTION | |||
790 | domain socket file. This option is only used for port forwarding | 822 | domain socket file. This option is only used for port forwarding |
791 | to a Unix-domain socket file. | 823 | to a Unix-domain socket file. |
792 | 824 | ||
793 | The argument must be ``yes'' or ``no''. The default is ``no''. | 825 | The argument must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The default is M-bM-^@M-^\noM-bM-^@M-^]. |
794 | 826 | ||
795 | StrictHostKeyChecking | 827 | StrictHostKeyChecking |
796 | If this flag is set to ``yes'', ssh(1) will never automatically | 828 | If this flag is set to M-bM-^@M-^\yesM-bM-^@M-^], ssh(1) will never automatically add |
797 | add host keys to the ~/.ssh/known_hosts file, and refuses to | 829 | host keys to the ~/.ssh/known_hosts file, and refuses to connect |
798 | connect to hosts whose host key has changed. This provides | 830 | to hosts whose host key has changed. This provides maximum |
799 | maximum protection against trojan horse attacks, though it can be | 831 | protection against trojan horse attacks, though it can be |
800 | annoying when the /etc/ssh/ssh_known_hosts file is poorly | 832 | annoying when the /etc/ssh/ssh_known_hosts file is poorly |
801 | maintained or when connections to new hosts are frequently made. | 833 | maintained or when connections to new hosts are frequently made. |
802 | This option forces the user to manually add all new hosts. If | 834 | This option forces the user to manually add all new hosts. If |
803 | this flag is set to ``no'', ssh will automatically add new host | 835 | this flag is set to M-bM-^@M-^\noM-bM-^@M-^], ssh will automatically add new host |
804 | keys to the user known hosts files. If this flag is set to | 836 | keys to the user known hosts files. If this flag is set to |
805 | ``ask'', new host keys will be added to the user known host files | 837 | M-bM-^@M-^\askM-bM-^@M-^], new host keys will be added to the user known host files |
806 | only after the user has confirmed that is what they really want | 838 | only after the user has confirmed that is what they really want |
807 | to do, and ssh will refuse to connect to hosts whose host key has | 839 | to do, and ssh will refuse to connect to hosts whose host key has |
808 | changed. The host keys of known hosts will be verified | 840 | changed. The host keys of known hosts will be verified |
809 | automatically in all cases. The argument must be ``yes'', | 841 | automatically in all cases. The argument must be M-bM-^@M-^\yesM-bM-^@M-^], M-bM-^@M-^\noM-bM-^@M-^], or |
810 | ``no'', or ``ask''. The default is ``ask''. | 842 | M-bM-^@M-^\askM-bM-^@M-^]. The default is M-bM-^@M-^\askM-bM-^@M-^]. |
811 | 843 | ||
812 | TCPKeepAlive | 844 | TCPKeepAlive |
813 | Specifies whether the system should send TCP keepalive messages | 845 | Specifies whether the system should send TCP keepalive messages |
@@ -816,34 +848,53 @@ DESCRIPTION | |||
816 | this means that connections will die if the route is down | 848 | this means that connections will die if the route is down |
817 | temporarily, and some people find it annoying. | 849 | temporarily, and some people find it annoying. |
818 | 850 | ||
819 | The default is ``yes'' (to send TCP keepalive messages), and the | 851 | The default is M-bM-^@M-^\yesM-bM-^@M-^] (to send TCP keepalive messages), and the |
820 | client will notice if the network goes down or the remote host | 852 | client will notice if the network goes down or the remote host |
821 | dies. This is important in scripts, and many users want it too. | 853 | dies. This is important in scripts, and many users want it too. |
822 | 854 | ||
823 | To disable TCP keepalive messages, the value should be set to | 855 | To disable TCP keepalive messages, the value should be set to |
824 | ``no''. | 856 | M-bM-^@M-^\noM-bM-^@M-^]. |
825 | 857 | ||
826 | Tunnel Request tun(4) device forwarding between the client and the | 858 | Tunnel Request tun(4) device forwarding between the client and the |
827 | server. The argument must be ``yes'', ``point-to-point'' (layer | 859 | server. The argument must be M-bM-^@M-^\yesM-bM-^@M-^], M-bM-^@M-^\point-to-pointM-bM-^@M-^] (layer 3), |
828 | 3), ``ethernet'' (layer 2), or ``no''. Specifying ``yes'' | 860 | M-bM-^@M-^\ethernetM-bM-^@M-^] (layer 2), or M-bM-^@M-^\noM-bM-^@M-^]. Specifying M-bM-^@M-^\yesM-bM-^@M-^] requests the |
829 | requests the default tunnel mode, which is ``point-to-point''. | 861 | default tunnel mode, which is M-bM-^@M-^\point-to-pointM-bM-^@M-^]. The default is |
830 | The default is ``no''. | 862 | M-bM-^@M-^\noM-bM-^@M-^]. |
831 | 863 | ||
832 | TunnelDevice | 864 | TunnelDevice |
833 | Specifies the tun(4) devices to open on the client (local_tun) | 865 | Specifies the tun(4) devices to open on the client (local_tun) |
834 | and the server (remote_tun). | 866 | and the server (remote_tun). |
835 | 867 | ||
836 | The argument must be local_tun[:remote_tun]. The devices may be | 868 | The argument must be local_tun[:remote_tun]. The devices may be |
837 | specified by numerical ID or the keyword ``any'', which uses the | 869 | specified by numerical ID or the keyword M-bM-^@M-^\anyM-bM-^@M-^], which uses the |
838 | next available tunnel device. If remote_tun is not specified, it | 870 | next available tunnel device. If remote_tun is not specified, it |
839 | defaults to ``any''. The default is ``any:any''. | 871 | defaults to M-bM-^@M-^\anyM-bM-^@M-^]. The default is M-bM-^@M-^\any:anyM-bM-^@M-^]. |
872 | |||
873 | UpdateHostKeys | ||
874 | Specifies whether ssh(1) should accept notifications of | ||
875 | additional hostkeys from the server sent after authentication has | ||
876 | completed and add them to UserKnownHostsFile. The argument must | ||
877 | be M-bM-^@M-^\yesM-bM-^@M-^], M-bM-^@M-^\noM-bM-^@M-^] (the default) or M-bM-^@M-^\askM-bM-^@M-^]. Enabling this option | ||
878 | allows learning alternate hostkeys for a server and supports | ||
879 | graceful key rotation by allowing a server to send replacement | ||
880 | public keys before old ones are removed. Additional hostkeys are | ||
881 | only accepted if the key used to authenticate the host was | ||
882 | already trusted or explicity accepted by the user. If | ||
883 | UpdateHostKeys is set to M-bM-^@M-^\askM-bM-^@M-^], then the user is asked to confirm | ||
884 | the modifications to the known_hosts file. Confirmation is | ||
885 | currently incompatible with ControlPersist, and will be disabled | ||
886 | if it is enabled. | ||
887 | |||
888 | Presently, only sshd(8) from OpenSSH 6.8 and greater support the | ||
889 | M-bM-^@M-^\hostkeys@openssh.comM-bM-^@M-^] protocol extension used to inform the | ||
890 | client of all the server's hostkeys. | ||
840 | 891 | ||
841 | UsePrivilegedPort | 892 | UsePrivilegedPort |
842 | Specifies whether to use a privileged port for outgoing | 893 | Specifies whether to use a privileged port for outgoing |
843 | connections. The argument must be ``yes'' or ``no''. The | 894 | connections. The argument must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The default is |
844 | default is ``no''. If set to ``yes'', ssh(1) must be setuid | 895 | M-bM-^@M-^\noM-bM-^@M-^]. If set to M-bM-^@M-^\yesM-bM-^@M-^], ssh(1) must be setuid root. Note that |
845 | root. Note that this option must be set to ``yes'' for | 896 | this option must be set to M-bM-^@M-^\yesM-bM-^@M-^] for RhostsRSAAuthentication with |
846 | RhostsRSAAuthentication with older servers. | 897 | older servers. |
847 | 898 | ||
848 | User Specifies the user to log in as. This can be useful when a | 899 | User Specifies the user to log in as. This can be useful when a |
849 | different user name is used on different machines. This saves | 900 | different user name is used on different machines. This saves |
@@ -857,35 +908,35 @@ DESCRIPTION | |||
857 | 908 | ||
858 | VerifyHostKeyDNS | 909 | VerifyHostKeyDNS |
859 | Specifies whether to verify the remote key using DNS and SSHFP | 910 | Specifies whether to verify the remote key using DNS and SSHFP |
860 | resource records. If this option is set to ``yes'', the client | 911 | resource records. If this option is set to M-bM-^@M-^\yesM-bM-^@M-^], the client |
861 | will implicitly trust keys that match a secure fingerprint from | 912 | will implicitly trust keys that match a secure fingerprint from |
862 | DNS. Insecure fingerprints will be handled as if this option was | 913 | DNS. Insecure fingerprints will be handled as if this option was |
863 | set to ``ask''. If this option is set to ``ask'', information on | 914 | set to M-bM-^@M-^\askM-bM-^@M-^]. If this option is set to M-bM-^@M-^\askM-bM-^@M-^], information on |
864 | fingerprint match will be displayed, but the user will still need | 915 | fingerprint match will be displayed, but the user will still need |
865 | to confirm new host keys according to the StrictHostKeyChecking | 916 | to confirm new host keys according to the StrictHostKeyChecking |
866 | option. The argument must be ``yes'', ``no'', or ``ask''. The | 917 | option. The argument must be M-bM-^@M-^\yesM-bM-^@M-^], M-bM-^@M-^\noM-bM-^@M-^], or M-bM-^@M-^\askM-bM-^@M-^]. The default |
867 | default is ``no''. Note that this option applies to protocol | 918 | is M-bM-^@M-^\noM-bM-^@M-^]. Note that this option applies to protocol version 2 |
868 | version 2 only. | 919 | only. |
869 | 920 | ||
870 | See also VERIFYING HOST KEYS in ssh(1). | 921 | See also VERIFYING HOST KEYS in ssh(1). |
871 | 922 | ||
872 | VisualHostKey | 923 | VisualHostKey |
873 | If this flag is set to ``yes'', an ASCII art representation of | 924 | If this flag is set to M-bM-^@M-^\yesM-bM-^@M-^], an ASCII art representation of the |
874 | the remote host key fingerprint is printed in addition to the hex | 925 | remote host key fingerprint is printed in addition to the |
875 | fingerprint string at login and for unknown host keys. If this | 926 | fingerprint string at login and for unknown host keys. If this |
876 | flag is set to ``no'', no fingerprint strings are printed at | 927 | flag is set to M-bM-^@M-^\noM-bM-^@M-^], no fingerprint strings are printed at login |
877 | login and only the hex fingerprint string will be printed for | 928 | and only the fingerprint string will be printed for unknown host |
878 | unknown host keys. The default is ``no''. | 929 | keys. The default is M-bM-^@M-^\noM-bM-^@M-^]. |
879 | 930 | ||
880 | XAuthLocation | 931 | XAuthLocation |
881 | Specifies the full pathname of the xauth(1) program. The default | 932 | Specifies the full pathname of the xauth(1) program. The default |
882 | is /usr/X11R6/bin/xauth. | 933 | is /usr/X11R6/bin/xauth. |
883 | 934 | ||
884 | PATTERNS | 935 | PATTERNS |
885 | A pattern consists of zero or more non-whitespace characters, `*' (a | 936 | A pattern consists of zero or more non-whitespace characters, M-bM-^@M-^X*M-bM-^@M-^Y (a |
886 | wildcard that matches zero or more characters), or `?' (a wildcard that | 937 | wildcard that matches zero or more characters), or M-bM-^@M-^X?M-bM-^@M-^Y (a wildcard that |
887 | matches exactly one character). For example, to specify a set of | 938 | matches exactly one character). For example, to specify a set of |
888 | declarations for any host in the ``.co.uk'' set of domains, the following | 939 | declarations for any host in the M-bM-^@M-^\.co.ukM-bM-^@M-^] set of domains, the following |
889 | pattern could be used: | 940 | pattern could be used: |
890 | 941 | ||
891 | Host *.co.uk | 942 | Host *.co.uk |
@@ -897,8 +948,8 @@ PATTERNS | |||
897 | 948 | ||
898 | A pattern-list is a comma-separated list of patterns. Patterns within | 949 | A pattern-list is a comma-separated list of patterns. Patterns within |
899 | pattern-lists may be negated by preceding them with an exclamation mark | 950 | pattern-lists may be negated by preceding them with an exclamation mark |
900 | (`!'). For example, to allow a key to be used from anywhere within an | 951 | (M-bM-^@M-^X!M-bM-^@M-^Y). For example, to allow a key to be used from anywhere within an |
901 | organization except from the ``dialup'' pool, the following entry (in | 952 | organization except from the M-bM-^@M-^\dialupM-bM-^@M-^] pool, the following entry (in |
902 | authorized_keys) could be used: | 953 | authorized_keys) could be used: |
903 | 954 | ||
904 | from="!*.dialup.example.com,*.example.com" | 955 | from="!*.dialup.example.com,*.example.com" |
@@ -927,4 +978,4 @@ AUTHORS | |||
927 | created OpenSSH. Markus Friedl contributed the support for SSH protocol | 978 | created OpenSSH. Markus Friedl contributed the support for SSH protocol |
928 | versions 1.5 and 2.0. | 979 | versions 1.5 and 2.0. |
929 | 980 | ||
930 | OpenBSD 5.6 July 15, 2014 OpenBSD 5.6 | 981 | OpenBSD 5.7 February 20, 2015 OpenBSD 5.7 |