summaryrefslogtreecommitdiff
path: root/ssh_config.0
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2014-02-10 00:18:28 +0000
committerColin Watson <cjwatson@debian.org>2014-02-10 00:18:28 +0000
commit9a975a9faed7c4f334e8c8490db3e77e102f2b21 (patch)
tree764a885ec9a963f6a8b15de6e1765f16b9ac4738 /ssh_config.0
parentee196dab7c5f97f0b80c8099343a375bead92010 (diff)
parentcdb6c90811caa5df2df856be9b0b16db020fe31d (diff)
Import openssh_6.5p1.orig.tar.gz
Diffstat (limited to 'ssh_config.0')
-rw-r--r--ssh_config.0131
1 files changed, 110 insertions, 21 deletions
diff --git a/ssh_config.0 b/ssh_config.0
index bd9e1ad51..e9ac54bfc 100644
--- a/ssh_config.0
+++ b/ssh_config.0
@@ -38,8 +38,8 @@ DESCRIPTION
38 The possible keywords and their meanings are as follows (note that 38 The possible keywords and their meanings are as follows (note that
39 keywords are case-insensitive and arguments are case-sensitive): 39 keywords are case-insensitive and arguments are case-sensitive):
40 40
41 Host Restricts the following declarations (up to the next Host 41 Host Restricts the following declarations (up to the next Host or
42 keyword) to be only for those hosts that match one of the 42 Match keyword) to be only for those hosts that match one of the
43 patterns given after the keyword. If more than one pattern is 43 patterns given after the keyword. If more than one pattern is
44 provided, they should be separated by whitespace. A single `*' 44 provided, they should be separated by whitespace. A single `*'
45 as a pattern can be used to provide global defaults for all 45 as a pattern can be used to provide global defaults for all
@@ -55,6 +55,37 @@ DESCRIPTION
55 55
56 See PATTERNS for more information on patterns. 56 See PATTERNS for more information on patterns.
57 57
58 Match Restricts the following declarations (up to the next Host or
59 Match keyword) to be used only when the conditions following the
60 Match keyword are satisfied. Match conditions are specified
61 using one or more keyword/criteria pairs or the single token all
62 which matches all criteria. The available keywords are: exec,
63 host, originalhost, user, and localuser.
64
65 The exec keyword executes the specified command under the user's
66 shell. If the command returns a zero exit status then the
67 condition is considered true. Commands containing whitespace
68 characters must be quoted. The following character sequences in
69 the command will be expanded prior to execution: `%L' will be
70 substituted by the first component of the local host name, `%l'
71 will be substituted by the local host name (including any domain
72 name), `%h' will be substituted by the target host name, `%n'
73 will be substituted by the original target host name specified on
74 the command-line, `%p' the destination port, `%r' by the remote
75 login username, and `%u' by the username of the user running
76 ssh(1).
77
78 The other keywords' criteria must be single entries or comma-
79 separated lists and may use the wildcard and negation operators
80 described in the PATTERNS section. The criteria for the host
81 keyword are matched against the target hostname, after any
82 substitution by the Hostname option. The originalhost keyword
83 matches against the hostname as it was specified on the command-
84 line. The user keyword matches against the target username on
85 the remote host. The localuser keyword matches against the name
86 of the local user running ssh(1) (this keyword may be useful in
87 system-wide ssh_config files).
88
58 AddressFamily 89 AddressFamily
59 Specifies which address family to use when connecting. Valid 90 Specifies which address family to use when connecting. Valid
60 arguments are ``any'', ``inet'' (use IPv4 only), or ``inet6'' 91 arguments are ``any'', ``inet'' (use IPv4 only), or ``inet6''
@@ -72,6 +103,49 @@ DESCRIPTION
72 one address. Note that this option does not work if 103 one address. Note that this option does not work if
73 UsePrivilegedPort is set to ``yes''. 104 UsePrivilegedPort is set to ``yes''.
74 105
106 CanonicalDomains
107 When CanonicalizeHostname is enabled, this option specifies the
108 list of domain suffixes in which to search for the specified
109 destination host.
110
111 CanonicalizeFallbackLocal
112 Specifies whether to fail with an error when hostname
113 canonicalization fails. The default, ``yes'', will attempt to
114 look up the unqualified hostname using the system resolver's
115 search rules. A value of ``no'' will cause ssh(1) to fail
116 instantly if CanonicalizeHostname is enabled and the target
117 hostname cannot be found in any of the domains specified by
118 CanonicalDomains.
119
120 CanonicalizeHostname
121 Controls whether explicit hostname canonicalization is performed.
122 The default, ``no'', is not to perform any name rewriting and let
123 the system resolver handle all hostname lookups. If set to
124 ``yes'' then, for connections that do not use a ProxyCommand,
125 ssh(1) will attempt to canonicalize the hostname specified on the
126 command line using the CanonicalDomains suffixes and
127 CanonicalizePermittedCNAMEs rules. If CanonicalizeHostname is
128 set to ``always'', then canonicalization is applied to proxied
129 connections too.
130
131 CanonicalizeMaxDots
132 Specifies the maximum number of dot characters in a hostname
133 before canonicalization is disabled. The default, ``1'', allows
134 a single dot (i.e. hostname.subdomain).
135
136 CanonicalizePermittedCNAMEs
137 Specifies rules to determine whether CNAMEs should be followed
138 when canonicalizing hostnames. The rules consist of one or more
139 arguments of source_domain_list:target_domain_list, where
140 source_domain_list is a pattern-list of domains that may follow
141 CNAMEs in canonicalization, and target_domain_list is a pattern-
142 list of domains that they may resolve to.
143
144 For example, ``*.a.example.com:*.b.example.com,*.c.example.com''
145 will allow hostnames matching ``*.a.example.com'' to be
146 canonicalized to names in the ``*.b.example.com'' or
147 ``*.c.example.com'' domains.
148
75 ChallengeResponseAuthentication 149 ChallengeResponseAuthentication
76 Specifies whether to use challenge-response authentication. The 150 Specifies whether to use challenge-response authentication. The
77 argument to this keyword must be ``yes'' or ``no''. The default 151 argument to this keyword must be ``yes'' or ``no''. The default
@@ -95,18 +169,25 @@ DESCRIPTION
95 Ciphers 169 Ciphers
96 Specifies the ciphers allowed for protocol version 2 in order of 170 Specifies the ciphers allowed for protocol version 2 in order of
97 preference. Multiple ciphers must be comma-separated. The 171 preference. Multiple ciphers must be comma-separated. The
98 supported ciphers are ``3des-cbc'', ``aes128-cbc'', 172 supported ciphers are:
99 ``aes192-cbc'', ``aes256-cbc'', ``aes128-ctr'', ``aes192-ctr'', 173
100 ``aes256-ctr'', ``aes128-gcm@openssh.com'', 174 ``3des-cbc'', ``aes128-cbc'', ``aes192-cbc'', ``aes256-cbc'',
101 ``aes256-gcm@openssh.com'', ``arcfour128'', ``arcfour256'', 175 ``aes128-ctr'', ``aes192-ctr'', ``aes256-ctr'',
102 ``arcfour'', ``blowfish-cbc'', and ``cast128-cbc''. The default 176 ``aes128-gcm@openssh.com'', ``aes256-gcm@openssh.com'',
103 is: 177 ``arcfour128'', ``arcfour256'', ``arcfour'', ``blowfish-cbc'',
178 ``cast128-cbc'', and ``chacha20-poly1305@openssh.com''.
179
180 The default is:
104 181
105 aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128, 182 aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,
106 aes128-gcm@openssh.com,aes256-gcm@openssh.com, 183 aes128-gcm@openssh.com,aes256-gcm@openssh.com,
184 chacha20-poly1305@openssh.com,
107 aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc, 185 aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,
108 aes256-cbc,arcfour 186 aes256-cbc,arcfour
109 187
188 The list of available ciphers may also be obtained using the -Q
189 option of ssh(1).
190
110 ClearAllForwardings 191 ClearAllForwardings
111 Specifies that all local, remote, and dynamic port forwardings 192 Specifies that all local, remote, and dynamic port forwardings
112 specified in the configuration files or on the command line be 193 specified in the configuration files or on the command line be
@@ -174,9 +255,9 @@ DESCRIPTION
174 name, `%l' will be substituted by the local host name (including 255 name, `%l' will be substituted by the local host name (including
175 any domain name), `%h' will be substituted by the target host 256 any domain name), `%h' will be substituted by the target host
176 name, `%n' will be substituted by the original target host name 257 name, `%n' will be substituted by the original target host name
177 specified on the command line, `%p' the port, `%r' by the remote 258 specified on the command line, `%p' the destination port, `%r' by
178 login username, and `%u' by the username of the user running 259 the remote login username, and `%u' by the username of the user
179 ssh(1). It is recommended that any ControlPath used for 260 running ssh(1). It is recommended that any ControlPath used for
180 opportunistic connection sharing include at least %h, %p, and %r. 261 opportunistic connection sharing include at least %h, %p, and %r.
181 This ensures that shared connections are uniquely identified. 262 This ensures that shared connections are uniquely identified.
182 263
@@ -331,10 +412,11 @@ DESCRIPTION
331 ecdsa-sha2-nistp256-cert-v01@openssh.com, 412 ecdsa-sha2-nistp256-cert-v01@openssh.com,
332 ecdsa-sha2-nistp384-cert-v01@openssh.com, 413 ecdsa-sha2-nistp384-cert-v01@openssh.com,
333 ecdsa-sha2-nistp521-cert-v01@openssh.com, 414 ecdsa-sha2-nistp521-cert-v01@openssh.com,
415 ssh-ed25519-cert-v01@openssh.com,
334 ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com, 416 ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,
335 ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com, 417 ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,
336 ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521, 418 ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
337 ssh-rsa,ssh-dss 419 ssh-ed25519,ssh-rsa,ssh-dss
338 420
339 If hostkeys are known for the destination host then this default 421 If hostkeys are known for the destination host then this default
340 is modified to prefer their algorithms. 422 is modified to prefer their algorithms.
@@ -364,14 +446,15 @@ DESCRIPTION
364 default is ``no''. 446 default is ``no''.
365 447
366 IdentityFile 448 IdentityFile
367 Specifies a file from which the user's DSA, ECDSA or RSA 449 Specifies a file from which the user's DSA, ECDSA, ED25519 or RSA
368 authentication identity is read. The default is ~/.ssh/identity 450 authentication identity is read. The default is ~/.ssh/identity
369 for protocol version 1, and ~/.ssh/id_dsa, ~/.ssh/id_ecdsa and 451 for protocol version 1, and ~/.ssh/id_dsa, ~/.ssh/id_ecdsa,
370 ~/.ssh/id_rsa for protocol version 2. Additionally, any 452 ~/.ssh/id_ed25519 and ~/.ssh/id_rsa for protocol version 2.
371 identities represented by the authentication agent will be used 453 Additionally, any identities represented by the authentication
372 for authentication unless IdentitiesOnly is set. ssh(1) will try 454 agent will be used for authentication unless IdentitiesOnly is
373 to load certificate information from the filename obtained by 455 set. ssh(1) will try to load certificate information from the
374 appending -cert.pub to the path of a specified IdentityFile. 456 filename obtained by appending -cert.pub to the path of a
457 specified IdentityFile.
375 458
376 The file name may use the tilde syntax to refer to a user's home 459 The file name may use the tilde syntax to refer to a user's home
377 directory or one of the following escape characters: `%d' (local 460 directory or one of the following escape characters: `%d' (local
@@ -426,6 +509,7 @@ DESCRIPTION
426 Specifies the available KEX (Key Exchange) algorithms. Multiple 509 Specifies the available KEX (Key Exchange) algorithms. Multiple
427 algorithms must be comma-separated. The default is: 510 algorithms must be comma-separated. The default is:
428 511
512 curve25519-sha256@libssh.org,
429 ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521, 513 ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,
430 diffie-hellman-group-exchange-sha256, 514 diffie-hellman-group-exchange-sha256,
431 diffie-hellman-group-exchange-sha1, 515 diffie-hellman-group-exchange-sha1,
@@ -557,6 +641,11 @@ DESCRIPTION
557 641
558 ProxyCommand /usr/bin/nc -X connect -x 192.0.2.0:8080 %h %p 642 ProxyCommand /usr/bin/nc -X connect -x 192.0.2.0:8080 %h %p
559 643
644 ProxyUseFdpass
645 Specifies that ProxyCommand will pass a connected file descriptor
646 back to ssh(1) instead of continuing to execute and pass data.
647 The default is ``no''.
648
560 PubkeyAuthentication 649 PubkeyAuthentication
561 Specifies whether to try public key authentication. The argument 650 Specifies whether to try public key authentication. The argument
562 to this keyword must be ``yes'' or ``no''. The default is 651 to this keyword must be ``yes'' or ``no''. The default is
@@ -763,7 +852,7 @@ PATTERNS
763 A pattern-list is a comma-separated list of patterns. Patterns within 852 A pattern-list is a comma-separated list of patterns. Patterns within
764 pattern-lists may be negated by preceding them with an exclamation mark 853 pattern-lists may be negated by preceding them with an exclamation mark
765 (`!'). For example, to allow a key to be used from anywhere within an 854 (`!'). For example, to allow a key to be used from anywhere within an
766 organisation except from the ``dialup'' pool, the following entry (in 855 organization except from the ``dialup'' pool, the following entry (in
767 authorized_keys) could be used: 856 authorized_keys) could be used:
768 857
769 from="!*.dialup.example.com,*.example.com" 858 from="!*.dialup.example.com,*.example.com"
@@ -792,4 +881,4 @@ AUTHORS
792 created OpenSSH. Markus Friedl contributed the support for SSH protocol 881 created OpenSSH. Markus Friedl contributed the support for SSH protocol
793 versions 1.5 and 2.0. 882 versions 1.5 and 2.0.
794 883
795OpenBSD 5.4 June 27, 2013 OpenBSD 5.4 884OpenBSD 5.4 January 19, 2014 OpenBSD 5.4