diff options
author | Colin Watson <cjwatson@debian.org> | 2014-02-10 00:18:28 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2014-02-10 00:18:28 +0000 |
commit | 9a975a9faed7c4f334e8c8490db3e77e102f2b21 (patch) | |
tree | 764a885ec9a963f6a8b15de6e1765f16b9ac4738 /ssh_config.0 | |
parent | ee196dab7c5f97f0b80c8099343a375bead92010 (diff) | |
parent | cdb6c90811caa5df2df856be9b0b16db020fe31d (diff) |
Import openssh_6.5p1.orig.tar.gz
Diffstat (limited to 'ssh_config.0')
-rw-r--r-- | ssh_config.0 | 131 |
1 files changed, 110 insertions, 21 deletions
diff --git a/ssh_config.0 b/ssh_config.0 index bd9e1ad51..e9ac54bfc 100644 --- a/ssh_config.0 +++ b/ssh_config.0 | |||
@@ -38,8 +38,8 @@ DESCRIPTION | |||
38 | The possible keywords and their meanings are as follows (note that | 38 | The possible keywords and their meanings are as follows (note that |
39 | keywords are case-insensitive and arguments are case-sensitive): | 39 | keywords are case-insensitive and arguments are case-sensitive): |
40 | 40 | ||
41 | Host Restricts the following declarations (up to the next Host | 41 | Host Restricts the following declarations (up to the next Host or |
42 | keyword) to be only for those hosts that match one of the | 42 | Match keyword) to be only for those hosts that match one of the |
43 | patterns given after the keyword. If more than one pattern is | 43 | patterns given after the keyword. If more than one pattern is |
44 | provided, they should be separated by whitespace. A single `*' | 44 | provided, they should be separated by whitespace. A single `*' |
45 | as a pattern can be used to provide global defaults for all | 45 | as a pattern can be used to provide global defaults for all |
@@ -55,6 +55,37 @@ DESCRIPTION | |||
55 | 55 | ||
56 | See PATTERNS for more information on patterns. | 56 | See PATTERNS for more information on patterns. |
57 | 57 | ||
58 | Match Restricts the following declarations (up to the next Host or | ||
59 | Match keyword) to be used only when the conditions following the | ||
60 | Match keyword are satisfied. Match conditions are specified | ||
61 | using one or more keyword/criteria pairs or the single token all | ||
62 | which matches all criteria. The available keywords are: exec, | ||
63 | host, originalhost, user, and localuser. | ||
64 | |||
65 | The exec keyword executes the specified command under the user's | ||
66 | shell. If the command returns a zero exit status then the | ||
67 | condition is considered true. Commands containing whitespace | ||
68 | characters must be quoted. The following character sequences in | ||
69 | the command will be expanded prior to execution: `%L' will be | ||
70 | substituted by the first component of the local host name, `%l' | ||
71 | will be substituted by the local host name (including any domain | ||
72 | name), `%h' will be substituted by the target host name, `%n' | ||
73 | will be substituted by the original target host name specified on | ||
74 | the command-line, `%p' the destination port, `%r' by the remote | ||
75 | login username, and `%u' by the username of the user running | ||
76 | ssh(1). | ||
77 | |||
78 | The other keywords' criteria must be single entries or comma- | ||
79 | separated lists and may use the wildcard and negation operators | ||
80 | described in the PATTERNS section. The criteria for the host | ||
81 | keyword are matched against the target hostname, after any | ||
82 | substitution by the Hostname option. The originalhost keyword | ||
83 | matches against the hostname as it was specified on the command- | ||
84 | line. The user keyword matches against the target username on | ||
85 | the remote host. The localuser keyword matches against the name | ||
86 | of the local user running ssh(1) (this keyword may be useful in | ||
87 | system-wide ssh_config files). | ||
88 | |||
58 | AddressFamily | 89 | AddressFamily |
59 | Specifies which address family to use when connecting. Valid | 90 | Specifies which address family to use when connecting. Valid |
60 | arguments are ``any'', ``inet'' (use IPv4 only), or ``inet6'' | 91 | arguments are ``any'', ``inet'' (use IPv4 only), or ``inet6'' |
@@ -72,6 +103,49 @@ DESCRIPTION | |||
72 | one address. Note that this option does not work if | 103 | one address. Note that this option does not work if |
73 | UsePrivilegedPort is set to ``yes''. | 104 | UsePrivilegedPort is set to ``yes''. |
74 | 105 | ||
106 | CanonicalDomains | ||
107 | When CanonicalizeHostname is enabled, this option specifies the | ||
108 | list of domain suffixes in which to search for the specified | ||
109 | destination host. | ||
110 | |||
111 | CanonicalizeFallbackLocal | ||
112 | Specifies whether to fail with an error when hostname | ||
113 | canonicalization fails. The default, ``yes'', will attempt to | ||
114 | look up the unqualified hostname using the system resolver's | ||
115 | search rules. A value of ``no'' will cause ssh(1) to fail | ||
116 | instantly if CanonicalizeHostname is enabled and the target | ||
117 | hostname cannot be found in any of the domains specified by | ||
118 | CanonicalDomains. | ||
119 | |||
120 | CanonicalizeHostname | ||
121 | Controls whether explicit hostname canonicalization is performed. | ||
122 | The default, ``no'', is not to perform any name rewriting and let | ||
123 | the system resolver handle all hostname lookups. If set to | ||
124 | ``yes'' then, for connections that do not use a ProxyCommand, | ||
125 | ssh(1) will attempt to canonicalize the hostname specified on the | ||
126 | command line using the CanonicalDomains suffixes and | ||
127 | CanonicalizePermittedCNAMEs rules. If CanonicalizeHostname is | ||
128 | set to ``always'', then canonicalization is applied to proxied | ||
129 | connections too. | ||
130 | |||
131 | CanonicalizeMaxDots | ||
132 | Specifies the maximum number of dot characters in a hostname | ||
133 | before canonicalization is disabled. The default, ``1'', allows | ||
134 | a single dot (i.e. hostname.subdomain). | ||
135 | |||
136 | CanonicalizePermittedCNAMEs | ||
137 | Specifies rules to determine whether CNAMEs should be followed | ||
138 | when canonicalizing hostnames. The rules consist of one or more | ||
139 | arguments of source_domain_list:target_domain_list, where | ||
140 | source_domain_list is a pattern-list of domains that may follow | ||
141 | CNAMEs in canonicalization, and target_domain_list is a pattern- | ||
142 | list of domains that they may resolve to. | ||
143 | |||
144 | For example, ``*.a.example.com:*.b.example.com,*.c.example.com'' | ||
145 | will allow hostnames matching ``*.a.example.com'' to be | ||
146 | canonicalized to names in the ``*.b.example.com'' or | ||
147 | ``*.c.example.com'' domains. | ||
148 | |||
75 | ChallengeResponseAuthentication | 149 | ChallengeResponseAuthentication |
76 | Specifies whether to use challenge-response authentication. The | 150 | Specifies whether to use challenge-response authentication. The |
77 | argument to this keyword must be ``yes'' or ``no''. The default | 151 | argument to this keyword must be ``yes'' or ``no''. The default |
@@ -95,18 +169,25 @@ DESCRIPTION | |||
95 | Ciphers | 169 | Ciphers |
96 | Specifies the ciphers allowed for protocol version 2 in order of | 170 | Specifies the ciphers allowed for protocol version 2 in order of |
97 | preference. Multiple ciphers must be comma-separated. The | 171 | preference. Multiple ciphers must be comma-separated. The |
98 | supported ciphers are ``3des-cbc'', ``aes128-cbc'', | 172 | supported ciphers are: |
99 | ``aes192-cbc'', ``aes256-cbc'', ``aes128-ctr'', ``aes192-ctr'', | 173 | |
100 | ``aes256-ctr'', ``aes128-gcm@openssh.com'', | 174 | ``3des-cbc'', ``aes128-cbc'', ``aes192-cbc'', ``aes256-cbc'', |
101 | ``aes256-gcm@openssh.com'', ``arcfour128'', ``arcfour256'', | 175 | ``aes128-ctr'', ``aes192-ctr'', ``aes256-ctr'', |
102 | ``arcfour'', ``blowfish-cbc'', and ``cast128-cbc''. The default | 176 | ``aes128-gcm@openssh.com'', ``aes256-gcm@openssh.com'', |
103 | is: | 177 | ``arcfour128'', ``arcfour256'', ``arcfour'', ``blowfish-cbc'', |
178 | ``cast128-cbc'', and ``chacha20-poly1305@openssh.com''. | ||
179 | |||
180 | The default is: | ||
104 | 181 | ||
105 | aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128, | 182 | aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128, |
106 | aes128-gcm@openssh.com,aes256-gcm@openssh.com, | 183 | aes128-gcm@openssh.com,aes256-gcm@openssh.com, |
184 | chacha20-poly1305@openssh.com, | ||
107 | aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc, | 185 | aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc, |
108 | aes256-cbc,arcfour | 186 | aes256-cbc,arcfour |
109 | 187 | ||
188 | The list of available ciphers may also be obtained using the -Q | ||
189 | option of ssh(1). | ||
190 | |||
110 | ClearAllForwardings | 191 | ClearAllForwardings |
111 | Specifies that all local, remote, and dynamic port forwardings | 192 | Specifies that all local, remote, and dynamic port forwardings |
112 | specified in the configuration files or on the command line be | 193 | specified in the configuration files or on the command line be |
@@ -174,9 +255,9 @@ DESCRIPTION | |||
174 | name, `%l' will be substituted by the local host name (including | 255 | name, `%l' will be substituted by the local host name (including |
175 | any domain name), `%h' will be substituted by the target host | 256 | any domain name), `%h' will be substituted by the target host |
176 | name, `%n' will be substituted by the original target host name | 257 | name, `%n' will be substituted by the original target host name |
177 | specified on the command line, `%p' the port, `%r' by the remote | 258 | specified on the command line, `%p' the destination port, `%r' by |
178 | login username, and `%u' by the username of the user running | 259 | the remote login username, and `%u' by the username of the user |
179 | ssh(1). It is recommended that any ControlPath used for | 260 | running ssh(1). It is recommended that any ControlPath used for |
180 | opportunistic connection sharing include at least %h, %p, and %r. | 261 | opportunistic connection sharing include at least %h, %p, and %r. |
181 | This ensures that shared connections are uniquely identified. | 262 | This ensures that shared connections are uniquely identified. |
182 | 263 | ||
@@ -331,10 +412,11 @@ DESCRIPTION | |||
331 | ecdsa-sha2-nistp256-cert-v01@openssh.com, | 412 | ecdsa-sha2-nistp256-cert-v01@openssh.com, |
332 | ecdsa-sha2-nistp384-cert-v01@openssh.com, | 413 | ecdsa-sha2-nistp384-cert-v01@openssh.com, |
333 | ecdsa-sha2-nistp521-cert-v01@openssh.com, | 414 | ecdsa-sha2-nistp521-cert-v01@openssh.com, |
415 | ssh-ed25519-cert-v01@openssh.com, | ||
334 | ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com, | 416 | ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com, |
335 | ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com, | 417 | ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com, |
336 | ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521, | 418 | ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521, |
337 | ssh-rsa,ssh-dss | 419 | ssh-ed25519,ssh-rsa,ssh-dss |
338 | 420 | ||
339 | If hostkeys are known for the destination host then this default | 421 | If hostkeys are known for the destination host then this default |
340 | is modified to prefer their algorithms. | 422 | is modified to prefer their algorithms. |
@@ -364,14 +446,15 @@ DESCRIPTION | |||
364 | default is ``no''. | 446 | default is ``no''. |
365 | 447 | ||
366 | IdentityFile | 448 | IdentityFile |
367 | Specifies a file from which the user's DSA, ECDSA or RSA | 449 | Specifies a file from which the user's DSA, ECDSA, ED25519 or RSA |
368 | authentication identity is read. The default is ~/.ssh/identity | 450 | authentication identity is read. The default is ~/.ssh/identity |
369 | for protocol version 1, and ~/.ssh/id_dsa, ~/.ssh/id_ecdsa and | 451 | for protocol version 1, and ~/.ssh/id_dsa, ~/.ssh/id_ecdsa, |
370 | ~/.ssh/id_rsa for protocol version 2. Additionally, any | 452 | ~/.ssh/id_ed25519 and ~/.ssh/id_rsa for protocol version 2. |
371 | identities represented by the authentication agent will be used | 453 | Additionally, any identities represented by the authentication |
372 | for authentication unless IdentitiesOnly is set. ssh(1) will try | 454 | agent will be used for authentication unless IdentitiesOnly is |
373 | to load certificate information from the filename obtained by | 455 | set. ssh(1) will try to load certificate information from the |
374 | appending -cert.pub to the path of a specified IdentityFile. | 456 | filename obtained by appending -cert.pub to the path of a |
457 | specified IdentityFile. | ||
375 | 458 | ||
376 | The file name may use the tilde syntax to refer to a user's home | 459 | The file name may use the tilde syntax to refer to a user's home |
377 | directory or one of the following escape characters: `%d' (local | 460 | directory or one of the following escape characters: `%d' (local |
@@ -426,6 +509,7 @@ DESCRIPTION | |||
426 | Specifies the available KEX (Key Exchange) algorithms. Multiple | 509 | Specifies the available KEX (Key Exchange) algorithms. Multiple |
427 | algorithms must be comma-separated. The default is: | 510 | algorithms must be comma-separated. The default is: |
428 | 511 | ||
512 | curve25519-sha256@libssh.org, | ||
429 | ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521, | 513 | ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521, |
430 | diffie-hellman-group-exchange-sha256, | 514 | diffie-hellman-group-exchange-sha256, |
431 | diffie-hellman-group-exchange-sha1, | 515 | diffie-hellman-group-exchange-sha1, |
@@ -557,6 +641,11 @@ DESCRIPTION | |||
557 | 641 | ||
558 | ProxyCommand /usr/bin/nc -X connect -x 192.0.2.0:8080 %h %p | 642 | ProxyCommand /usr/bin/nc -X connect -x 192.0.2.0:8080 %h %p |
559 | 643 | ||
644 | ProxyUseFdpass | ||
645 | Specifies that ProxyCommand will pass a connected file descriptor | ||
646 | back to ssh(1) instead of continuing to execute and pass data. | ||
647 | The default is ``no''. | ||
648 | |||
560 | PubkeyAuthentication | 649 | PubkeyAuthentication |
561 | Specifies whether to try public key authentication. The argument | 650 | Specifies whether to try public key authentication. The argument |
562 | to this keyword must be ``yes'' or ``no''. The default is | 651 | to this keyword must be ``yes'' or ``no''. The default is |
@@ -763,7 +852,7 @@ PATTERNS | |||
763 | A pattern-list is a comma-separated list of patterns. Patterns within | 852 | A pattern-list is a comma-separated list of patterns. Patterns within |
764 | pattern-lists may be negated by preceding them with an exclamation mark | 853 | pattern-lists may be negated by preceding them with an exclamation mark |
765 | (`!'). For example, to allow a key to be used from anywhere within an | 854 | (`!'). For example, to allow a key to be used from anywhere within an |
766 | organisation except from the ``dialup'' pool, the following entry (in | 855 | organization except from the ``dialup'' pool, the following entry (in |
767 | authorized_keys) could be used: | 856 | authorized_keys) could be used: |
768 | 857 | ||
769 | from="!*.dialup.example.com,*.example.com" | 858 | from="!*.dialup.example.com,*.example.com" |
@@ -792,4 +881,4 @@ AUTHORS | |||
792 | created OpenSSH. Markus Friedl contributed the support for SSH protocol | 881 | created OpenSSH. Markus Friedl contributed the support for SSH protocol |
793 | versions 1.5 and 2.0. | 882 | versions 1.5 and 2.0. |
794 | 883 | ||
795 | OpenBSD 5.4 June 27, 2013 OpenBSD 5.4 | 884 | OpenBSD 5.4 January 19, 2014 OpenBSD 5.4 |