summaryrefslogtreecommitdiff
path: root/ssh_config.0
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2018-04-03 08:20:28 +0100
committerColin Watson <cjwatson@debian.org>2018-04-03 08:57:25 +0100
commita0b2dce9bf518f561bbb5070c0fb0c38f49035dd (patch)
tree24298b823e93d4e6efe13f48f1512707ebd625f8 /ssh_config.0
parent9d4942dc192b6f1888c9ab73a512dd9b197b956c (diff)
parent76aa43d2298f322f0371b74462418d0461537131 (diff)
New upstream release (7.7p1)
Diffstat (limited to 'ssh_config.0')
-rw-r--r--ssh_config.053
1 files changed, 36 insertions, 17 deletions
diff --git a/ssh_config.0 b/ssh_config.0
index 9493953ab..4109b1909 100644
--- a/ssh_config.0
+++ b/ssh_config.0
@@ -112,6 +112,11 @@ DESCRIPTION
112 one address. Note that this option does not work if 112 one address. Note that this option does not work if
113 UsePrivilegedPort is set to yes. 113 UsePrivilegedPort is set to yes.
114 114
115 BindInterface
116 Use the address of the specified interface on the local machine
117 as the source address of the connection. Note that this option
118 does not work if UsePrivilegedPort is set to yes.
119
115 CanonicalDomains 120 CanonicalDomains
116 When CanonicalizeHostname is enabled, this option specifies the 121 When CanonicalizeHostname is enabled, this option specifies the
117 list of domain suffixes in which to search for the specified 122 list of domain suffixes in which to search for the specified
@@ -583,7 +588,10 @@ DESCRIPTION
583 curve25519-sha256,curve25519-sha256@libssh.org, 588 curve25519-sha256,curve25519-sha256@libssh.org,
584 ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521, 589 ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,
585 diffie-hellman-group-exchange-sha256, 590 diffie-hellman-group-exchange-sha256,
591 diffie-hellman-group16-sha512,
592 diffie-hellman-group18-sha512,
586 diffie-hellman-group-exchange-sha1, 593 diffie-hellman-group-exchange-sha1,
594 diffie-hellman-group14-sha256,
587 diffie-hellman-group14-sha1 595 diffie-hellman-group14-sha1
588 596
589 The list of available key exchange algorithms may also be 597 The list of available key exchange algorithms may also be
@@ -652,12 +660,8 @@ DESCRIPTION
652 "ssh -Q mac". 660 "ssh -Q mac".
653 661
654 NoHostAuthenticationForLocalhost 662 NoHostAuthenticationForLocalhost
655 This option can be used if the home directory is shared across 663 Disable host authentication for localhost (loopback addresses).
656 machines. In this case localhost will refer to a different 664 The argument to this keyword must be yes or no (the default).
657 machine on each of the machines and the user will get many
658 warnings about changed host keys. However, this option disables
659 host authentication for localhost. The argument to this keyword
660 must be yes or no (the default).
661 665
662 NumberOfPasswordPrompts 666 NumberOfPasswordPrompts
663 Specifies the number of password prompts before giving up. The 667 Specifies the number of password prompts before giving up. The
@@ -713,12 +717,12 @@ DESCRIPTION
713 ProxyCommand /usr/bin/nc -X connect -x 192.0.2.0:8080 %h %p 717 ProxyCommand /usr/bin/nc -X connect -x 192.0.2.0:8080 %h %p
714 718
715 ProxyJump 719 ProxyJump
716 Specifies one or more jump proxies as [user@]host[:port]. 720 Specifies one or more jump proxies as either [user@]host[:port]
717 Multiple proxies may be separated by comma characters and will be 721 or an ssh URI. Multiple proxies may be separated by comma
718 visited sequentially. Setting this option will cause ssh(1) to 722 characters and will be visited sequentially. Setting this option
719 connect to the target host by first making a ssh(1) connection to 723 will cause ssh(1) to connect to the target host by first making a
720 the specified ProxyJump host and then establishing a TCP 724 ssh(1) connection to the specified ProxyJump host and then
721 forwarding to the ultimate target from there. 725 establishing a TCP forwarding to the ultimate target from there.
722 726
723 Note that this option will compete with the ProxyCommand option - 727 Note that this option will compete with the ProxyCommand option -
724 whichever is specified first will prevent later instances of the 728 whichever is specified first will prevent later instances of the
@@ -883,8 +887,8 @@ DESCRIPTION
883 If this flag is set to yes, ssh(1) will never automatically add 887 If this flag is set to yes, ssh(1) will never automatically add
884 host keys to the ~/.ssh/known_hosts file, and refuses to connect 888 host keys to the ~/.ssh/known_hosts file, and refuses to connect
885 to hosts whose host key has changed. This provides maximum 889 to hosts whose host key has changed. This provides maximum
886 protection against trojan horse attacks, though it can be 890 protection against man-in-the-middle (MITM) attacks, though it
887 annoying when the /etc/ssh/ssh_known_hosts file is poorly 891 can be annoying when the /etc/ssh/ssh_known_hosts file is poorly
888 maintained or when connections to new hosts are frequently made. 892 maintained or when connections to new hosts are frequently made.
889 This option forces the user to manually add all new hosts. 893 This option forces the user to manually add all new hosts.
890 894
@@ -918,6 +922,7 @@ DESCRIPTION
918 dies. This is important in scripts, and many users want it too. 922 dies. This is important in scripts, and many users want it too.
919 923
920 To disable TCP keepalive messages, the value should be set to no. 924 To disable TCP keepalive messages, the value should be set to no.
925 See also ServerAliveInterval for protocol-level keepalives.
921 926
922 Tunnel Request tun(4) device forwarding between the client and the 927 Tunnel Request tun(4) device forwarding between the client and the
923 server. The argument must be yes, point-to-point (layer 3), 928 server. The argument must be yes, point-to-point (layer 3),
@@ -1012,12 +1017,23 @@ PATTERNS
1012 1017
1013 from="!*.dialup.example.com,*.example.com" 1018 from="!*.dialup.example.com,*.example.com"
1014 1019
1020 Note that a negated match will never produce a positive result by itself.
1021 For example, attempting to match "host3" against the following pattern-
1022 list will fail:
1023
1024 from="!host1,!host2"
1025
1026 The solution here is to include a term that will yield a positive match,
1027 such as a wildcard:
1028
1029 from="!host1,!host2,*"
1030
1015TOKENS 1031TOKENS
1016 Arguments to some keywords can make use of tokens, which are expanded at 1032 Arguments to some keywords can make use of tokens, which are expanded at
1017 runtime: 1033 runtime:
1018 1034
1019 %% A literal M-bM-^@M-^X%M-bM-^@M-^Y. 1035 %% A literal M-bM-^@M-^X%M-bM-^@M-^Y.
1020 %C Shorthand for %l%h%p%r. 1036 %C Hash of %l%h%p%r.
1021 %d Local user's home directory. 1037 %d Local user's home directory.
1022 %h The remote hostname. 1038 %h The remote hostname.
1023 %i The local user ID. 1039 %i The local user ID.
@@ -1026,6 +1042,8 @@ TOKENS
1026 %n The original remote hostname, as given on the command line. 1042 %n The original remote hostname, as given on the command line.
1027 %p The remote port. 1043 %p The remote port.
1028 %r The remote username. 1044 %r The remote username.
1045 %T The local tun(4) or tap(4) network interface assigned if
1046 tunnel forwarding was requested, or "NONE" otherwise.
1029 %u The local username. 1047 %u The local username.
1030 1048
1031 Match exec accepts the tokens %%, %h, %L, %l, %n, %p, %r, and %u. 1049 Match exec accepts the tokens %%, %h, %L, %l, %n, %p, %r, and %u.
@@ -1040,7 +1058,8 @@ TOKENS
1040 IdentityAgent and IdentityFile accept the tokens %%, %d, %h, %l, %r, and 1058 IdentityAgent and IdentityFile accept the tokens %%, %d, %h, %l, %r, and
1041 %u. 1059 %u.
1042 1060
1043 LocalCommand accepts the tokens %%, %C, %d, %h, %l, %n, %p, %r, and %u. 1061 LocalCommand accepts the tokens %%, %C, %d, %h, %l, %n, %p, %r, %T, and
1062 %u.
1044 1063
1045 ProxyCommand accepts the tokens %%, %h, %p, and %r. 1064 ProxyCommand accepts the tokens %%, %h, %p, and %r.
1046 1065
@@ -1070,4 +1089,4 @@ AUTHORS
1070 created OpenSSH. Markus Friedl contributed the support for SSH protocol 1089 created OpenSSH. Markus Friedl contributed the support for SSH protocol
1071 versions 1.5 and 2.0. 1090 versions 1.5 and 2.0.
1072 1091
1073OpenBSD 6.2 September 21, 2017 OpenBSD 6.2 1092OpenBSD 6.2 February 23, 2018 OpenBSD 6.2