summaryrefslogtreecommitdiff
path: root/ssh_config.0
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2015-08-19 17:00:17 +0100
committerColin Watson <cjwatson@debian.org>2015-08-19 17:00:17 +0100
commit544df7a04ae5b5c1fc30be7c445ad685d7a02dc9 (patch)
tree33d2a87dd50fe5894ac6ec4579c83401b7ab00a4 /ssh_config.0
parentbaccdb349b31c47cd76fb63211f754ed33a9707e (diff)
parent7de4b03a6e4071d454b72927ffaf52949fa34545 (diff)
Import openssh_6.9p1.orig.tar.gz
Diffstat (limited to 'ssh_config.0')
-rw-r--r--ssh_config.034
1 files changed, 19 insertions, 15 deletions
diff --git a/ssh_config.0 b/ssh_config.0
index 3bdd75237..b0a614b8a 100644
--- a/ssh_config.0
+++ b/ssh_config.0
@@ -67,7 +67,7 @@ DESCRIPTION
67 require an argument. Criteria may be negated by prepending an 67 require an argument. Criteria may be negated by prepending an
68 exclamation mark (M-bM-^@M-^X!M-bM-^@M-^Y). 68 exclamation mark (M-bM-^@M-^X!M-bM-^@M-^Y).
69 69
70 The canonical keywork matches only when the configuration file is 70 The canonical keyword matches only when the configuration file is
71 being re-parsed after hostname canonicalization (see the 71 being re-parsed after hostname canonicalization (see the
72 CanonicalizeHostname option.) This may be useful to specify 72 CanonicalizeHostname option.) This may be useful to specify
73 conditions that work with canonical host names only. The exec 73 conditions that work with canonical host names only. The exec
@@ -165,9 +165,11 @@ DESCRIPTION
165 CheckHostIP 165 CheckHostIP
166 If this flag is set to M-bM-^@M-^\yesM-bM-^@M-^], ssh(1) will additionally check the 166 If this flag is set to M-bM-^@M-^\yesM-bM-^@M-^], ssh(1) will additionally check the
167 host IP address in the known_hosts file. This allows ssh to 167 host IP address in the known_hosts file. This allows ssh to
168 detect if a host key changed due to DNS spoofing. If the option 168 detect if a host key changed due to DNS spoofing and will add
169 is set to M-bM-^@M-^\noM-bM-^@M-^], the check will not be executed. The default is 169 addresses of destination hosts to ~/.ssh/known_hosts in the
170 M-bM-^@M-^\yesM-bM-^@M-^]. 170 process, regardless of the setting of StrictHostKeyChecking. If
171 the option is set to M-bM-^@M-^\noM-bM-^@M-^], the check will not be executed. The
172 default is M-bM-^@M-^\yesM-bM-^@M-^].
171 173
172 Cipher Specifies the cipher to use for encrypting the session in 174 Cipher Specifies the cipher to use for encrypting the session in
173 protocol version 1. Currently, M-bM-^@M-^\blowfishM-bM-^@M-^], M-bM-^@M-^\3desM-bM-^@M-^], and M-bM-^@M-^\desM-bM-^@M-^] are 175 protocol version 1. Currently, M-bM-^@M-^\blowfishM-bM-^@M-^], M-bM-^@M-^\3desM-bM-^@M-^], and M-bM-^@M-^\desM-bM-^@M-^] are
@@ -252,9 +254,8 @@ DESCRIPTION
252 or is not listening. 254 or is not listening.
253 255
254 Setting this to M-bM-^@M-^\askM-bM-^@M-^] will cause ssh to listen for control 256 Setting this to M-bM-^@M-^\askM-bM-^@M-^] will cause ssh to listen for control
255 connections, but require confirmation using the SSH_ASKPASS 257 connections, but require confirmation using ssh-askpass(1). If
256 program before they are accepted (see ssh-add(1) for details). 258 the ControlPath cannot be opened, ssh will continue without
257 If the ControlPath cannot be opened, ssh will continue without
258 connecting to a master instance. 259 connecting to a master instance.
259 260
260 X11 and ssh-agent(1) forwarding is supported over these 261 X11 and ssh-agent(1) forwarding is supported over these
@@ -552,8 +553,8 @@ DESCRIPTION
552 curve25519-sha256@libssh.org, 553 curve25519-sha256@libssh.org,
553 ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521, 554 ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,
554 diffie-hellman-group-exchange-sha256, 555 diffie-hellman-group-exchange-sha256,
555 diffie-hellman-group14-sha1,
556 diffie-hellman-group-exchange-sha1, 556 diffie-hellman-group-exchange-sha1,
557 diffie-hellman-group14-sha1,
557 diffie-hellman-group1-sha1 558 diffie-hellman-group1-sha1
558 559
559 The list of available key exchange algorithms may also be 560 The list of available key exchange algorithms may also be
@@ -768,12 +769,15 @@ DESCRIPTION
768 Specifies what variables from the local environ(7) should be sent 769 Specifies what variables from the local environ(7) should be sent
769 to the server. Note that environment passing is only supported 770 to the server. Note that environment passing is only supported
770 for protocol 2. The server must also support it, and the server 771 for protocol 2. The server must also support it, and the server
771 must be configured to accept these environment variables. Refer 772 must be configured to accept these environment variables. Note
772 to AcceptEnv in sshd_config(5) for how to configure the server. 773 that the TERM environment variable is always sent whenever a
773 Variables are specified by name, which may contain wildcard 774 pseudo-terminal is requested as it is required by the protocol.
774 characters. Multiple environment variables may be separated by 775 Refer to AcceptEnv in sshd_config(5) for how to configure the
775 whitespace or spread across multiple SendEnv directives. The 776 server. Variables are specified by name, which may contain
776 default is not to send any environment variables. 777 wildcard characters. Multiple environment variables may be
778 separated by whitespace or spread across multiple SendEnv
779 directives. The default is not to send any environment
780 variables.
777 781
778 See PATTERNS for more information on patterns. 782 See PATTERNS for more information on patterns.
779 783
@@ -978,4 +982,4 @@ AUTHORS
978 created OpenSSH. Markus Friedl contributed the support for SSH protocol 982 created OpenSSH. Markus Friedl contributed the support for SSH protocol
979 versions 1.5 and 2.0. 983 versions 1.5 and 2.0.
980 984
981OpenBSD 5.7 February 20, 2015 OpenBSD 5.7 985OpenBSD 5.7 June 2, 2015 OpenBSD 5.7