diff options
author | Colin Watson <cjwatson@debian.org> | 2015-08-19 17:00:17 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2015-08-19 17:00:17 +0100 |
commit | 544df7a04ae5b5c1fc30be7c445ad685d7a02dc9 (patch) | |
tree | 33d2a87dd50fe5894ac6ec4579c83401b7ab00a4 /ssh_config.0 | |
parent | baccdb349b31c47cd76fb63211f754ed33a9707e (diff) | |
parent | 7de4b03a6e4071d454b72927ffaf52949fa34545 (diff) |
Import openssh_6.9p1.orig.tar.gz
Diffstat (limited to 'ssh_config.0')
-rw-r--r-- | ssh_config.0 | 34 |
1 files changed, 19 insertions, 15 deletions
diff --git a/ssh_config.0 b/ssh_config.0 index 3bdd75237..b0a614b8a 100644 --- a/ssh_config.0 +++ b/ssh_config.0 | |||
@@ -67,7 +67,7 @@ DESCRIPTION | |||
67 | require an argument. Criteria may be negated by prepending an | 67 | require an argument. Criteria may be negated by prepending an |
68 | exclamation mark (M-bM-^@M-^X!M-bM-^@M-^Y). | 68 | exclamation mark (M-bM-^@M-^X!M-bM-^@M-^Y). |
69 | 69 | ||
70 | The canonical keywork matches only when the configuration file is | 70 | The canonical keyword matches only when the configuration file is |
71 | being re-parsed after hostname canonicalization (see the | 71 | being re-parsed after hostname canonicalization (see the |
72 | CanonicalizeHostname option.) This may be useful to specify | 72 | CanonicalizeHostname option.) This may be useful to specify |
73 | conditions that work with canonical host names only. The exec | 73 | conditions that work with canonical host names only. The exec |
@@ -165,9 +165,11 @@ DESCRIPTION | |||
165 | CheckHostIP | 165 | CheckHostIP |
166 | If this flag is set to M-bM-^@M-^\yesM-bM-^@M-^], ssh(1) will additionally check the | 166 | If this flag is set to M-bM-^@M-^\yesM-bM-^@M-^], ssh(1) will additionally check the |
167 | host IP address in the known_hosts file. This allows ssh to | 167 | host IP address in the known_hosts file. This allows ssh to |
168 | detect if a host key changed due to DNS spoofing. If the option | 168 | detect if a host key changed due to DNS spoofing and will add |
169 | is set to M-bM-^@M-^\noM-bM-^@M-^], the check will not be executed. The default is | 169 | addresses of destination hosts to ~/.ssh/known_hosts in the |
170 | M-bM-^@M-^\yesM-bM-^@M-^]. | 170 | process, regardless of the setting of StrictHostKeyChecking. If |
171 | the option is set to M-bM-^@M-^\noM-bM-^@M-^], the check will not be executed. The | ||
172 | default is M-bM-^@M-^\yesM-bM-^@M-^]. | ||
171 | 173 | ||
172 | Cipher Specifies the cipher to use for encrypting the session in | 174 | Cipher Specifies the cipher to use for encrypting the session in |
173 | protocol version 1. Currently, M-bM-^@M-^\blowfishM-bM-^@M-^], M-bM-^@M-^\3desM-bM-^@M-^], and M-bM-^@M-^\desM-bM-^@M-^] are | 175 | protocol version 1. Currently, M-bM-^@M-^\blowfishM-bM-^@M-^], M-bM-^@M-^\3desM-bM-^@M-^], and M-bM-^@M-^\desM-bM-^@M-^] are |
@@ -252,9 +254,8 @@ DESCRIPTION | |||
252 | or is not listening. | 254 | or is not listening. |
253 | 255 | ||
254 | Setting this to M-bM-^@M-^\askM-bM-^@M-^] will cause ssh to listen for control | 256 | Setting this to M-bM-^@M-^\askM-bM-^@M-^] will cause ssh to listen for control |
255 | connections, but require confirmation using the SSH_ASKPASS | 257 | connections, but require confirmation using ssh-askpass(1). If |
256 | program before they are accepted (see ssh-add(1) for details). | 258 | the ControlPath cannot be opened, ssh will continue without |
257 | If the ControlPath cannot be opened, ssh will continue without | ||
258 | connecting to a master instance. | 259 | connecting to a master instance. |
259 | 260 | ||
260 | X11 and ssh-agent(1) forwarding is supported over these | 261 | X11 and ssh-agent(1) forwarding is supported over these |
@@ -552,8 +553,8 @@ DESCRIPTION | |||
552 | curve25519-sha256@libssh.org, | 553 | curve25519-sha256@libssh.org, |
553 | ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521, | 554 | ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521, |
554 | diffie-hellman-group-exchange-sha256, | 555 | diffie-hellman-group-exchange-sha256, |
555 | diffie-hellman-group14-sha1, | ||
556 | diffie-hellman-group-exchange-sha1, | 556 | diffie-hellman-group-exchange-sha1, |
557 | diffie-hellman-group14-sha1, | ||
557 | diffie-hellman-group1-sha1 | 558 | diffie-hellman-group1-sha1 |
558 | 559 | ||
559 | The list of available key exchange algorithms may also be | 560 | The list of available key exchange algorithms may also be |
@@ -768,12 +769,15 @@ DESCRIPTION | |||
768 | Specifies what variables from the local environ(7) should be sent | 769 | Specifies what variables from the local environ(7) should be sent |
769 | to the server. Note that environment passing is only supported | 770 | to the server. Note that environment passing is only supported |
770 | for protocol 2. The server must also support it, and the server | 771 | for protocol 2. The server must also support it, and the server |
771 | must be configured to accept these environment variables. Refer | 772 | must be configured to accept these environment variables. Note |
772 | to AcceptEnv in sshd_config(5) for how to configure the server. | 773 | that the TERM environment variable is always sent whenever a |
773 | Variables are specified by name, which may contain wildcard | 774 | pseudo-terminal is requested as it is required by the protocol. |
774 | characters. Multiple environment variables may be separated by | 775 | Refer to AcceptEnv in sshd_config(5) for how to configure the |
775 | whitespace or spread across multiple SendEnv directives. The | 776 | server. Variables are specified by name, which may contain |
776 | default is not to send any environment variables. | 777 | wildcard characters. Multiple environment variables may be |
778 | separated by whitespace or spread across multiple SendEnv | ||
779 | directives. The default is not to send any environment | ||
780 | variables. | ||
777 | 781 | ||
778 | See PATTERNS for more information on patterns. | 782 | See PATTERNS for more information on patterns. |
779 | 783 | ||
@@ -978,4 +982,4 @@ AUTHORS | |||
978 | created OpenSSH. Markus Friedl contributed the support for SSH protocol | 982 | created OpenSSH. Markus Friedl contributed the support for SSH protocol |
979 | versions 1.5 and 2.0. | 983 | versions 1.5 and 2.0. |
980 | 984 | ||
981 | OpenBSD 5.7 February 20, 2015 OpenBSD 5.7 | 985 | OpenBSD 5.7 June 2, 2015 OpenBSD 5.7 |