summaryrefslogtreecommitdiff
path: root/ssh_config.0
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2011-09-06 14:56:29 +0100
committerColin Watson <cjwatson@debian.org>2011-09-06 14:56:29 +0100
commit978e62d6f14c60747bddef2cc72d66a9c8b83b54 (patch)
tree89400a44e42d84937deba7864e4964d6c7734da5 /ssh_config.0
parent87c685b8c6a49814fd782288097b3093f975aa72 (diff)
parent3a7e89697ca363de0f64e0d5704c57219294e41c (diff)
* New upstream release (http://www.openssh.org/txt/release-5.9).
- Introduce sandboxing of the pre-auth privsep child using an optional sshd_config(5) "UsePrivilegeSeparation=sandbox" mode that enables mandatory restrictions on the syscalls the privsep child can perform. - Add new SHA256-based HMAC transport integrity modes from http://www.ietf.org/id/draft-dbider-sha2-mac-for-ssh-02.txt. - The pre-authentication sshd(8) privilege separation slave process now logs via a socket shared with the master process, avoiding the need to maintain /dev/log inside the chroot (closes: #75043, #429243, #599240). - ssh(1) now warns when a server refuses X11 forwarding (closes: #504757). - sshd_config(5)'s AuthorizedKeysFile now accepts multiple paths, separated by whitespace (closes: #76312). The authorized_keys2 fallback is deprecated but documented (closes: #560156). - ssh(1) and sshd(8): set IPv6 traffic class from IPQoS, as well as IPv4 ToS/DSCP (closes: #498297). - ssh-add(1) now accepts keys piped from standard input. E.g. "ssh-add - < /path/to/key" (closes: #229124). - Clean up lost-passphrase text in ssh-keygen(1) (closes: #444691). - Say "required" rather than "recommended" in unprotected-private-key warning (LP: #663455).
Diffstat (limited to 'ssh_config.0')
-rw-r--r--ssh_config.053
1 files changed, 38 insertions, 15 deletions
diff --git a/ssh_config.0 b/ssh_config.0
index c4a12f7bb..7b9205681 100644
--- a/ssh_config.0
+++ b/ssh_config.0
@@ -47,6 +47,12 @@ DESCRIPTION
47 line (i.e. the name is not converted to a canonicalized host name 47 line (i.e. the name is not converted to a canonicalized host name
48 before matching). 48 before matching).
49 49
50 A pattern entry may be negated by prefixing it with an
51 exclamation mark (`!'). If a negated entry is matched, then the
52 Host entry is ignored, regardless of whether any other patterns
53 on the line match. Negated matches are therefore useful to
54 provide exceptions for wildcard matches.
55
50 See PATTERNS for more information on patterns. 56 See PATTERNS for more information on patterns.
51 57
52 AddressFamily 58 AddressFamily
@@ -160,13 +166,16 @@ DESCRIPTION
160 ControlPath 166 ControlPath
161 Specify the path to the control socket used for connection 167 Specify the path to the control socket used for connection
162 sharing as described in the ControlMaster section above or the 168 sharing as described in the ControlMaster section above or the
163 string ``none'' to disable connection sharing. In the path, `%l' 169 string ``none'' to disable connection sharing. In the path, `%L'
164 will be substituted by the local host name, `%h' will be 170 will be substituted by the first component of the local host
165 substituted by the target host name, `%p' the port, and `%r' by 171 name, `%l' will be substituted by the local host name (including
166 the remote login username. It is recommended that any 172 any domain name), `%h' will be substituted by the target host
167 ControlPath used for opportunistic connection sharing include at 173 name, `%n' will be substituted by the original target host name
168 least %h, %p, and %r. This ensures that shared connections are 174 specified on the command line, `%p' the port, `%r' by the remote
169 uniquely identified. 175 login username, and `%u' by the username of the user running
176 ssh(1). It is recommended that any ControlPath used for
177 opportunistic connection sharing include at least %h, %p, and %r.
178 This ensures that shared connections are uniquely identified.
170 179
171 ControlPersist 180 ControlPersist
172 When used in conjunction with ControlMaster, specifies that the 181 When used in conjunction with ControlMaster, specifies that the
@@ -282,8 +291,9 @@ DESCRIPTION
282 default is ``no''. 291 default is ``no''.
283 292
284 GlobalKnownHostsFile 293 GlobalKnownHostsFile
285 Specifies a file to use for the global host key database instead 294 Specifies one or more files to use for the global host key
286 of /etc/ssh/ssh_known_hosts. 295 database, separated by whitespace. The default is
296 /etc/ssh/ssh_known_hosts, /etc/ssh/ssh_known_hosts2.
287 297
288 GSSAPIAuthentication 298 GSSAPIAuthentication
289 Specifies whether user authentication based on GSSAPI is allowed. 299 Specifies whether user authentication based on GSSAPI is allowed.
@@ -336,7 +346,7 @@ DESCRIPTION
336 Specifies the real host name to log into. This can be used to 346 Specifies the real host name to log into. This can be used to
337 specify nicknames or abbreviations for hosts. If the hostname 347 specify nicknames or abbreviations for hosts. If the hostname
338 contains the character sequence `%h', then this will be replaced 348 contains the character sequence `%h', then this will be replaced
339 with the host name specified on the commandline (this is useful 349 with the host name specified on the command line (this is useful
340 for manipulating unqualified names). The default is the name 350 for manipulating unqualified names). The default is the name
341 given on the command line. Numeric IP addresses are also 351 given on the command line. Numeric IP addresses are also
342 permitted (both on the command line and in HostName 352 permitted (both on the command line and in HostName
@@ -367,7 +377,9 @@ DESCRIPTION
367 377
368 It is possible to have multiple identity files specified in 378 It is possible to have multiple identity files specified in
369 configuration files; all these identities will be tried in 379 configuration files; all these identities will be tried in
370 sequence. 380 sequence. Multiple IdentityFile directives will add to the list
381 of identities tried (this behaviour differs from that of other
382 configuration directives).
371 383
372 IPQoS Specifies the IPv4 type-of-service or DSCP class for connections. 384 IPQoS Specifies the IPv4 type-of-service or DSCP class for connections.
373 Accepted values are ``af11'', ``af12'', ``af13'', ``af14'', 385 Accepted values are ``af11'', ``af12'', ``af13'', ``af14'',
@@ -451,7 +463,9 @@ DESCRIPTION
451 must be comma-separated. The default is: 463 must be comma-separated. The default is:
452 464
453 hmac-md5,hmac-sha1,umac-64@openssh.com, 465 hmac-md5,hmac-sha1,umac-64@openssh.com,
454 hmac-ripemd160,hmac-sha1-96,hmac-md5-96 466 hmac-ripemd160,hmac-sha1-96,hmac-md5-96,
467 hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,
468 hmac-sha2-512-96
455 469
456 NoHostAuthenticationForLocalhost 470 NoHostAuthenticationForLocalhost
457 This option can be used if the home directory is shared across 471 This option can be used if the home directory is shared across
@@ -555,6 +569,14 @@ DESCRIPTION
555 if the server's GatewayPorts option is enabled (see 569 if the server's GatewayPorts option is enabled (see
556 sshd_config(5)). 570 sshd_config(5)).
557 571
572 RequestTTY
573 Specifies whether to request a pseudo-tty for the session. The
574 argument may be one of: ``no'' (never request a TTY), ``yes''
575 (always request a TTY when standard input is a TTY), ``force''
576 (always request a TTY) or ``auto'' (request a TTY when opening a
577 login session). This option mirrors the -t and -T flags for
578 ssh(1).
579
558 RhostsRSAAuthentication 580 RhostsRSAAuthentication
559 Specifies whether to try rhosts based authentication with RSA 581 Specifies whether to try rhosts based authentication with RSA
560 host authentication. The argument must be ``yes'' or ``no''. 582 host authentication. The argument must be ``yes'' or ``no''.
@@ -666,8 +688,9 @@ DESCRIPTION
666 command line. 688 command line.
667 689
668 UserKnownHostsFile 690 UserKnownHostsFile
669 Specifies a file to use for the user host key database instead of 691 Specifies one or more files to use for the user host key
670 ~/.ssh/known_hosts. 692 database, separated by whitespace. The default is
693 ~/.ssh/known_hosts, ~/.ssh/known_hosts2.
671 694
672 VerifyHostKeyDNS 695 VerifyHostKeyDNS
673 Specifies whether to verify the remote key using DNS and SSHFP 696 Specifies whether to verify the remote key using DNS and SSHFP
@@ -741,4 +764,4 @@ AUTHORS
741 created OpenSSH. Markus Friedl contributed the support for SSH protocol 764 created OpenSSH. Markus Friedl contributed the support for SSH protocol
742 versions 1.5 and 2.0. 765 versions 1.5 and 2.0.
743 766
744OpenBSD 4.9 December 8, 2010 OpenBSD 4.9 767OpenBSD 5.0 August 2, 2011 OpenBSD 5.0