diff options
author | Colin Watson <cjwatson@debian.org> | 2011-09-06 14:56:29 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2011-09-06 14:56:29 +0100 |
commit | 978e62d6f14c60747bddef2cc72d66a9c8b83b54 (patch) | |
tree | 89400a44e42d84937deba7864e4964d6c7734da5 /ssh_config.5 | |
parent | 87c685b8c6a49814fd782288097b3093f975aa72 (diff) | |
parent | 3a7e89697ca363de0f64e0d5704c57219294e41c (diff) |
* New upstream release (http://www.openssh.org/txt/release-5.9).
- Introduce sandboxing of the pre-auth privsep child using an optional
sshd_config(5) "UsePrivilegeSeparation=sandbox" mode that enables
mandatory restrictions on the syscalls the privsep child can perform.
- Add new SHA256-based HMAC transport integrity modes from
http://www.ietf.org/id/draft-dbider-sha2-mac-for-ssh-02.txt.
- The pre-authentication sshd(8) privilege separation slave process now
logs via a socket shared with the master process, avoiding the need to
maintain /dev/log inside the chroot (closes: #75043, #429243,
#599240).
- ssh(1) now warns when a server refuses X11 forwarding (closes:
#504757).
- sshd_config(5)'s AuthorizedKeysFile now accepts multiple paths,
separated by whitespace (closes: #76312). The authorized_keys2
fallback is deprecated but documented (closes: #560156).
- ssh(1) and sshd(8): set IPv6 traffic class from IPQoS, as well as IPv4
ToS/DSCP (closes: #498297).
- ssh-add(1) now accepts keys piped from standard input. E.g. "ssh-add
- < /path/to/key" (closes: #229124).
- Clean up lost-passphrase text in ssh-keygen(1) (closes: #444691).
- Say "required" rather than "recommended" in unprotected-private-key
warning (LP: #663455).
Diffstat (limited to 'ssh_config.5')
-rw-r--r-- | ssh_config.5 | 70 |
1 files changed, 57 insertions, 13 deletions
diff --git a/ssh_config.5 b/ssh_config.5 index fc994d482..19bff6d54 100644 --- a/ssh_config.5 +++ b/ssh_config.5 | |||
@@ -33,8 +33,8 @@ | |||
33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
35 | .\" | 35 | .\" |
36 | .\" $OpenBSD: ssh_config.5,v 1.146 2010/12/08 04:02:47 djm Exp $ | 36 | .\" $OpenBSD: ssh_config.5,v 1.153 2011/08/02 01:22:11 djm Exp $ |
37 | .Dd $Mdocdate: December 8 2010 $ | 37 | .Dd $Mdocdate: August 2 2011 $ |
38 | .Dt SSH_CONFIG 5 | 38 | .Dt SSH_CONFIG 5 |
39 | .Os | 39 | .Os |
40 | .Sh NAME | 40 | .Sh NAME |
@@ -128,6 +128,15 @@ The host is the | |||
128 | argument given on the command line (i.e. the name is not converted to | 128 | argument given on the command line (i.e. the name is not converted to |
129 | a canonicalized host name before matching). | 129 | a canonicalized host name before matching). |
130 | .Pp | 130 | .Pp |
131 | A pattern entry may be negated by prefixing it with an exclamation mark | ||
132 | .Pq Sq !\& . | ||
133 | If a negated entry is matched, then the | ||
134 | .Cm Host | ||
135 | entry is ignored, regardless of whether any other patterns on the line | ||
136 | match. | ||
137 | Negated matches are therefore useful to provide exceptions for wildcard | ||
138 | matches. | ||
139 | .Pp | ||
131 | See | 140 | See |
132 | .Sx PATTERNS | 141 | .Sx PATTERNS |
133 | for more information on patterns. | 142 | for more information on patterns. |
@@ -325,14 +334,22 @@ section above or the string | |||
325 | .Dq none | 334 | .Dq none |
326 | to disable connection sharing. | 335 | to disable connection sharing. |
327 | In the path, | 336 | In the path, |
337 | .Ql %L | ||
338 | will be substituted by the first component of the local host name, | ||
328 | .Ql %l | 339 | .Ql %l |
329 | will be substituted by the local host name, | 340 | will be substituted by the local host name (including any domain name), |
330 | .Ql %h | 341 | .Ql %h |
331 | will be substituted by the target host name, | 342 | will be substituted by the target host name, |
343 | .Ql %n | ||
344 | will be substituted by the original target host name | ||
345 | specified on the command line, | ||
332 | .Ql %p | 346 | .Ql %p |
333 | the port, and | 347 | the port, |
334 | .Ql %r | 348 | .Ql %r |
335 | by the remote login username. | 349 | by the remote login username, and |
350 | .Ql %u | ||
351 | by the username of the user running | ||
352 | .Xr ssh 1 . | ||
336 | It is recommended that any | 353 | It is recommended that any |
337 | .Cm ControlPath | 354 | .Cm ControlPath |
338 | used for opportunistic connection sharing include | 355 | used for opportunistic connection sharing include |
@@ -521,9 +538,11 @@ or | |||
521 | The default is | 538 | The default is |
522 | .Dq no . | 539 | .Dq no . |
523 | .It Cm GlobalKnownHostsFile | 540 | .It Cm GlobalKnownHostsFile |
524 | Specifies a file to use for the global | 541 | Specifies one or more files to use for the global |
525 | host key database instead of | 542 | host key database, separated by whitespace. |
526 | .Pa /etc/ssh/ssh_known_hosts . | 543 | The default is |
544 | .Pa /etc/ssh/ssh_known_hosts , | ||
545 | .Pa /etc/ssh/ssh_known_hosts2 . | ||
527 | .It Cm GSSAPIAuthentication | 546 | .It Cm GSSAPIAuthentication |
528 | Specifies whether user authentication based on GSSAPI is allowed. | 547 | Specifies whether user authentication based on GSSAPI is allowed. |
529 | The default is | 548 | The default is |
@@ -625,7 +644,7 @@ Specifies the real host name to log into. | |||
625 | This can be used to specify nicknames or abbreviations for hosts. | 644 | This can be used to specify nicknames or abbreviations for hosts. |
626 | If the hostname contains the character sequence | 645 | If the hostname contains the character sequence |
627 | .Ql %h , | 646 | .Ql %h , |
628 | then this will be replaced with the host name specified on the commandline | 647 | then this will be replaced with the host name specified on the command line |
629 | (this is useful for manipulating unqualified names). | 648 | (this is useful for manipulating unqualified names). |
630 | The default is the name given on the command line. | 649 | The default is the name given on the command line. |
631 | Numeric IP addresses are also permitted (both on the command line and in | 650 | Numeric IP addresses are also permitted (both on the command line and in |
@@ -685,6 +704,10 @@ escape characters: | |||
685 | It is possible to have | 704 | It is possible to have |
686 | multiple identity files specified in configuration files; all these | 705 | multiple identity files specified in configuration files; all these |
687 | identities will be tried in sequence. | 706 | identities will be tried in sequence. |
707 | Multiple | ||
708 | .Cm IdentityFile | ||
709 | directives will add to the list of identities tried (this behaviour | ||
710 | differs from that of other configuration directives). | ||
688 | .It Cm IPQoS | 711 | .It Cm IPQoS |
689 | Specifies the IPv4 type-of-service or DSCP class for connections. | 712 | Specifies the IPv4 type-of-service or DSCP class for connections. |
690 | Accepted values are | 713 | Accepted values are |
@@ -826,7 +849,9 @@ Multiple algorithms must be comma-separated. | |||
826 | The default is: | 849 | The default is: |
827 | .Bd -literal -offset indent | 850 | .Bd -literal -offset indent |
828 | hmac-md5,hmac-sha1,umac-64@openssh.com, | 851 | hmac-md5,hmac-sha1,umac-64@openssh.com, |
829 | hmac-ripemd160,hmac-sha1-96,hmac-md5-96 | 852 | hmac-ripemd160,hmac-sha1-96,hmac-md5-96, |
853 | hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512, | ||
854 | hmac-sha2-512-96 | ||
830 | .Ed | 855 | .Ed |
831 | .It Cm NoHostAuthenticationForLocalhost | 856 | .It Cm NoHostAuthenticationForLocalhost |
832 | This option can be used if the home directory is shared across machines. | 857 | This option can be used if the home directory is shared across machines. |
@@ -999,6 +1024,23 @@ will only succeed if the server's | |||
999 | .Cm GatewayPorts | 1024 | .Cm GatewayPorts |
1000 | option is enabled (see | 1025 | option is enabled (see |
1001 | .Xr sshd_config 5 ) . | 1026 | .Xr sshd_config 5 ) . |
1027 | .It Cm RequestTTY | ||
1028 | Specifies whether to request a pseudo-tty for the session. | ||
1029 | The argument may be one of: | ||
1030 | .Dq no | ||
1031 | (never request a TTY), | ||
1032 | .Dq yes | ||
1033 | (always request a TTY when standard input is a TTY), | ||
1034 | .Dq force | ||
1035 | (always request a TTY) or | ||
1036 | .Dq auto | ||
1037 | (request a TTY when opening a login session). | ||
1038 | This option mirrors the | ||
1039 | .Fl t | ||
1040 | and | ||
1041 | .Fl T | ||
1042 | flags for | ||
1043 | .Xr ssh 1 . | ||
1002 | .It Cm RhostsRSAAuthentication | 1044 | .It Cm RhostsRSAAuthentication |
1003 | Specifies whether to try rhosts based authentication with RSA host | 1045 | Specifies whether to try rhosts based authentication with RSA host |
1004 | authentication. | 1046 | authentication. |
@@ -1226,9 +1268,11 @@ This can be useful when a different user name is used on different machines. | |||
1226 | This saves the trouble of | 1268 | This saves the trouble of |
1227 | having to remember to give the user name on the command line. | 1269 | having to remember to give the user name on the command line. |
1228 | .It Cm UserKnownHostsFile | 1270 | .It Cm UserKnownHostsFile |
1229 | Specifies a file to use for the user | 1271 | Specifies one or more files to use for the user |
1230 | host key database instead of | 1272 | host key database, separated by whitespace. |
1231 | .Pa ~/.ssh/known_hosts . | 1273 | The default is |
1274 | .Pa ~/.ssh/known_hosts , | ||
1275 | .Pa ~/.ssh/known_hosts2 . | ||
1232 | .It Cm VerifyHostKeyDNS | 1276 | .It Cm VerifyHostKeyDNS |
1233 | Specifies whether to verify the remote key using DNS and SSHFP resource | 1277 | Specifies whether to verify the remote key using DNS and SSHFP resource |
1234 | records. | 1278 | records. |