diff options
author | Damien Miller <djm@mindrot.org> | 2010-08-03 16:04:46 +1000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2010-08-03 16:04:46 +1000 |
commit | e11e1ea5d475ee8be0038d64aa3e47c776295ac2 (patch) | |
tree | 88fa00ef41babbec7cb33e68f400e3a1ff787230 /ssh_config.5 | |
parent | c4bb91c79c0a05d2bbf2ac68b7be8421fb4957bf (diff) |
- djm@cvs.openbsd.org 2010/07/19 09:15:12
[clientloop.c readconf.c readconf.h ssh.c ssh_config.5]
add a "ControlPersist" option that automatically starts a background
ssh(1) multiplex master when connecting. This connection can stay alive
indefinitely, or can be set to automatically close after a user-specified
duration of inactivity. bz#1330 - patch by dwmw2 AT infradead.org, but
further hacked on by wmertens AT cisco.com, apb AT cequrux.com,
martin-mindrot-bugzilla AT earth.li and myself; "looks ok" markus@
Diffstat (limited to 'ssh_config.5')
-rw-r--r-- | ssh_config.5 | 26 |
1 files changed, 24 insertions, 2 deletions
diff --git a/ssh_config.5 b/ssh_config.5 index e7bb21ebb..04df8184c 100644 --- a/ssh_config.5 +++ b/ssh_config.5 | |||
@@ -34,8 +34,8 @@ | |||
34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
36 | .\" | 36 | .\" |
37 | .\" $OpenBSD: ssh_config.5,v 1.136 2010/07/12 22:41:13 djm Exp $ | 37 | .\" $OpenBSD: ssh_config.5,v 1.137 2010/07/19 09:15:12 djm Exp $ |
38 | .Dd $Mdocdate: July 12 2010 $ | 38 | .Dd $Mdocdate: July 19 2010 $ |
39 | .Dt SSH_CONFIG 5 | 39 | .Dt SSH_CONFIG 5 |
40 | .Os | 40 | .Os |
41 | .Sh NAME | 41 | .Sh NAME |
@@ -319,6 +319,28 @@ It is recommended that any | |||
319 | used for opportunistic connection sharing include | 319 | used for opportunistic connection sharing include |
320 | at least %h, %p, and %r. | 320 | at least %h, %p, and %r. |
321 | This ensures that shared connections are uniquely identified. | 321 | This ensures that shared connections are uniquely identified. |
322 | .It Cm ControlPersist | ||
323 | When used in conjunction with | ||
324 | .Cm ControlMaster , | ||
325 | specifies that the master connection should remain open | ||
326 | in the background (waiting for future client connections) | ||
327 | after the initial client connection has been closed. | ||
328 | If set to | ||
329 | .Dq no , | ||
330 | then the master connection will not be placed into the background, | ||
331 | and will close as soon as the initial client connection is closed. | ||
332 | If set to | ||
333 | .Dq yes , | ||
334 | then the master connection will remain in the background indefinitely | ||
335 | (until killed or closed via a mechanism such as the | ||
336 | .Xr ssh 1 | ||
337 | .Dq Fl O No exit | ||
338 | option). | ||
339 | If set to a time in seconds, or a time in any of the formats documented in | ||
340 | .Xr sshd_config 5 , | ||
341 | then the backgrounded master connection will automatically terminate | ||
342 | after it has remained idle (with no client connections) for the | ||
343 | specified time. | ||
322 | .It Cm DynamicForward | 344 | .It Cm DynamicForward |
323 | Specifies that a TCP port on the local machine be forwarded | 345 | Specifies that a TCP port on the local machine be forwarded |
324 | over the secure channel, and the application | 346 | over the secure channel, and the application |