summaryrefslogtreecommitdiff
path: root/ssh_config.5
diff options
context:
space:
mode:
authordjm@openbsd.org <djm@openbsd.org>2015-07-30 00:01:34 +0000
committerDamien Miller <djm@mindrot.org>2015-07-30 12:32:16 +1000
commitf9eca249d4961f28ae4b09186d7dc91de74b5895 (patch)
treef4c86ae2043499a6ed7f8c736f0cd5e1f483102c /ssh_config.5
parent5cefe769105a2a2e3ca7479d28d9a325d5ef0163 (diff)
upstream commit
Allow ssh_config and sshd_config kex parameters options be prefixed by a '+' to indicate that the specified items be appended to the default rather than replacing it. approach suggested by dtucker@, feedback dlg@, ok markus@ Upstream-ID: 0f901137298fc17095d5756ff1561a7028e8882a
Diffstat (limited to 'ssh_config.5')
-rw-r--r--ssh_config.531
1 files changed, 29 insertions, 2 deletions
diff --git a/ssh_config.5 b/ssh_config.5
index e51439849..5b0975f87 100644
--- a/ssh_config.5
+++ b/ssh_config.5
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: ssh_config.5,v 1.213 2015/07/10 06:21:53 markus Exp $ 36.\" $OpenBSD: ssh_config.5,v 1.214 2015/07/30 00:01:34 djm Exp $
37.Dd $Mdocdate: July 10 2015 $ 37.Dd $Mdocdate: July 30 2015 $
38.Dt SSH_CONFIG 5 38.Dt SSH_CONFIG 5
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -373,6 +373,11 @@ The default is
373Specifies the ciphers allowed for protocol version 2 373Specifies the ciphers allowed for protocol version 2
374in order of preference. 374in order of preference.
375Multiple ciphers must be comma-separated. 375Multiple ciphers must be comma-separated.
376If the specified value begins with a
377.Sq +
378character, then the specified ciphers will be appended to the default set
379instead of replacing them.
380.Pp
376The supported ciphers are: 381The supported ciphers are:
377.Pp 382.Pp
378.Bl -item -compact -offset indent 383.Bl -item -compact -offset indent
@@ -781,6 +786,10 @@ is similar to
781.It Cm HostbasedKeyTypes 786.It Cm HostbasedKeyTypes
782Specifies the key types that will be used for hostbased authentication 787Specifies the key types that will be used for hostbased authentication
783as a comma-separated pattern list. 788as a comma-separated pattern list.
789Alternately if the specified value begins with a
790.Sq +
791character, then the specified key types will be appended to the default set
792instead of replacing them.
784The default for this option is: 793The default for this option is:
785.Bd -literal -offset 3n 794.Bd -literal -offset 3n
786ecdsa-sha2-nistp256-cert-v01@openssh.com, 795ecdsa-sha2-nistp256-cert-v01@openssh.com,
@@ -800,6 +809,10 @@ may be used to list supported key types.
800.It Cm HostKeyAlgorithms 809.It Cm HostKeyAlgorithms
801Specifies the protocol version 2 host key algorithms 810Specifies the protocol version 2 host key algorithms
802that the client wants to use in order of preference. 811that the client wants to use in order of preference.
812Alternately if the specified value begins with a
813.Sq +
814character, then the specified key types will be appended to the default set
815instead of replacing them.
803The default for this option is: 816The default for this option is:
804.Bd -literal -offset 3n 817.Bd -literal -offset 3n
805ecdsa-sha2-nistp256-cert-v01@openssh.com, 818ecdsa-sha2-nistp256-cert-v01@openssh.com,
@@ -981,6 +994,10 @@ and
981.It Cm KexAlgorithms 994.It Cm KexAlgorithms
982Specifies the available KEX (Key Exchange) algorithms. 995Specifies the available KEX (Key Exchange) algorithms.
983Multiple algorithms must be comma-separated. 996Multiple algorithms must be comma-separated.
997Alternately if the specified value begins with a
998.Sq +
999character, then the specified methods will be appended to the default set
1000instead of replacing them.
984The default is: 1001The default is:
985.Bd -literal -offset indent 1002.Bd -literal -offset indent
986curve25519-sha256@libssh.org, 1003curve25519-sha256@libssh.org,
@@ -1069,10 +1086,16 @@ in order of preference.
1069The MAC algorithm is used in protocol version 2 1086The MAC algorithm is used in protocol version 2
1070for data integrity protection. 1087for data integrity protection.
1071Multiple algorithms must be comma-separated. 1088Multiple algorithms must be comma-separated.
1089If the specified value begins with a
1090.Sq +
1091character, then the specified algorithms will be appended to the default set
1092instead of replacing them.
1093.Pp
1072The algorithms that contain 1094The algorithms that contain
1073.Dq -etm 1095.Dq -etm
1074calculate the MAC after encryption (encrypt-then-mac). 1096calculate the MAC after encryption (encrypt-then-mac).
1075These are considered safer and their use recommended. 1097These are considered safer and their use recommended.
1098.Pp
1076The default is: 1099The default is:
1077.Bd -literal -offset indent 1100.Bd -literal -offset indent
1078umac-64-etm@openssh.com,umac-128-etm@openssh.com, 1101umac-64-etm@openssh.com,umac-128-etm@openssh.com,
@@ -1216,6 +1239,10 @@ The default is
1216.It Cm PubkeyAcceptedKeyTypes 1239.It Cm PubkeyAcceptedKeyTypes
1217Specifies the key types that will be used for public key authentication 1240Specifies the key types that will be used for public key authentication
1218as a comma-separated pattern list. 1241as a comma-separated pattern list.
1242Alternately if the specified value begins with a
1243.Sq +
1244character, then the key types after it will be appended to the default
1245instead of replacing it.
1219The default for this option is: 1246The default for this option is:
1220.Bd -literal -offset 3n 1247.Bd -literal -offset 3n
1221ecdsa-sha2-nistp256-cert-v01@openssh.com, 1248ecdsa-sha2-nistp256-cert-v01@openssh.com,