summaryrefslogtreecommitdiff
path: root/ssh_config.5
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2003-09-01 02:05:26 +0000
committerColin Watson <cjwatson@debian.org>2003-09-01 02:05:26 +0000
commit6d5a72bc1d98a42ba42f082e50a22e911c1d82d3 (patch)
tree1bf23174bdb6fc71e2846dda0eca195a418484e7 /ssh_config.5
parent2ee26b431f98cf1dc0e4fb9809ad1e0c879b8c08 (diff)
parent58657d96514cd6f16d82add8d6f4adbb36765758 (diff)
Debian release 3.5p1-1.
Diffstat (limited to 'ssh_config.5')
-rw-r--r--ssh_config.543
1 files changed, 35 insertions, 8 deletions
diff --git a/ssh_config.5 b/ssh_config.5
index 6d94220b0..67fa0845c 100644
--- a/ssh_config.5
+++ b/ssh_config.5
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: ssh_config.5,v 1.1 2002/06/20 19:56:07 stevesk Exp $ 37.\" $OpenBSD: ssh_config.5,v 1.5 2002/08/29 22:54:10 stevesk Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSH_CONFIG 5 39.Dt SSH_CONFIG 5
40.Os 40.Os
@@ -50,10 +50,16 @@
50.Nm ssh 50.Nm ssh
51obtains configuration data from the following sources in 51obtains configuration data from the following sources in
52the following order: 52the following order:
53command line options, user's configuration file 53.Bl -enum -offset indent -compact
54.Pq Pa $HOME/.ssh/config , 54.It
55and system-wide configuration file 55command-line options
56.Pq Pa /etc/ssh/ssh_config . 56.It
57user's configuration file
58.Pq Pa $HOME/.ssh/config
59.It
60system-wide configuration file
61.Pq Pa /etc/ssh/ssh_config
62.El
57.Pp 63.Pp
58For each parameter, the first obtained value 64For each parameter, the first obtained value
59will be used. 65will be used.
@@ -259,6 +265,13 @@ or
259.Dq no . 265.Dq no .
260The default is 266The default is
261.Dq no . 267.Dq no .
268.Pp
269Agent forwarding should be enabled with caution. Users with the
270ability to bypass file permissions on the remote host (for the agent's
271Unix-domain socket) can access the local agent through the forwarded
272connection. An attacker cannot obtain key material from the agent,
273however they can perform operations on the keys that enable them to
274authenticate using the identities loaded into the agent.
262.It Cm ForwardX11 275.It Cm ForwardX11
263Specifies whether X11 connections will be automatically redirected 276Specifies whether X11 connections will be automatically redirected
264over the secure channel and 277over the secure channel and
@@ -270,6 +283,12 @@ or
270.Dq no . 283.Dq no .
271The default is 284The default is
272.Dq no . 285.Dq no .
286.Pp
287X11 forwarding should be enabled with caution. Users with the ability
288to bypass file permissions on the remote host (for the user's X
289authorization database) can access the local X11 display through the
290forwarded connection. An attacker may then be able to perform
291activities such as keystroke monitoring.
273.It Cm GatewayPorts 292.It Cm GatewayPorts
274Specifies whether remote hosts are allowed to connect to local 293Specifies whether remote hosts are allowed to connect to local
275forwarded ports. 294forwarded ports.
@@ -342,7 +361,6 @@ identities will be tried in sequence.
342Specifies whether the system should send TCP keepalive messages to the 361Specifies whether the system should send TCP keepalive messages to the
343other side. 362other side.
344If they are sent, death of the connection or crash of one 363If they are sent, death of the connection or crash of one
345of the machines will be properly noticed.
346of the machines will be properly noticed. This option only uses TCP 364of the machines will be properly noticed. This option only uses TCP
347keepalives (as opposed to using ssh level keepalives), so takes a long 365keepalives (as opposed to using ssh level keepalives), so takes a long
348time to notice when the connection dies. As such, you probably want 366time to notice when the connection dies. As such, you probably want
@@ -512,7 +530,12 @@ or
512.Dq no . 530.Dq no .
513The default is 531The default is
514.Dq no . 532.Dq no .
515This option applies to protocol version 1 only. 533This option applies to protocol version 1 only and requires
534.Nm ssh
535to be setuid root and
536.Cm UsePrivilegedPort
537to be set to
538.Dq yes .
516.It Cm RhostsRSAAuthentication 539.It Cm RhostsRSAAuthentication
517Specifies whether to try rhosts based authentication with RSA host 540Specifies whether to try rhosts based authentication with RSA host
518authentication. 541authentication.
@@ -600,6 +623,10 @@ or
600.Dq no . 623.Dq no .
601The default is 624The default is
602.Dq no . 625.Dq no .
626If set to
627.Dq yes
628.Nm ssh
629must be setuid root.
603Note that this option must be set to 630Note that this option must be set to
604.Dq yes 631.Dq yes
605if 632if
@@ -617,7 +644,7 @@ Specifies a file to use for the user
617host key database instead of 644host key database instead of
618.Pa $HOME/.ssh/known_hosts . 645.Pa $HOME/.ssh/known_hosts .
619.It Cm XAuthLocation 646.It Cm XAuthLocation
620Specifies the location of the 647Specifies the full pathname of the
621.Xr xauth 1 648.Xr xauth 1
622program. 649program.
623The default is 650The default is