summaryrefslogtreecommitdiff
path: root/ssh_config.5
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2011-09-06 14:56:29 +0100
committerColin Watson <cjwatson@debian.org>2011-09-06 14:56:29 +0100
commit978e62d6f14c60747bddef2cc72d66a9c8b83b54 (patch)
tree89400a44e42d84937deba7864e4964d6c7734da5 /ssh_config.5
parent87c685b8c6a49814fd782288097b3093f975aa72 (diff)
parent3a7e89697ca363de0f64e0d5704c57219294e41c (diff)
* New upstream release (http://www.openssh.org/txt/release-5.9).
- Introduce sandboxing of the pre-auth privsep child using an optional sshd_config(5) "UsePrivilegeSeparation=sandbox" mode that enables mandatory restrictions on the syscalls the privsep child can perform. - Add new SHA256-based HMAC transport integrity modes from http://www.ietf.org/id/draft-dbider-sha2-mac-for-ssh-02.txt. - The pre-authentication sshd(8) privilege separation slave process now logs via a socket shared with the master process, avoiding the need to maintain /dev/log inside the chroot (closes: #75043, #429243, #599240). - ssh(1) now warns when a server refuses X11 forwarding (closes: #504757). - sshd_config(5)'s AuthorizedKeysFile now accepts multiple paths, separated by whitespace (closes: #76312). The authorized_keys2 fallback is deprecated but documented (closes: #560156). - ssh(1) and sshd(8): set IPv6 traffic class from IPQoS, as well as IPv4 ToS/DSCP (closes: #498297). - ssh-add(1) now accepts keys piped from standard input. E.g. "ssh-add - < /path/to/key" (closes: #229124). - Clean up lost-passphrase text in ssh-keygen(1) (closes: #444691). - Say "required" rather than "recommended" in unprotected-private-key warning (LP: #663455).
Diffstat (limited to 'ssh_config.5')
-rw-r--r--ssh_config.570
1 files changed, 57 insertions, 13 deletions
diff --git a/ssh_config.5 b/ssh_config.5
index fc994d482..19bff6d54 100644
--- a/ssh_config.5
+++ b/ssh_config.5
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: ssh_config.5,v 1.146 2010/12/08 04:02:47 djm Exp $ 36.\" $OpenBSD: ssh_config.5,v 1.153 2011/08/02 01:22:11 djm Exp $
37.Dd $Mdocdate: December 8 2010 $ 37.Dd $Mdocdate: August 2 2011 $
38.Dt SSH_CONFIG 5 38.Dt SSH_CONFIG 5
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -128,6 +128,15 @@ The host is the
128argument given on the command line (i.e. the name is not converted to 128argument given on the command line (i.e. the name is not converted to
129a canonicalized host name before matching). 129a canonicalized host name before matching).
130.Pp 130.Pp
131A pattern entry may be negated by prefixing it with an exclamation mark
132.Pq Sq !\& .
133If a negated entry is matched, then the
134.Cm Host
135entry is ignored, regardless of whether any other patterns on the line
136match.
137Negated matches are therefore useful to provide exceptions for wildcard
138matches.
139.Pp
131See 140See
132.Sx PATTERNS 141.Sx PATTERNS
133for more information on patterns. 142for more information on patterns.
@@ -325,14 +334,22 @@ section above or the string
325.Dq none 334.Dq none
326to disable connection sharing. 335to disable connection sharing.
327In the path, 336In the path,
337.Ql %L
338will be substituted by the first component of the local host name,
328.Ql %l 339.Ql %l
329will be substituted by the local host name, 340will be substituted by the local host name (including any domain name),
330.Ql %h 341.Ql %h
331will be substituted by the target host name, 342will be substituted by the target host name,
343.Ql %n
344will be substituted by the original target host name
345specified on the command line,
332.Ql %p 346.Ql %p
333the port, and 347the port,
334.Ql %r 348.Ql %r
335by the remote login username. 349by the remote login username, and
350.Ql %u
351by the username of the user running
352.Xr ssh 1 .
336It is recommended that any 353It is recommended that any
337.Cm ControlPath 354.Cm ControlPath
338used for opportunistic connection sharing include 355used for opportunistic connection sharing include
@@ -521,9 +538,11 @@ or
521The default is 538The default is
522.Dq no . 539.Dq no .
523.It Cm GlobalKnownHostsFile 540.It Cm GlobalKnownHostsFile
524Specifies a file to use for the global 541Specifies one or more files to use for the global
525host key database instead of 542host key database, separated by whitespace.
526.Pa /etc/ssh/ssh_known_hosts . 543The default is
544.Pa /etc/ssh/ssh_known_hosts ,
545.Pa /etc/ssh/ssh_known_hosts2 .
527.It Cm GSSAPIAuthentication 546.It Cm GSSAPIAuthentication
528Specifies whether user authentication based on GSSAPI is allowed. 547Specifies whether user authentication based on GSSAPI is allowed.
529The default is 548The default is
@@ -625,7 +644,7 @@ Specifies the real host name to log into.
625This can be used to specify nicknames or abbreviations for hosts. 644This can be used to specify nicknames or abbreviations for hosts.
626If the hostname contains the character sequence 645If the hostname contains the character sequence
627.Ql %h , 646.Ql %h ,
628then this will be replaced with the host name specified on the commandline 647then this will be replaced with the host name specified on the command line
629(this is useful for manipulating unqualified names). 648(this is useful for manipulating unqualified names).
630The default is the name given on the command line. 649The default is the name given on the command line.
631Numeric IP addresses are also permitted (both on the command line and in 650Numeric IP addresses are also permitted (both on the command line and in
@@ -685,6 +704,10 @@ escape characters:
685It is possible to have 704It is possible to have
686multiple identity files specified in configuration files; all these 705multiple identity files specified in configuration files; all these
687identities will be tried in sequence. 706identities will be tried in sequence.
707Multiple
708.Cm IdentityFile
709directives will add to the list of identities tried (this behaviour
710differs from that of other configuration directives).
688.It Cm IPQoS 711.It Cm IPQoS
689Specifies the IPv4 type-of-service or DSCP class for connections. 712Specifies the IPv4 type-of-service or DSCP class for connections.
690Accepted values are 713Accepted values are
@@ -826,7 +849,9 @@ Multiple algorithms must be comma-separated.
826The default is: 849The default is:
827.Bd -literal -offset indent 850.Bd -literal -offset indent
828hmac-md5,hmac-sha1,umac-64@openssh.com, 851hmac-md5,hmac-sha1,umac-64@openssh.com,
829hmac-ripemd160,hmac-sha1-96,hmac-md5-96 852hmac-ripemd160,hmac-sha1-96,hmac-md5-96,
853hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,
854hmac-sha2-512-96
830.Ed 855.Ed
831.It Cm NoHostAuthenticationForLocalhost 856.It Cm NoHostAuthenticationForLocalhost
832This option can be used if the home directory is shared across machines. 857This option can be used if the home directory is shared across machines.
@@ -999,6 +1024,23 @@ will only succeed if the server's
999.Cm GatewayPorts 1024.Cm GatewayPorts
1000option is enabled (see 1025option is enabled (see
1001.Xr sshd_config 5 ) . 1026.Xr sshd_config 5 ) .
1027.It Cm RequestTTY
1028Specifies whether to request a pseudo-tty for the session.
1029The argument may be one of:
1030.Dq no
1031(never request a TTY),
1032.Dq yes
1033(always request a TTY when standard input is a TTY),
1034.Dq force
1035(always request a TTY) or
1036.Dq auto
1037(request a TTY when opening a login session).
1038This option mirrors the
1039.Fl t
1040and
1041.Fl T
1042flags for
1043.Xr ssh 1 .
1002.It Cm RhostsRSAAuthentication 1044.It Cm RhostsRSAAuthentication
1003Specifies whether to try rhosts based authentication with RSA host 1045Specifies whether to try rhosts based authentication with RSA host
1004authentication. 1046authentication.
@@ -1226,9 +1268,11 @@ This can be useful when a different user name is used on different machines.
1226This saves the trouble of 1268This saves the trouble of
1227having to remember to give the user name on the command line. 1269having to remember to give the user name on the command line.
1228.It Cm UserKnownHostsFile 1270.It Cm UserKnownHostsFile
1229Specifies a file to use for the user 1271Specifies one or more files to use for the user
1230host key database instead of 1272host key database, separated by whitespace.
1231.Pa ~/.ssh/known_hosts . 1273The default is
1274.Pa ~/.ssh/known_hosts ,
1275.Pa ~/.ssh/known_hosts2 .
1232.It Cm VerifyHostKeyDNS 1276.It Cm VerifyHostKeyDNS
1233Specifies whether to verify the remote key using DNS and SSHFP resource 1277Specifies whether to verify the remote key using DNS and SSHFP resource
1234records. 1278records.