summaryrefslogtreecommitdiff
path: root/ssh_config.5
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2018-04-03 08:20:28 +0100
committerColin Watson <cjwatson@debian.org>2018-04-03 08:57:25 +0100
commita0b2dce9bf518f561bbb5070c0fb0c38f49035dd (patch)
tree24298b823e93d4e6efe13f48f1512707ebd625f8 /ssh_config.5
parent9d4942dc192b6f1888c9ab73a512dd9b197b956c (diff)
parent76aa43d2298f322f0371b74462418d0461537131 (diff)
New upstream release (7.7p1)
Diffstat (limited to 'ssh_config.5')
-rw-r--r--ssh_config.552
1 files changed, 42 insertions, 10 deletions
diff --git a/ssh_config.5 b/ssh_config.5
index 2da7029af..ed6e5d026 100644
--- a/ssh_config.5
+++ b/ssh_config.5
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: ssh_config.5,v 1.256 2017/09/21 19:16:53 markus Exp $ 36.\" $OpenBSD: ssh_config.5,v 1.268 2018/02/23 07:38:09 jmc Exp $
37.Dd $Mdocdate: September 21 2017 $ 37.Dd $Mdocdate: February 23 2018 $
38.Dt SSH_CONFIG 5 38.Dt SSH_CONFIG 5
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -282,6 +282,13 @@ Note that this option does not work if
282.Cm UsePrivilegedPort 282.Cm UsePrivilegedPort
283is set to 283is set to
284.Cm yes . 284.Cm yes .
285.It Cm BindInterface
286Use the address of the specified interface on the local machine as the
287source address of the connection.
288Note that this option does not work if
289.Cm UsePrivilegedPort
290is set to
291.Cm yes .
285.It Cm CanonicalDomains 292.It Cm CanonicalDomains
286When 293When
287.Cm CanonicalizeHostname 294.Cm CanonicalizeHostname
@@ -1071,7 +1078,10 @@ The default is:
1071curve25519-sha256,curve25519-sha256@libssh.org, 1078curve25519-sha256,curve25519-sha256@libssh.org,
1072ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521, 1079ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,
1073diffie-hellman-group-exchange-sha256, 1080diffie-hellman-group-exchange-sha256,
1081diffie-hellman-group16-sha512,
1082diffie-hellman-group18-sha512,
1074diffie-hellman-group-exchange-sha1, 1083diffie-hellman-group-exchange-sha1,
1084diffie-hellman-group14-sha256,
1075diffie-hellman-group14-sha1 1085diffie-hellman-group14-sha1
1076.Ed 1086.Ed
1077.Pp 1087.Pp
@@ -1163,10 +1173,7 @@ hmac-sha2-256,hmac-sha2-512,hmac-sha1
1163The list of available MAC algorithms may also be obtained using 1173The list of available MAC algorithms may also be obtained using
1164.Qq ssh -Q mac . 1174.Qq ssh -Q mac .
1165.It Cm NoHostAuthenticationForLocalhost 1175.It Cm NoHostAuthenticationForLocalhost
1166This option can be used if the home directory is shared across machines. 1176Disable host authentication for localhost (loopback addresses).
1167In this case localhost will refer to a different machine on each of
1168the machines and the user will get many warnings about changed host keys.
1169However, this option disables host authentication for localhost.
1170The argument to this keyword must be 1177The argument to this keyword must be
1171.Cm yes 1178.Cm yes
1172or 1179or
@@ -1254,13 +1261,14 @@ For example, the following directive would connect via an HTTP proxy at
1254ProxyCommand /usr/bin/nc -X connect -x 192.0.2.0:8080 %h %p 1261ProxyCommand /usr/bin/nc -X connect -x 192.0.2.0:8080 %h %p
1255.Ed 1262.Ed
1256.It Cm ProxyJump 1263.It Cm ProxyJump
1257Specifies one or more jump proxies as 1264Specifies one or more jump proxies as either
1258.Xo 1265.Xo
1259.Sm off 1266.Sm off
1260.Op Ar user No @ 1267.Op Ar user No @
1261.Ar host 1268.Ar host
1262.Op : Ns Ar port 1269.Op : Ns Ar port
1263.Sm on 1270.Sm on
1271or an ssh URI
1264.Xc . 1272.Xc .
1265Multiple proxies may be separated by comma characters and will be visited 1273Multiple proxies may be separated by comma characters and will be visited
1266sequentially. 1274sequentially.
@@ -1520,7 +1528,7 @@ If this flag is set to
1520will never automatically add host keys to the 1528will never automatically add host keys to the
1521.Pa ~/.ssh/known_hosts 1529.Pa ~/.ssh/known_hosts
1522file, and refuses to connect to hosts whose host key has changed. 1530file, and refuses to connect to hosts whose host key has changed.
1523This provides maximum protection against trojan horse attacks, 1531This provides maximum protection against man-in-the-middle (MITM) attacks,
1524though it can be annoying when the 1532though it can be annoying when the
1525.Pa /etc/ssh/ssh_known_hosts 1533.Pa /etc/ssh/ssh_known_hosts
1526file is poorly maintained or when connections to new hosts are 1534file is poorly maintained or when connections to new hosts are
@@ -1578,6 +1586,9 @@ This is important in scripts, and many users want it too.
1578.Pp 1586.Pp
1579To disable TCP keepalive messages, the value should be set to 1587To disable TCP keepalive messages, the value should be set to
1580.Cm no . 1588.Cm no .
1589See also
1590.Cm ServerAliveInterval
1591for protocol-level keepalives.
1581.It Cm Tunnel 1592.It Cm Tunnel
1582Request 1593Request
1583.Xr tun 4 1594.Xr tun 4
@@ -1743,6 +1754,18 @@ pool,
1743the following entry (in authorized_keys) could be used: 1754the following entry (in authorized_keys) could be used:
1744.Pp 1755.Pp
1745.Dl from=\&"!*.dialup.example.com,*.example.com\&" 1756.Dl from=\&"!*.dialup.example.com,*.example.com\&"
1757.Pp
1758Note that a negated match will never produce a positive result by itself.
1759For example, attempting to match
1760.Qq host3
1761against the following pattern-list will fail:
1762.Pp
1763.Dl from=\&"!host1,!host2\&"
1764.Pp
1765The solution here is to include a term that will yield a positive match,
1766such as a wildcard:
1767.Pp
1768.Dl from=\&"!host1,!host2,*\&"
1746.Sh TOKENS 1769.Sh TOKENS
1747Arguments to some keywords can make use of tokens, 1770Arguments to some keywords can make use of tokens,
1748which are expanded at runtime: 1771which are expanded at runtime:
@@ -1752,7 +1775,7 @@ which are expanded at runtime:
1752A literal 1775A literal
1753.Sq % . 1776.Sq % .
1754.It \&%C 1777.It \&%C
1755Shorthand for %l%h%p%r. 1778Hash of %l%h%p%r.
1756.It %d 1779.It %d
1757Local user's home directory. 1780Local user's home directory.
1758.It %h 1781.It %h
@@ -1769,6 +1792,15 @@ The original remote hostname, as given on the command line.
1769The remote port. 1792The remote port.
1770.It %r 1793.It %r
1771The remote username. 1794The remote username.
1795.It \&%T
1796The local
1797.Xr tun 4
1798or
1799.Xr tap 4
1800network interface assigned if
1801tunnel forwarding was requested, or
1802.Qq NONE
1803otherwise.
1772.It %u 1804.It %u
1773The local username. 1805The local username.
1774.El 1806.El
@@ -1791,7 +1823,7 @@ and
1791accept the tokens %%, %d, %h, %l, %r, and %u. 1823accept the tokens %%, %d, %h, %l, %r, and %u.
1792.Pp 1824.Pp
1793.Cm LocalCommand 1825.Cm LocalCommand
1794accepts the tokens %%, %C, %d, %h, %l, %n, %p, %r, and %u. 1826accepts the tokens %%, %C, %d, %h, %l, %n, %p, %r, %T, and %u.
1795.Pp 1827.Pp
1796.Cm ProxyCommand 1828.Cm ProxyCommand
1797accepts the tokens %%, %h, %p, and %r. 1829accepts the tokens %%, %h, %p, and %r.