summaryrefslogtreecommitdiff
path: root/ssh_config.5
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2005-05-25 11:01:01 +0000
committerColin Watson <cjwatson@debian.org>2005-05-25 11:01:01 +0000
commite88de75a1a236779a10e8ccbcc51d25308be8840 (patch)
tree7495477a2a7d0cac17a9fcded020b6ea816182ef /ssh_config.5
parent30a0f9443782cd9d7308acd09430bf586186aa55 (diff)
parent5d05471f6657646d1d6500c7c43134462c407ee6 (diff)
Merge 4.0p1 to the trunk.
Diffstat (limited to 'ssh_config.5')
-rw-r--r--ssh_config.5101
1 files changed, 89 insertions, 12 deletions
diff --git a/ssh_config.5 b/ssh_config.5
index a8767b493..e41b34b15 100644
--- a/ssh_config.5
+++ b/ssh_config.5
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: ssh_config.5,v 1.38 2004/06/26 09:11:14 jmc Exp $ 37.\" $OpenBSD: ssh_config.5,v 1.47 2005/03/07 23:41:54 jmc Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSH_CONFIG 5 39.Dt SSH_CONFIG 5
40.Os 40.Os
@@ -63,7 +63,7 @@ system-wide configuration file
63.Pp 63.Pp
64For each parameter, the first obtained value 64For each parameter, the first obtained value
65will be used. 65will be used.
66The configuration files contain sections bracketed by 66The configuration files contain sections separated by
67.Dq Host 67.Dq Host
68specifications, and that section is only applied for hosts that 68specifications, and that section is only applied for hosts that
69match one of the patterns given in the specification. 69match one of the patterns given in the specification.
@@ -120,9 +120,9 @@ Specifies which address family to use when connecting.
120Valid arguments are 120Valid arguments are
121.Dq any , 121.Dq any ,
122.Dq inet 122.Dq inet
123(Use IPv4 only) or 123(use IPv4 only) or
124.Dq inet6 124.Dq inet6
125(Use IPv6 only.) 125(use IPv6 only).
126.It Cm BatchMode 126.It Cm BatchMode
127If set to 127If set to
128.Dq yes , 128.Dq yes ,
@@ -366,11 +366,16 @@ option is also enabled.
366If this option is set to 366If this option is set to
367.Dq yes 367.Dq yes
368then remote X11 clients will have full access to the original X11 display. 368then remote X11 clients will have full access to the original X11 display.
369.Pp
369If this option is set to 370If this option is set to
370.Dq no 371.Dq no
371then remote X11 clients will be considered untrusted and prevented 372then remote X11 clients will be considered untrusted and prevented
372from stealing or tampering with data belonging to trusted X11 373from stealing or tampering with data belonging to trusted X11
373clients. 374clients.
375Furthermore, the
376.Xr xauth 1
377token used for the session will be set to expire after 20 minutes.
378Remote clients will be refused access after this time.
374.Pp 379.Pp
375The default is 380The default is
376.Dq yes 381.Dq yes
@@ -410,6 +415,22 @@ Forward (delegate) credentials to the server.
410The default is 415The default is
411.Dq no . 416.Dq no .
412Note that this option applies to protocol version 2 only. 417Note that this option applies to protocol version 2 only.
418.It Cm HashKnownHosts
419Indicates that
420.Nm ssh
421should hash host names and addresses when they are added to
422.Pa $HOME/.ssh/known_hosts .
423These hashed names may be used normally by
424.Nm ssh
425and
426.Nm sshd ,
427but they do not reveal identifying information should the file's contents
428be disclosed.
429The default is
430.Dq no .
431Note that hashing of names and addresses will not be retrospectively applied
432to existing known hosts files, but these may be manually hashed using
433.Xr ssh-keygen 1 .
413.It Cm HostbasedAuthentication 434.It Cm HostbasedAuthentication
414Specifies whether to try rhosts based authentication with public key 435Specifies whether to try rhosts based authentication with public key
415authentication. 436authentication.
@@ -475,16 +496,45 @@ This option is intented for situations where
475offers many different identities. 496offers many different identities.
476The default is 497The default is
477.Dq no . 498.Dq no .
499.It Cm KbdInteractiveDevices
500Specifies the list of methods to use in keyboard-interactive authentication.
501Multiple method names must be comma-separated.
502The default is to use the server specified list.
478.It Cm LocalForward 503.It Cm LocalForward
479Specifies that a TCP/IP port on the local machine be forwarded over 504Specifies that a TCP/IP port on the local machine be forwarded over
480the secure channel to the specified host and port from the remote machine. 505the secure channel to the specified host and port from the remote machine.
481The first argument must be a port number, and the second must be 506The first argument must be a port number, and the second must be
482.Ar host:port . 507.Xo
483IPv6 addresses can be specified with an alternative syntax: 508.Sm off
484.Ar host/port . 509.Oo Ar bind_address : Oc
485Multiple forwardings may be specified, and additional 510.Ar host : port
486forwardings can be given on the command line. 511.Sm on
512.Xc .
513IPv6 addresses can be specified by enclosing addresses in square brackets or
514by using an alternative syntax:
515.Sm off
516.Xo
517.Op Ar bind_address No /
518.Ar host No / Ar port
519.Xc .
520.Sm on
521Multiple forwardings may be specified, and additional forwardings can be
522given on the command line.
487Only the superuser can forward privileged ports. 523Only the superuser can forward privileged ports.
524By default, the local port is bound in accordance with the
525.Cm GatewayPorts
526setting.
527However, an explicit
528.Ar bind_address
529may be used to bind the connection to a specific address.
530The
531.Ar bind_address
532of
533.Dq localhost
534indicates that the listening port be bound for local use only, while an
535empty address or
536.Sq *
537indicates that the port should be available from all interfaces.
488.It Cm LogLevel 538.It Cm LogLevel
489Gives the verbosity level that is used when logging messages from 539Gives the verbosity level that is used when logging messages from
490.Nm ssh . 540.Nm ssh .
@@ -591,12 +641,39 @@ This option applies to protocol version 2 only.
591Specifies that a TCP/IP port on the remote machine be forwarded over 641Specifies that a TCP/IP port on the remote machine be forwarded over
592the secure channel to the specified host and port from the local machine. 642the secure channel to the specified host and port from the local machine.
593The first argument must be a port number, and the second must be 643The first argument must be a port number, and the second must be
594.Ar host:port . 644.Xo
595IPv6 addresses can be specified with an alternative syntax: 645.Sm off
596.Ar host/port . 646.Oo Ar bind_address : Oc
647.Ar host : port
648.Sm on
649.Xc .
650IPv6 addresses can be specified by enclosing any addresses in square brackets
651or by using the alternative syntax:
652.Sm off
653.Xo
654.Op Ar bind_address No /
655.Ar host No / Ar port
656.Xc .
657.Sm on
597Multiple forwardings may be specified, and additional 658Multiple forwardings may be specified, and additional
598forwardings can be given on the command line. 659forwardings can be given on the command line.
599Only the superuser can forward privileged ports. 660Only the superuser can forward privileged ports.
661.Pp
662If the
663.Ar bind_address
664is not specified, the default is to only bind to loopback addresses.
665If the
666.Ar bind_address
667is
668.Ql *
669or an empty string, then the forwarding is requested to listen on all
670interfaces.
671Specifying a remote
672.Ar bind_address
673will only succeed if the server's
674.Cm GatewayPorts
675option is enabled (see
676.Xr sshd_config 5 ) .
600.It Cm RhostsRSAAuthentication 677.It Cm RhostsRSAAuthentication
601Specifies whether to try rhosts based authentication with RSA host 678Specifies whether to try rhosts based authentication with RSA host
602authentication. 679authentication.