summaryrefslogtreecommitdiff
path: root/sshd.0
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2015-08-19 14:23:50 +0100
committerColin Watson <cjwatson@debian.org>2015-08-19 14:23:50 +0100
commitbaccdb349b31c47cd76fb63211f754ed33a9707e (patch)
treed03653f975fd4eb8bf71bb0c9d168614401202fa /sshd.0
parent487bdb3a5ef6075887b830ccb8a0b14f6da78e93 (diff)
parent9f82e5a9042f2d872e98f48a876fcab3e25dd9bb (diff)
Import openssh_6.8p1.orig.tar.gz
Diffstat (limited to 'sshd.0')
-rw-r--r--sshd.065
1 files changed, 32 insertions, 33 deletions
diff --git a/sshd.0 b/sshd.0
index 3008e01bd..442cd572f 100644
--- a/sshd.0
+++ b/sshd.0
@@ -1,7 +1,7 @@
1SSHD(8) System Manager's Manual SSHD(8) 1SSHD(8) System Manager's Manual SSHD(8)
2 2
3NAME 3NAME
4 sshd - OpenSSH SSH daemon 4 sshd M-bM-^@M-^S OpenSSH SSH daemon
5 5
6SYNOPSIS 6SYNOPSIS
7 sshd [-46DdeiqTt] [-b bits] [-C connection_spec] 7 sshd [-46DdeiqTt] [-b bits] [-C connection_spec]
@@ -41,10 +41,9 @@ DESCRIPTION
41 file that would apply to the specified user, host, and address 41 file that would apply to the specified user, host, and address
42 will be set before the configuration is written to standard 42 will be set before the configuration is written to standard
43 output. The connection parameters are supplied as keyword=value 43 output. The connection parameters are supplied as keyword=value
44 pairs. The keywords are ``user'', ``host'', ``laddr'', 44 pairs. The keywords are M-bM-^@M-^\userM-bM-^@M-^], M-bM-^@M-^\hostM-bM-^@M-^], M-bM-^@M-^\laddrM-bM-^@M-^], M-bM-^@M-^\lportM-bM-^@M-^], and
45 ``lport'', and ``addr''. All are required and may be supplied in 45 M-bM-^@M-^\addrM-bM-^@M-^]. All are required and may be supplied in any order,
46 any order, either with multiple -C options or as a comma- 46 either with multiple -C options or as a comma-separated list.
47 separated list.
48 47
49 -c host_certificate_file 48 -c host_certificate_file
50 Specifies a path to a certificate file to identify sshd during 49 Specifies a path to a certificate file to identify sshd during
@@ -148,7 +147,7 @@ DESCRIPTION
148AUTHENTICATION 147AUTHENTICATION
149 The OpenSSH SSH daemon supports SSH protocols 1 and 2. The default is to 148 The OpenSSH SSH daemon supports SSH protocols 1 and 2. The default is to
150 use protocol 2 only, though this can be changed via the Protocol option 149 use protocol 2 only, though this can be changed via the Protocol option
151 in sshd_config(5). Protocol 2 supports DSA, ECDSA, ED25519 and RSA keys; 150 in sshd_config(5). Protocol 2 supports DSA, ECDSA, Ed25519 and RSA keys;
152 protocol 1 only supports RSA keys. For both protocols, each host has a 151 protocol 1 only supports RSA keys. For both protocols, each host has a
153 host-specific key, normally 2048 bits, used to identify the host. 152 host-specific key, normally 2048 bits, used to identify the host.
154 153
@@ -185,11 +184,11 @@ AUTHENTICATION
185 listed in DenyUsers or its group is listed in DenyGroups . The 184 listed in DenyUsers or its group is listed in DenyGroups . The
186 definition of a locked account is system dependant. Some platforms have 185 definition of a locked account is system dependant. Some platforms have
187 their own account database (eg AIX) and some modify the passwd field ( 186 their own account database (eg AIX) and some modify the passwd field (
188 `*LK*' on Solaris and UnixWare, `*' on HP-UX, containing `Nologin' on 187 M-bM-^@M-^X*LK*M-bM-^@M-^Y on Solaris and UnixWare, M-bM-^@M-^X*M-bM-^@M-^Y on HP-UX, containing M-bM-^@M-^XNologinM-bM-^@M-^Y on
189 Tru64, a leading `*LOCKED*' on FreeBSD and a leading `!' on most 188 Tru64, a leading M-bM-^@M-^X*LOCKED*M-bM-^@M-^Y on FreeBSD and a leading M-bM-^@M-^X!M-bM-^@M-^Y on most
190 Linuxes). If there is a requirement to disable password authentication 189 Linuxes). If there is a requirement to disable password authentication
191 for the account while allowing still public-key, then the passwd field 190 for the account while allowing still public-key, then the passwd field
192 should be set to something other than these values (eg `NP' or `*NP*' ). 191 should be set to something other than these values (eg M-bM-^@M-^XNPM-bM-^@M-^Y or M-bM-^@M-^X*NP*M-bM-^@M-^Y ).
193 192
194 If the client successfully authenticates itself, a dialog for preparing 193 If the client successfully authenticates itself, a dialog for preparing
195 the session is entered. At this time the client may request things like 194 the session is entered. At this time the client may request things like
@@ -230,7 +229,7 @@ LOGIN PROCESS
230 229
231 8. If ~/.ssh/rc exists and the sshd_config(5) PermitUserRC option 230 8. If ~/.ssh/rc exists and the sshd_config(5) PermitUserRC option
232 is set, runs it; else if /etc/ssh/sshrc exists, runs it; 231 is set, runs it; else if /etc/ssh/sshrc exists, runs it;
233 otherwise runs xauth. The ``rc'' files are given the X11 232 otherwise runs xauth. The M-bM-^@M-^\rcM-bM-^@M-^] files are given the X11
234 authentication protocol and cookie in standard input. See 233 authentication protocol and cookie in standard input. See
235 SSHRC, below. 234 SSHRC, below.
236 235
@@ -270,7 +269,7 @@ AUTHORIZED_KEYS FILE FORMAT
270 AuthorizedKeysFile specifies the files containing public keys for public 269 AuthorizedKeysFile specifies the files containing public keys for public
271 key authentication; if none is specified, the default is 270 key authentication; if none is specified, the default is
272 ~/.ssh/authorized_keys and ~/.ssh/authorized_keys2. Each line of the 271 ~/.ssh/authorized_keys and ~/.ssh/authorized_keys2. Each line of the
273 file contains one key (empty lines and lines starting with a `#' are 272 file contains one key (empty lines and lines starting with a M-bM-^@M-^X#M-bM-^@M-^Y are
274 ignored as comments). Protocol 1 public keys consist of the following 273 ignored as comments). Protocol 1 public keys consist of the following
275 space-separated fields: options, bits, exponent, modulus, comment. 274 space-separated fields: options, bits, exponent, modulus, comment.
276 Protocol 2 public key consist of: options, keytype, base64-encoded key, 275 Protocol 2 public key consist of: options, keytype, base64-encoded key,
@@ -279,9 +278,9 @@ AUTHORIZED_KEYS FILE FORMAT
279 starts with a number). The bits, exponent, modulus, and comment fields 278 starts with a number). The bits, exponent, modulus, and comment fields
280 give the RSA key for protocol version 1; the comment field is not used 279 give the RSA key for protocol version 1; the comment field is not used
281 for anything (but may be convenient for the user to identify the key). 280 for anything (but may be convenient for the user to identify the key).
282 For protocol version 2 the keytype is ``ecdsa-sha2-nistp256'', 281 For protocol version 2 the keytype is M-bM-^@M-^\ecdsa-sha2-nistp256M-bM-^@M-^],
283 ``ecdsa-sha2-nistp384'', ``ecdsa-sha2-nistp521'', ``ssh-ed25519'', 282 M-bM-^@M-^\ecdsa-sha2-nistp384M-bM-^@M-^], M-bM-^@M-^\ecdsa-sha2-nistp521M-bM-^@M-^], M-bM-^@M-^\ssh-ed25519M-bM-^@M-^], M-bM-^@M-^\ssh-dssM-bM-^@M-^] or
284 ``ssh-dss'' or ``ssh-rsa''. 283 M-bM-^@M-^\ssh-rsaM-bM-^@M-^].
285 284
286 Note that lines in this file are usually several hundred bytes long 285 Note that lines in this file are usually several hundred bytes long
287 (because of the size of the public key encoding) up to a limit of 8 286 (because of the size of the public key encoding) up to a limit of 8
@@ -370,7 +369,7 @@ AUTHORIZED_KEYS FILE FORMAT
370 Any X11 forward requests by the client will return an error. 369 Any X11 forward requests by the client will return an error.
371 370
372 permitopen="host:port" 371 permitopen="host:port"
373 Limit local ``ssh -L'' port forwarding such that it may only 372 Limit local port forwarding with ssh(1) -L such that it may only
374 connect to the specified host and port. IPv6 addresses can be 373 connect to the specified host and port. IPv6 addresses can be
375 specified by enclosing the address in square brackets. Multiple 374 specified by enclosing the address in square brackets. Multiple
376 permitopen options may be applied separated by commas. No 375 permitopen options may be applied separated by commas. No
@@ -416,23 +415,23 @@ SSH_KNOWN_HOSTS FILE FORMAT
416 separated by spaces. 415 separated by spaces.
417 416
418 The marker is optional, but if it is present then it must be one of 417 The marker is optional, but if it is present then it must be one of
419 ``@cert-authority'', to indicate that the line contains a certification 418 M-bM-^@M-^\@cert-authorityM-bM-^@M-^], to indicate that the line contains a certification
420 authority (CA) key, or ``@revoked'', to indicate that the key contained 419 authority (CA) key, or M-bM-^@M-^\@revokedM-bM-^@M-^], to indicate that the key contained on
421 on the line is revoked and must not ever be accepted. Only one marker 420 the line is revoked and must not ever be accepted. Only one marker
422 should be used on a key line. 421 should be used on a key line.
423 422
424 Hostnames is a comma-separated list of patterns (`*' and `?' act as 423 Hostnames is a comma-separated list of patterns (M-bM-^@M-^X*M-bM-^@M-^Y and M-bM-^@M-^X?M-bM-^@M-^Y act as
425 wildcards); each pattern in turn is matched against the canonical host 424 wildcards); each pattern in turn is matched against the canonical host
426 name (when authenticating a client) or against the user-supplied name 425 name (when authenticating a client) or against the user-supplied name
427 (when authenticating a server). A pattern may also be preceded by `!' to 426 (when authenticating a server). A pattern may also be preceded by M-bM-^@M-^X!M-bM-^@M-^Y to
428 indicate negation: if the host name matches a negated pattern, it is not 427 indicate negation: if the host name matches a negated pattern, it is not
429 accepted (by that line) even if it matched another pattern on the line. 428 accepted (by that line) even if it matched another pattern on the line.
430 A hostname or address may optionally be enclosed within `[' and `]' 429 A hostname or address may optionally be enclosed within M-bM-^@M-^X[M-bM-^@M-^Y and M-bM-^@M-^X]M-bM-^@M-^Y
431 brackets then followed by `:' and a non-standard port number. 430 brackets then followed by M-bM-^@M-^X:M-bM-^@M-^Y and a non-standard port number.
432 431
433 Alternately, hostnames may be stored in a hashed form which hides host 432 Alternately, hostnames may be stored in a hashed form which hides host
434 names and addresses should the file's contents be disclosed. Hashed 433 names and addresses should the file's contents be disclosed. Hashed
435 hostnames start with a `|' character. Only one hashed hostname may 434 hostnames start with a M-bM-^@M-^X|M-bM-^@M-^Y character. Only one hashed hostname may
436 appear on a single line and none of the above negation or wildcard 435 appear on a single line and none of the above negation or wildcard
437 operators may be applied. 436 operators may be applied.
438 437
@@ -440,21 +439,21 @@ SSH_KNOWN_HOSTS FILE FORMAT
440 they can be obtained, for example, from /etc/ssh/ssh_host_key.pub. The 439 they can be obtained, for example, from /etc/ssh/ssh_host_key.pub. The
441 optional comment field continues to the end of the line, and is not used. 440 optional comment field continues to the end of the line, and is not used.
442 441
443 Lines starting with `#' and empty lines are ignored as comments. 442 Lines starting with M-bM-^@M-^X#M-bM-^@M-^Y and empty lines are ignored as comments.
444 443
445 When performing host authentication, authentication is accepted if any 444 When performing host authentication, authentication is accepted if any
446 matching line has the proper key; either one that matches exactly or, if 445 matching line has the proper key; either one that matches exactly or, if
447 the server has presented a certificate for authentication, the key of the 446 the server has presented a certificate for authentication, the key of the
448 certification authority that signed the certificate. For a key to be 447 certification authority that signed the certificate. For a key to be
449 trusted as a certification authority, it must use the ``@cert-authority'' 448 trusted as a certification authority, it must use the M-bM-^@M-^\@cert-authorityM-bM-^@M-^]
450 marker described above. 449 marker described above.
451 450
452 The known hosts file also provides a facility to mark keys as revoked, 451 The known hosts file also provides a facility to mark keys as revoked,
453 for example when it is known that the associated private key has been 452 for example when it is known that the associated private key has been
454 stolen. Revoked keys are specified by including the ``@revoked'' marker 453 stolen. Revoked keys are specified by including the M-bM-^@M-^\@revokedM-bM-^@M-^] marker at
455 at the beginning of the key line, and are never accepted for 454 the beginning of the key line, and are never accepted for authentication
456 authentication or as certification authorities, but instead will produce 455 or as certification authorities, but instead will produce a warning from
457 a warning from ssh(1) when they are encountered. 456 ssh(1) when they are encountered.
458 457
459 It is permissible (but not recommended) to have several lines or 458 It is permissible (but not recommended) to have several lines or
460 different host keys for the same names. This will inevitably happen when 459 different host keys for the same names. This will inevitably happen when
@@ -514,7 +513,7 @@ FILES
514 for the user, and not accessible by others. 513 for the user, and not accessible by others.
515 514
516 ~/.ssh/authorized_keys 515 ~/.ssh/authorized_keys
517 Lists the public keys (DSA, ECDSA, ED25519, RSA) that can be used 516 Lists the public keys (DSA, ECDSA, Ed25519, RSA) that can be used
518 for logging in as this user. The format of this file is 517 for logging in as this user. The format of this file is
519 described above. The content of the file is not highly 518 described above. The content of the file is not highly
520 sensitive, but the recommended permissions are read/write for the 519 sensitive, but the recommended permissions are read/write for the
@@ -524,12 +523,12 @@ FILES
524 are writable by other users, then the file could be modified or 523 are writable by other users, then the file could be modified or
525 replaced by unauthorized users. In this case, sshd will not 524 replaced by unauthorized users. In this case, sshd will not
526 allow it to be used unless the StrictModes option has been set to 525 allow it to be used unless the StrictModes option has been set to
527 ``no''. 526 M-bM-^@M-^\noM-bM-^@M-^].
528 527
529 ~/.ssh/environment 528 ~/.ssh/environment
530 This file is read into the environment at login (if it exists). 529 This file is read into the environment at login (if it exists).
531 It can only contain empty lines, comment lines (that start with 530 It can only contain empty lines, comment lines (that start with
532 `#'), and assignment lines of the form name=value. The file 531 M-bM-^@M-^X#M-bM-^@M-^Y), and assignment lines of the form name=value. The file
533 should be writable only by the user; it need not be readable by 532 should be writable only by the user; it need not be readable by
534 anyone else. Environment processing is disabled by default and 533 anyone else. Environment processing is disabled by default and
535 is controlled via the PermitUserEnvironment option. 534 is controlled via the PermitUserEnvironment option.
@@ -632,4 +631,4 @@ AUTHORS
632 versions 1.5 and 2.0. Niels Provos and Markus Friedl contributed support 631 versions 1.5 and 2.0. Niels Provos and Markus Friedl contributed support
633 for privilege separation. 632 for privilege separation.
634 633
635OpenBSD 5.6 July 3, 2014 OpenBSD 5.6 634OpenBSD 5.7 November 15, 2014 OpenBSD 5.7