diff options
author | Colin Watson <cjwatson@debian.org> | 2015-08-19 14:23:50 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2015-08-19 14:23:50 +0100 |
commit | baccdb349b31c47cd76fb63211f754ed33a9707e (patch) | |
tree | d03653f975fd4eb8bf71bb0c9d168614401202fa /sshd.0 | |
parent | 487bdb3a5ef6075887b830ccb8a0b14f6da78e93 (diff) | |
parent | 9f82e5a9042f2d872e98f48a876fcab3e25dd9bb (diff) |
Import openssh_6.8p1.orig.tar.gz
Diffstat (limited to 'sshd.0')
-rw-r--r-- | sshd.0 | 65 |
1 files changed, 32 insertions, 33 deletions
@@ -1,7 +1,7 @@ | |||
1 | SSHD(8) System Manager's Manual SSHD(8) | 1 | SSHD(8) System Manager's Manual SSHD(8) |
2 | 2 | ||
3 | NAME | 3 | NAME |
4 | sshd - OpenSSH SSH daemon | 4 | sshd M-bM-^@M-^S OpenSSH SSH daemon |
5 | 5 | ||
6 | SYNOPSIS | 6 | SYNOPSIS |
7 | sshd [-46DdeiqTt] [-b bits] [-C connection_spec] | 7 | sshd [-46DdeiqTt] [-b bits] [-C connection_spec] |
@@ -41,10 +41,9 @@ DESCRIPTION | |||
41 | file that would apply to the specified user, host, and address | 41 | file that would apply to the specified user, host, and address |
42 | will be set before the configuration is written to standard | 42 | will be set before the configuration is written to standard |
43 | output. The connection parameters are supplied as keyword=value | 43 | output. The connection parameters are supplied as keyword=value |
44 | pairs. The keywords are ``user'', ``host'', ``laddr'', | 44 | pairs. The keywords are M-bM-^@M-^\userM-bM-^@M-^], M-bM-^@M-^\hostM-bM-^@M-^], M-bM-^@M-^\laddrM-bM-^@M-^], M-bM-^@M-^\lportM-bM-^@M-^], and |
45 | ``lport'', and ``addr''. All are required and may be supplied in | 45 | M-bM-^@M-^\addrM-bM-^@M-^]. All are required and may be supplied in any order, |
46 | any order, either with multiple -C options or as a comma- | 46 | either with multiple -C options or as a comma-separated list. |
47 | separated list. | ||
48 | 47 | ||
49 | -c host_certificate_file | 48 | -c host_certificate_file |
50 | Specifies a path to a certificate file to identify sshd during | 49 | Specifies a path to a certificate file to identify sshd during |
@@ -148,7 +147,7 @@ DESCRIPTION | |||
148 | AUTHENTICATION | 147 | AUTHENTICATION |
149 | The OpenSSH SSH daemon supports SSH protocols 1 and 2. The default is to | 148 | The OpenSSH SSH daemon supports SSH protocols 1 and 2. The default is to |
150 | use protocol 2 only, though this can be changed via the Protocol option | 149 | use protocol 2 only, though this can be changed via the Protocol option |
151 | in sshd_config(5). Protocol 2 supports DSA, ECDSA, ED25519 and RSA keys; | 150 | in sshd_config(5). Protocol 2 supports DSA, ECDSA, Ed25519 and RSA keys; |
152 | protocol 1 only supports RSA keys. For both protocols, each host has a | 151 | protocol 1 only supports RSA keys. For both protocols, each host has a |
153 | host-specific key, normally 2048 bits, used to identify the host. | 152 | host-specific key, normally 2048 bits, used to identify the host. |
154 | 153 | ||
@@ -185,11 +184,11 @@ AUTHENTICATION | |||
185 | listed in DenyUsers or its group is listed in DenyGroups . The | 184 | listed in DenyUsers or its group is listed in DenyGroups . The |
186 | definition of a locked account is system dependant. Some platforms have | 185 | definition of a locked account is system dependant. Some platforms have |
187 | their own account database (eg AIX) and some modify the passwd field ( | 186 | their own account database (eg AIX) and some modify the passwd field ( |
188 | `*LK*' on Solaris and UnixWare, `*' on HP-UX, containing `Nologin' on | 187 | M-bM-^@M-^X*LK*M-bM-^@M-^Y on Solaris and UnixWare, M-bM-^@M-^X*M-bM-^@M-^Y on HP-UX, containing M-bM-^@M-^XNologinM-bM-^@M-^Y on |
189 | Tru64, a leading `*LOCKED*' on FreeBSD and a leading `!' on most | 188 | Tru64, a leading M-bM-^@M-^X*LOCKED*M-bM-^@M-^Y on FreeBSD and a leading M-bM-^@M-^X!M-bM-^@M-^Y on most |
190 | Linuxes). If there is a requirement to disable password authentication | 189 | Linuxes). If there is a requirement to disable password authentication |
191 | for the account while allowing still public-key, then the passwd field | 190 | for the account while allowing still public-key, then the passwd field |
192 | should be set to something other than these values (eg `NP' or `*NP*' ). | 191 | should be set to something other than these values (eg M-bM-^@M-^XNPM-bM-^@M-^Y or M-bM-^@M-^X*NP*M-bM-^@M-^Y ). |
193 | 192 | ||
194 | If the client successfully authenticates itself, a dialog for preparing | 193 | If the client successfully authenticates itself, a dialog for preparing |
195 | the session is entered. At this time the client may request things like | 194 | the session is entered. At this time the client may request things like |
@@ -230,7 +229,7 @@ LOGIN PROCESS | |||
230 | 229 | ||
231 | 8. If ~/.ssh/rc exists and the sshd_config(5) PermitUserRC option | 230 | 8. If ~/.ssh/rc exists and the sshd_config(5) PermitUserRC option |
232 | is set, runs it; else if /etc/ssh/sshrc exists, runs it; | 231 | is set, runs it; else if /etc/ssh/sshrc exists, runs it; |
233 | otherwise runs xauth. The ``rc'' files are given the X11 | 232 | otherwise runs xauth. The M-bM-^@M-^\rcM-bM-^@M-^] files are given the X11 |
234 | authentication protocol and cookie in standard input. See | 233 | authentication protocol and cookie in standard input. See |
235 | SSHRC, below. | 234 | SSHRC, below. |
236 | 235 | ||
@@ -270,7 +269,7 @@ AUTHORIZED_KEYS FILE FORMAT | |||
270 | AuthorizedKeysFile specifies the files containing public keys for public | 269 | AuthorizedKeysFile specifies the files containing public keys for public |
271 | key authentication; if none is specified, the default is | 270 | key authentication; if none is specified, the default is |
272 | ~/.ssh/authorized_keys and ~/.ssh/authorized_keys2. Each line of the | 271 | ~/.ssh/authorized_keys and ~/.ssh/authorized_keys2. Each line of the |
273 | file contains one key (empty lines and lines starting with a `#' are | 272 | file contains one key (empty lines and lines starting with a M-bM-^@M-^X#M-bM-^@M-^Y are |
274 | ignored as comments). Protocol 1 public keys consist of the following | 273 | ignored as comments). Protocol 1 public keys consist of the following |
275 | space-separated fields: options, bits, exponent, modulus, comment. | 274 | space-separated fields: options, bits, exponent, modulus, comment. |
276 | Protocol 2 public key consist of: options, keytype, base64-encoded key, | 275 | Protocol 2 public key consist of: options, keytype, base64-encoded key, |
@@ -279,9 +278,9 @@ AUTHORIZED_KEYS FILE FORMAT | |||
279 | starts with a number). The bits, exponent, modulus, and comment fields | 278 | starts with a number). The bits, exponent, modulus, and comment fields |
280 | give the RSA key for protocol version 1; the comment field is not used | 279 | give the RSA key for protocol version 1; the comment field is not used |
281 | for anything (but may be convenient for the user to identify the key). | 280 | for anything (but may be convenient for the user to identify the key). |
282 | For protocol version 2 the keytype is ``ecdsa-sha2-nistp256'', | 281 | For protocol version 2 the keytype is M-bM-^@M-^\ecdsa-sha2-nistp256M-bM-^@M-^], |
283 | ``ecdsa-sha2-nistp384'', ``ecdsa-sha2-nistp521'', ``ssh-ed25519'', | 282 | M-bM-^@M-^\ecdsa-sha2-nistp384M-bM-^@M-^], M-bM-^@M-^\ecdsa-sha2-nistp521M-bM-^@M-^], M-bM-^@M-^\ssh-ed25519M-bM-^@M-^], M-bM-^@M-^\ssh-dssM-bM-^@M-^] or |
284 | ``ssh-dss'' or ``ssh-rsa''. | 283 | M-bM-^@M-^\ssh-rsaM-bM-^@M-^]. |
285 | 284 | ||
286 | Note that lines in this file are usually several hundred bytes long | 285 | Note that lines in this file are usually several hundred bytes long |
287 | (because of the size of the public key encoding) up to a limit of 8 | 286 | (because of the size of the public key encoding) up to a limit of 8 |
@@ -370,7 +369,7 @@ AUTHORIZED_KEYS FILE FORMAT | |||
370 | Any X11 forward requests by the client will return an error. | 369 | Any X11 forward requests by the client will return an error. |
371 | 370 | ||
372 | permitopen="host:port" | 371 | permitopen="host:port" |
373 | Limit local ``ssh -L'' port forwarding such that it may only | 372 | Limit local port forwarding with ssh(1) -L such that it may only |
374 | connect to the specified host and port. IPv6 addresses can be | 373 | connect to the specified host and port. IPv6 addresses can be |
375 | specified by enclosing the address in square brackets. Multiple | 374 | specified by enclosing the address in square brackets. Multiple |
376 | permitopen options may be applied separated by commas. No | 375 | permitopen options may be applied separated by commas. No |
@@ -416,23 +415,23 @@ SSH_KNOWN_HOSTS FILE FORMAT | |||
416 | separated by spaces. | 415 | separated by spaces. |
417 | 416 | ||
418 | The marker is optional, but if it is present then it must be one of | 417 | The marker is optional, but if it is present then it must be one of |
419 | ``@cert-authority'', to indicate that the line contains a certification | 418 | M-bM-^@M-^\@cert-authorityM-bM-^@M-^], to indicate that the line contains a certification |
420 | authority (CA) key, or ``@revoked'', to indicate that the key contained | 419 | authority (CA) key, or M-bM-^@M-^\@revokedM-bM-^@M-^], to indicate that the key contained on |
421 | on the line is revoked and must not ever be accepted. Only one marker | 420 | the line is revoked and must not ever be accepted. Only one marker |
422 | should be used on a key line. | 421 | should be used on a key line. |
423 | 422 | ||
424 | Hostnames is a comma-separated list of patterns (`*' and `?' act as | 423 | Hostnames is a comma-separated list of patterns (M-bM-^@M-^X*M-bM-^@M-^Y and M-bM-^@M-^X?M-bM-^@M-^Y act as |
425 | wildcards); each pattern in turn is matched against the canonical host | 424 | wildcards); each pattern in turn is matched against the canonical host |
426 | name (when authenticating a client) or against the user-supplied name | 425 | name (when authenticating a client) or against the user-supplied name |
427 | (when authenticating a server). A pattern may also be preceded by `!' to | 426 | (when authenticating a server). A pattern may also be preceded by M-bM-^@M-^X!M-bM-^@M-^Y to |
428 | indicate negation: if the host name matches a negated pattern, it is not | 427 | indicate negation: if the host name matches a negated pattern, it is not |
429 | accepted (by that line) even if it matched another pattern on the line. | 428 | accepted (by that line) even if it matched another pattern on the line. |
430 | A hostname or address may optionally be enclosed within `[' and `]' | 429 | A hostname or address may optionally be enclosed within M-bM-^@M-^X[M-bM-^@M-^Y and M-bM-^@M-^X]M-bM-^@M-^Y |
431 | brackets then followed by `:' and a non-standard port number. | 430 | brackets then followed by M-bM-^@M-^X:M-bM-^@M-^Y and a non-standard port number. |
432 | 431 | ||
433 | Alternately, hostnames may be stored in a hashed form which hides host | 432 | Alternately, hostnames may be stored in a hashed form which hides host |
434 | names and addresses should the file's contents be disclosed. Hashed | 433 | names and addresses should the file's contents be disclosed. Hashed |
435 | hostnames start with a `|' character. Only one hashed hostname may | 434 | hostnames start with a M-bM-^@M-^X|M-bM-^@M-^Y character. Only one hashed hostname may |
436 | appear on a single line and none of the above negation or wildcard | 435 | appear on a single line and none of the above negation or wildcard |
437 | operators may be applied. | 436 | operators may be applied. |
438 | 437 | ||
@@ -440,21 +439,21 @@ SSH_KNOWN_HOSTS FILE FORMAT | |||
440 | they can be obtained, for example, from /etc/ssh/ssh_host_key.pub. The | 439 | they can be obtained, for example, from /etc/ssh/ssh_host_key.pub. The |
441 | optional comment field continues to the end of the line, and is not used. | 440 | optional comment field continues to the end of the line, and is not used. |
442 | 441 | ||
443 | Lines starting with `#' and empty lines are ignored as comments. | 442 | Lines starting with M-bM-^@M-^X#M-bM-^@M-^Y and empty lines are ignored as comments. |
444 | 443 | ||
445 | When performing host authentication, authentication is accepted if any | 444 | When performing host authentication, authentication is accepted if any |
446 | matching line has the proper key; either one that matches exactly or, if | 445 | matching line has the proper key; either one that matches exactly or, if |
447 | the server has presented a certificate for authentication, the key of the | 446 | the server has presented a certificate for authentication, the key of the |
448 | certification authority that signed the certificate. For a key to be | 447 | certification authority that signed the certificate. For a key to be |
449 | trusted as a certification authority, it must use the ``@cert-authority'' | 448 | trusted as a certification authority, it must use the M-bM-^@M-^\@cert-authorityM-bM-^@M-^] |
450 | marker described above. | 449 | marker described above. |
451 | 450 | ||
452 | The known hosts file also provides a facility to mark keys as revoked, | 451 | The known hosts file also provides a facility to mark keys as revoked, |
453 | for example when it is known that the associated private key has been | 452 | for example when it is known that the associated private key has been |
454 | stolen. Revoked keys are specified by including the ``@revoked'' marker | 453 | stolen. Revoked keys are specified by including the M-bM-^@M-^\@revokedM-bM-^@M-^] marker at |
455 | at the beginning of the key line, and are never accepted for | 454 | the beginning of the key line, and are never accepted for authentication |
456 | authentication or as certification authorities, but instead will produce | 455 | or as certification authorities, but instead will produce a warning from |
457 | a warning from ssh(1) when they are encountered. | 456 | ssh(1) when they are encountered. |
458 | 457 | ||
459 | It is permissible (but not recommended) to have several lines or | 458 | It is permissible (but not recommended) to have several lines or |
460 | different host keys for the same names. This will inevitably happen when | 459 | different host keys for the same names. This will inevitably happen when |
@@ -514,7 +513,7 @@ FILES | |||
514 | for the user, and not accessible by others. | 513 | for the user, and not accessible by others. |
515 | 514 | ||
516 | ~/.ssh/authorized_keys | 515 | ~/.ssh/authorized_keys |
517 | Lists the public keys (DSA, ECDSA, ED25519, RSA) that can be used | 516 | Lists the public keys (DSA, ECDSA, Ed25519, RSA) that can be used |
518 | for logging in as this user. The format of this file is | 517 | for logging in as this user. The format of this file is |
519 | described above. The content of the file is not highly | 518 | described above. The content of the file is not highly |
520 | sensitive, but the recommended permissions are read/write for the | 519 | sensitive, but the recommended permissions are read/write for the |
@@ -524,12 +523,12 @@ FILES | |||
524 | are writable by other users, then the file could be modified or | 523 | are writable by other users, then the file could be modified or |
525 | replaced by unauthorized users. In this case, sshd will not | 524 | replaced by unauthorized users. In this case, sshd will not |
526 | allow it to be used unless the StrictModes option has been set to | 525 | allow it to be used unless the StrictModes option has been set to |
527 | ``no''. | 526 | M-bM-^@M-^\noM-bM-^@M-^]. |
528 | 527 | ||
529 | ~/.ssh/environment | 528 | ~/.ssh/environment |
530 | This file is read into the environment at login (if it exists). | 529 | This file is read into the environment at login (if it exists). |
531 | It can only contain empty lines, comment lines (that start with | 530 | It can only contain empty lines, comment lines (that start with |
532 | `#'), and assignment lines of the form name=value. The file | 531 | M-bM-^@M-^X#M-bM-^@M-^Y), and assignment lines of the form name=value. The file |
533 | should be writable only by the user; it need not be readable by | 532 | should be writable only by the user; it need not be readable by |
534 | anyone else. Environment processing is disabled by default and | 533 | anyone else. Environment processing is disabled by default and |
535 | is controlled via the PermitUserEnvironment option. | 534 | is controlled via the PermitUserEnvironment option. |
@@ -632,4 +631,4 @@ AUTHORS | |||
632 | versions 1.5 and 2.0. Niels Provos and Markus Friedl contributed support | 631 | versions 1.5 and 2.0. Niels Provos and Markus Friedl contributed support |
633 | for privilege separation. | 632 | for privilege separation. |
634 | 633 | ||
635 | OpenBSD 5.6 July 3, 2014 OpenBSD 5.6 | 634 | OpenBSD 5.7 November 15, 2014 OpenBSD 5.7 |