summaryrefslogtreecommitdiff
path: root/sshd.8
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2001-03-06 01:00:03 +0000
committerBen Lindstrom <mouring@eviladmin.org>2001-03-06 01:00:03 +0000
commitff8b4940abe79dacaeae3a582f3ca19ccff33d9b (patch)
tree1c6e8dde443b2b84dee131be55b8479991c91484 /sshd.8
parent12888d1fc8bdcc2212ce61ffd523166c7e4ed5af (diff)
- deraadt@cvs.openbsd.org 2001/03/05 14:28:47
[sshd.8] alpha order; jcs@rt.fm
Diffstat (limited to 'sshd.8')
-rw-r--r--sshd.836
1 files changed, 15 insertions, 21 deletions
diff --git a/sshd.8 b/sshd.8
index 52e902ef7..c924a438f 100644
--- a/sshd.8
+++ b/sshd.8
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: sshd.8,v 1.103 2001/03/04 18:21:28 deraadt Exp $ 37.\" $OpenBSD: sshd.8,v 1.104 2001/03/05 14:28:47 deraadt Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSHD 8 39.Dt SSHD 8
40.Os 40.Os
@@ -339,6 +339,15 @@ The contents of the specified file are sent to the remote user before
339authentication is allowed. 339authentication is allowed.
340This option is only available for protocol version 2. 340This option is only available for protocol version 2.
341.Pp 341.Pp
342.It Cm ChallengeResponseAuthentication
343Specifies whether
344challenge response
345authentication is allowed.
346Currently there is only support for
347.Xr skey 1
348authentication.
349The default is
350.Dq yes .
342.It Cm Ciphers 351.It Cm Ciphers
343Specifies the ciphers allowed for protocol version 2. 352Specifies the ciphers allowed for protocol version 2.
344Multiple ciphers must be comma-separated. 353Multiple ciphers must be comma-separated.
@@ -373,11 +382,6 @@ and
373can be used as wildcards in the patterns. 382can be used as wildcards in the patterns.
374Only user names are valid; a numerical user ID isn't recognized. 383Only user names are valid; a numerical user ID isn't recognized.
375By default login is allowed regardless of the user name. 384By default login is allowed regardless of the user name.
376.It Cm PubkeyAuthentication
377Specifies whether public key authentication is allowed.
378The default is
379.Dq yes .
380Note that this option applies to protocol version 2 only.
381.It Cm GatewayPorts 385.It Cm GatewayPorts
382Specifies whether remote hosts are allowed to connect to ports 386Specifies whether remote hosts are allowed to connect to ports
383forwarded for the client. 387forwarded for the client.
@@ -611,6 +615,11 @@ and
611Multiple versions must be comma-separated. 615Multiple versions must be comma-separated.
612The default is 616The default is
613.Dq 1 . 617.Dq 1 .
618.It Cm PubkeyAuthentication
619Specifies whether public key authentication is allowed.
620The default is
621.Dq yes .
622Note that this option applies to protocol version 2 only.
614.It Cm ReverseMappingCheck 623.It Cm ReverseMappingCheck
615Specifies whether 624Specifies whether
616.Nm 625.Nm
@@ -642,21 +651,6 @@ Note that this option applies to protocol version 1 only.
642.It Cm ServerKeyBits 651.It Cm ServerKeyBits
643Defines the number of bits in the server key. 652Defines the number of bits in the server key.
644The minimum value is 512, and the default is 768. 653The minimum value is 512, and the default is 768.
645.It Cm ChallengeResponseAuthentication
646Specifies whether
647challenge response
648authentication is allowed.
649Currently there is support for
650.Xr skey 1
651and PAM authentication.
652The default is
653.Dq yes .
654Note that enabling ChallengeResponseAuthentication for PAM bypasses
655OpenSSH's password checking code, thus rendering options such as
656.Cm PasswordAuthentication
657and
658.Cm PermitEmptyPasswords
659ineffective.
660.It Cm StrictModes 654.It Cm StrictModes
661Specifies whether 655Specifies whether
662.Nm 656.Nm