summaryrefslogtreecommitdiff
path: root/sshd.8
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2000-04-13 12:26:34 +1000
committerDamien Miller <djm@mindrot.org>2000-04-13 12:26:34 +1000
commit22c772609aa0e97fb39a6ec609c2f16445644055 (patch)
tree5246a2a1ab8e761fe1a22ec2c8d5fe52fe139e36 /sshd.8
parente71eb91259388de4aea7d46738f3b8b5593bccbe (diff)
- Merged OpenBSD updates to include paths.
Diffstat (limited to 'sshd.8')
-rw-r--r--sshd.856
1 files changed, 36 insertions, 20 deletions
diff --git a/sshd.8 b/sshd.8
index 0de3cef4a..a59bd22fb 100644
--- a/sshd.8
+++ b/sshd.8
@@ -9,7 +9,7 @@
9.\" 9.\"
10.\" Created: Sat Apr 22 21:55:14 1995 ylo 10.\" Created: Sat Apr 22 21:55:14 1995 ylo
11.\" 11.\"
12.\" $Id: sshd.8,v 1.16 2000/04/01 01:09:27 damien Exp $ 12.\" $Id: sshd.8,v 1.17 2000/04/13 02:26:38 damien Exp $
13.\" 13.\"
14.Dd September 25, 1999 14.Dd September 25, 1999
15.Dt SSHD 8 15.Dt SSHD 8
@@ -27,9 +27,9 @@
27.Op Fl k Ar key_gen_time 27.Op Fl k Ar key_gen_time
28.Op Fl p Ar port 28.Op Fl p Ar port
29.Op Fl V Ar client_protocol_id 29.Op Fl V Ar client_protocol_id
30.Sh DESCRIPTION 30.Sh DESCRIPTION
31.Nm 31.Nm
32(Secure Shell Daemon) is the daemon program for 32(Secure Shell Daemon) is the daemon program for
33.Xr ssh 1 . 33.Xr ssh 1 .
34Together these programs replace rlogin and rsh programs, and 34Together these programs replace rlogin and rsh programs, and
35provide secure encrypted communications between two untrusted hosts 35provide secure encrypted communications between two untrusted hosts
@@ -39,7 +39,7 @@ install and use as possible.
39.Pp 39.Pp
40.Nm 40.Nm
41is the daemon that listens for connections from clients. 41is the daemon that listens for connections from clients.
42It is normally started at boot from 42It is normally started at boot from
43.Pa /etc/rc . 43.Pa /etc/rc .
44It forks a new 44It forks a new
45daemon for each incoming connection. 45daemon for each incoming connection.
@@ -157,7 +157,7 @@ host file is normally not readable by anyone but root).
157.It Fl i 157.It Fl i
158Specifies that 158Specifies that
159.Nm 159.Nm
160is being run from inetd. 160is being run from inetd.
161.Nm 161.Nm
162is normally not run 162is normally not run
163from inetd because it needs to generate the server key before it can 163from inetd because it needs to generate the server key before it can
@@ -204,7 +204,7 @@ to use IPv6 addresses only.
204.El 204.El
205.Sh CONFIGURATION FILE 205.Sh CONFIGURATION FILE
206.Nm 206.Nm
207reads configuration data from 207reads configuration data from
208.Pa /etc/sshd_config 208.Pa /etc/sshd_config
209(or the file specified with 209(or the file specified with
210.Fl f 210.Fl f
@@ -246,6 +246,11 @@ wildcards in the patterns.
246Only user names are valid, a numerical user ID isn't recognized. 246Only user names are valid, a numerical user ID isn't recognized.
247By default login is allowed regardless of the user name. 247By default login is allowed regardless of the user name.
248.Pp 248.Pp
249.It Cm Ciphers
250Specifies the ciphers allowed for protocol version 2.
251Multiple ciphers must be comma-separated.
252The default is
253.Dq blowfish-cbc,3des-cbc,arcfour,cast128-cbc .
249.It Cm CheckMail 254.It Cm CheckMail
250Specifies whether 255Specifies whether
251.Nm 256.Nm
@@ -284,14 +289,14 @@ does not start if this file is group/world-accessible.
284.It Cm IgnoreRhosts 289.It Cm IgnoreRhosts
285Specifies that 290Specifies that
286.Pa .rhosts 291.Pa .rhosts
287and 292and
288.Pa .shosts 293.Pa .shosts
289files will not be used in authentication. 294files will not be used in authentication.
290.Pa /etc/hosts.equiv 295.Pa /etc/hosts.equiv
291and 296and
292.Pa /etc/shosts.equiv 297.Pa /etc/shosts.equiv
293are still used. 298are still used.
294The default is 299The default is
295.Dq yes . 300.Dq yes .
296.It Cm IgnoreUserKnownHosts 301.It Cm IgnoreUserKnownHosts
297Specifies whether 302Specifies whether
@@ -342,7 +347,7 @@ Default is
342.Dq yes . 347.Dq yes .
343.It Cm KerberosTgtPassing 348.It Cm KerberosTgtPassing
344Specifies whether a Kerberos TGT may be forwarded to the server. 349Specifies whether a Kerberos TGT may be forwarded to the server.
345Default is 350Default is
346.Dq no , 351.Dq no ,
347as this only works when the Kerberos KDC is actually an AFS kaserver. 352as this only works when the Kerberos KDC is actually an AFS kaserver.
348.It Cm KerberosTicketCleanup 353.It Cm KerberosTicketCleanup
@@ -419,7 +424,7 @@ Multiple options of this type are permitted.
419.It Cm PrintMotd 424.It Cm PrintMotd
420Specifies whether 425Specifies whether
421.Nm 426.Nm
422should print 427should print
423.Pa /etc/motd 428.Pa /etc/motd
424when a user logs in interactively. 429when a user logs in interactively.
425(On some systems it is also printed by the shell, 430(On some systems it is also printed by the shell,
@@ -427,6 +432,17 @@ when a user logs in interactively.
427or equivalent.) 432or equivalent.)
428The default is 433The default is
429.Dq yes . 434.Dq yes .
435.It Cm Protocol
436Specifies the protocol versions
437.Nm
438should support.
439The possible values are
440.Dq 1
441and
442.Dq 2 .
443Multiple versions must be comma-separated.
444The default is
445.Dq 1 .
430.It Cm RandomSeed 446.It Cm RandomSeed
431Obsolete. 447Obsolete.
432Random number generation uses other techniques. 448Random number generation uses other techniques.
@@ -454,7 +470,7 @@ Defines the number of bits in the server key.
454The minimum value is 512, and the default is 768. 470The minimum value is 512, and the default is 768.
455.It Cm SkeyAuthentication 471.It Cm SkeyAuthentication
456Specifies whether 472Specifies whether
457.Xr skey 1 473.Xr skey 1
458authentication is allowed. 474authentication is allowed.
459The default is 475The default is
460.Dq yes . 476.Dq yes .
@@ -504,12 +520,12 @@ does the following:
504.Bl -enum -offset indent 520.Bl -enum -offset indent
505.It 521.It
506If the login is on a tty, and no command has been specified, 522If the login is on a tty, and no command has been specified,
507prints last login time and 523prints last login time and
508.Pa /etc/motd 524.Pa /etc/motd
509(unless prevented in the configuration file or by 525(unless prevented in the configuration file or by
510.Pa $HOME/.hushlogin ; 526.Pa $HOME/.hushlogin ;
511see the 527see the
512.Sx FILES 528.Sx FILES
513section). 529section).
514.It 530.It
515If the login is on a tty, records login time. 531If the login is on a tty, records login time.
@@ -543,7 +559,7 @@ authentication protocol and cookie in standard input.
543Runs user's shell or command. 559Runs user's shell or command.
544.El 560.El
545.Sh AUTHORIZED_KEYS FILE FORMAT 561.Sh AUTHORIZED_KEYS FILE FORMAT
546The 562The
547.Pa $HOME/.ssh/authorized_keys 563.Pa $HOME/.ssh/authorized_keys
548file lists the RSA keys that are 564file lists the RSA keys that are
549permitted for RSA authentication. 565permitted for RSA authentication.
@@ -632,9 +648,9 @@ from="*.niksula.hut.fi,!pc.niksula.hut.fi" 1024 35 23.\|.\|.\|2334 ylo@niksula
632.Pp 648.Pp
633command="dump /home",no-pty,no-port-forwarding 1024 33 23.\|.\|.\|2323 backup.hut.fi 649command="dump /home",no-pty,no-port-forwarding 1024 33 23.\|.\|.\|2323 backup.hut.fi
634.Sh SSH_KNOWN_HOSTS FILE FORMAT 650.Sh SSH_KNOWN_HOSTS FILE FORMAT
635The 651The
636.Pa /etc/ssh_known_hosts 652.Pa /etc/ssh_known_hosts
637and 653and
638.Pa $HOME/.ssh/known_hosts 654.Pa $HOME/.ssh/known_hosts
639files contain host public keys for all known hosts. 655files contain host public keys for all known hosts.
640The global file should 656The global file should
@@ -679,7 +695,7 @@ accepted if valid information can be found from either file.
679Note that the lines in these files are typically hundreds of characters 695Note that the lines in these files are typically hundreds of characters
680long, and you definitely don't want to type in the host keys by hand. 696long, and you definitely don't want to type in the host keys by hand.
681Rather, generate them by a script 697Rather, generate them by a script
682or by taking 698or by taking
683.Pa /etc/ssh_host_key.pub 699.Pa /etc/ssh_host_key.pub
684and adding the host names at the front. 700and adding the host names at the front.
685.Ss Examples 701.Ss Examples
@@ -734,7 +750,7 @@ should be world-readable, and
734.Pa $HOME/.ssh/known_hosts 750.Pa $HOME/.ssh/known_hosts
735can but need not be world-readable. 751can but need not be world-readable.
736.It Pa /etc/nologin 752.It Pa /etc/nologin
737If this file exists, 753If this file exists,
738.Nm 754.Nm
739refuses to let anyone except root log in. 755refuses to let anyone except root log in.
740The contents of the file 756The contents of the file
@@ -865,7 +881,7 @@ external libraries.
865has been updated to support ssh protocol 1.5, making it compatible with 881has been updated to support ssh protocol 1.5, making it compatible with
866all other ssh protocol 1 clients and servers. 882all other ssh protocol 1 clients and servers.
867.It 883.It
868contains added support for 884contains added support for
869.Xr kerberos 8 885.Xr kerberos 8
870authentication and ticket passing. 886authentication and ticket passing.
871.It 887.It