summaryrefslogtreecommitdiff
path: root/sshd.8
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2000-12-28 16:40:05 +0000
committerBen Lindstrom <mouring@eviladmin.org>2000-12-28 16:40:05 +0000
commit4dccfa5fb73853e6c9281beac2c42a31391acdc7 (patch)
tree2a64c6b1e096010f2b5fd45a08f9878cac5d400e /sshd.8
parent42717bf8fff94146edf43ea266113f1a54456c62 (diff)
- (bal) OpenBSD CVS Update
- markus@cvs.openbsd.org 2000/12/28 14:25:51 [auth.h auth2.c] count authentication failures only - markus@cvs.openbsd.org 2000/12/28 14:25:03 [sshconnect.c] fingerprint for MITM attacks, too. - markus@cvs.openbsd.org 2000/12/28 12:03:57 [sshd.8 sshd.c] document -D - markus@cvs.openbsd.org 2000/12/27 14:19:21 [serverloop.c] less chatty - markus@cvs.openbsd.org 2000/12/27 12:34 [auth1.c sshconnect2.c sshd.c] typo - markus@cvs.openbsd.org 2000/12/27 12:30:19 [readconf.c readconf.h ssh.1 sshconnect.c] new option: HostKeyAlias: allow the user to record the host key under a different name. This is useful for ssh tunneling over forwarded connections or if you run multiple sshd's on different ports on the same machine. - markus@cvs.openbsd.org 2000/12/27 11:51:53 [ssh.1 ssh.c] multiple -t force pty allocation, document ORIGINAL_COMMAND - markus@cvs.openbsd.org 2000/12/27 11:41:31 [sshd.8] update for ssh-2
Diffstat (limited to 'sshd.8')
-rw-r--r--sshd.841
1 files changed, 30 insertions, 11 deletions
diff --git a/sshd.8 b/sshd.8
index 48d6be204..b2ff9a3e0 100644
--- a/sshd.8
+++ b/sshd.8
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: sshd.8,v 1.73 2000/11/22 15:38:30 provos Exp $ 37.\" $OpenBSD: sshd.8,v 1.76 2000/12/28 12:03:57 markus Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSHD 8 39.Dt SSHD 8
40.Os 40.Os
@@ -43,7 +43,7 @@
43.Nd secure shell daemon 43.Nd secure shell daemon
44.Sh SYNOPSIS 44.Sh SYNOPSIS
45.Nm sshd 45.Nm sshd
46.Op Fl diqQ46 46.Op Fl diqDQ46
47.Op Fl b Ar bits 47.Op Fl b Ar bits
48.Op Fl f Ar config_file 48.Op Fl f Ar config_file
49.Op Fl g Ar login_grace_time 49.Op Fl g Ar login_grace_time
@@ -202,12 +202,14 @@ If the client fails to authenticate the user within
202this many seconds, the server disconnects and exits. 202this many seconds, the server disconnects and exits.
203A value of zero indicates no limit. 203A value of zero indicates no limit.
204.It Fl h Ar host_key_file 204.It Fl h Ar host_key_file
205Specifies the file from which the RSA host key is read (default 205Specifies the file from which the host key is read (default
206.Pa /etc/ssh_host_key ) . 206.Pa /etc/ssh_host_key ) .
207This option must be given if 207This option must be given if
208.Nm 208.Nm
209is not run as root (as the normal 209is not run as root (as the normal
210host file is normally not readable by anyone but root). 210host file is normally not readable by anyone but root).
211It is possible to have multiple host key files for
212the different protocol versions.
211.It Fl i 213.It Fl i
212Specifies that 214Specifies that
213.Nm 215.Nm
@@ -254,6 +256,12 @@ indicates that only dotted decimal addresses
254should be put into the 256should be put into the
255.Pa utmp 257.Pa utmp
256file. 258file.
259.It Fl D
260When this option is specified
261.Nm
262will not detach and does not become a daemon.
263This allows easy monitoring of
264.Nm sshd .
257.It Fl Q 265.It Fl Q
258Do not print an error message if RSA support is missing. 266Do not print an error message if RSA support is missing.
259.It Fl V Ar client_protocol_id 267.It Fl V Ar client_protocol_id
@@ -720,26 +728,37 @@ file lists the RSA keys that are
720permitted for RSA authentication in SSH protocols 1.3 and 1.5 728permitted for RSA authentication in SSH protocols 1.3 and 1.5
721Similarly, the 729Similarly, the
722.Pa $HOME/.ssh/authorized_keys2 730.Pa $HOME/.ssh/authorized_keys2
723file lists the DSA keys that are 731file lists the DSA and RSA keys that are
724permitted for DSA authentication in SSH protocol 2.0. 732permitted for public key authentication (PubkeyAuthentication)
733in SSH protocol 2.0.
734.Pp
725Each line of the file contains one 735Each line of the file contains one
726key (empty lines and lines starting with a 736key (empty lines and lines starting with a
727.Ql # 737.Ql #
728are ignored as 738are ignored as
729comments). 739comments).
730Each line consists of the following fields, separated by 740Each RSA public key consists of the following fields, separated by
731spaces: options, bits, exponent, modulus, comment. 741spaces: options, bits, exponent, modulus, comment.
732The options field 742Each protocol version 2 public key consists of:
733is optional; its presence is determined by whether the line starts 743options, keytype, base64 encoded key, comment.
744The options fields
745are optional; its presence is determined by whether the line starts
734with a number or not (the option field never starts with a number). 746with a number or not (the option field never starts with a number).
735The bits, exponent, modulus and comment fields give the RSA key; the 747The bits, exponent, modulus and comment fields give the RSA key for
748protocol version 1; the
736comment field is not used for anything (but may be convenient for the 749comment field is not used for anything (but may be convenient for the
737user to identify the key). 750user to identify the key).
751For protocol version 2 the keytype is
752.Dq ssh-dss
753or
754.Dq ssh-rsa .
738.Pp 755.Pp
739Note that lines in this file are usually several hundred bytes long 756Note that lines in this file are usually several hundred bytes long
740(because of the size of the RSA key modulus). 757(because of the size of the RSA key modulus).
741You don't want to type them in; instead, copy the 758You don't want to type them in; instead, copy the
742.Pa identity.pub 759.Pa identity.pub
760or the
761.Pa id_dsa.pub
743file and edit it. 762file and edit it.
744.Pp 763.Pp
745The options (if present) consist of comma-separated option 764The options (if present) consist of comma-separated option
@@ -1053,7 +1072,7 @@ This version of OpenSSH
1053.Bl -bullet 1072.Bl -bullet
1054.It 1073.It
1055has all components of a restrictive nature (i.e., patents, see 1074has all components of a restrictive nature (i.e., patents, see
1056.Xr crypto 3 ) 1075.Xr ssl 8 )
1057directly removed from the source code; any licensed or patented components 1076directly removed from the source code; any licensed or patented components
1058are chosen from 1077are chosen from
1059external libraries. 1078external libraries.
@@ -1080,6 +1099,6 @@ The support for SSH protocol 2 was written by Markus Friedl.
1080.Xr ssh-add 1 , 1099.Xr ssh-add 1 ,
1081.Xr ssh-agent 1 , 1100.Xr ssh-agent 1 ,
1082.Xr ssh-keygen 1 , 1101.Xr ssh-keygen 1 ,
1083.Xr crypto 3 , 1102.Xr ssl 8 ,
1084.Xr rlogin 1 , 1103.Xr rlogin 1 ,
1085.Xr rsh 1 1104.Xr rsh 1