summaryrefslogtreecommitdiff
path: root/sshd.8
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2000-08-18 13:59:06 +1000
committerDamien Miller <djm@mindrot.org>2000-08-18 13:59:06 +1000
commit942da039d2a05e6f491883f50b516175a6dbb20f (patch)
tree0ac91ba19e494a3cb054d34db0c3b65660bd7375 /sshd.8
parent11fa2cc3839b1e7fed1d85aa1158cce4d498bc58 (diff)
- (djm) OpenBSD CVS changes:
- markus@cvs.openbsd.org 2000/07/22 03:14:37 [servconf.c servconf.h sshd.8 sshd.c sshd_config] random early drop; ok theo, niels - deraadt@cvs.openbsd.org 2000/07/26 11:46:51 [ssh.1] typo - deraadt@cvs.openbsd.org 2000/08/01 11:46:11 [sshd.8] many fixes from pepper@mail.reppep.com - provos@cvs.openbsd.org 2000/08/01 13:01:42 [Makefile.in util.c aux.c] rename aux.c to util.c to help with cygwin port - deraadt@cvs.openbsd.org 2000/08/02 00:23:31 [authfd.c] correct sun_len; Alexander@Leidinger.net - provos@cvs.openbsd.org 2000/08/02 10:27:17 [readconf.c sshd.8] disable kerberos authentication by default - provos@cvs.openbsd.org 2000/08/02 11:27:05 [sshd.8 readconf.c auth-krb4.c] disallow kerberos authentication if we can't verify the TGT; from dugsong@ kerberos authentication is on by default only if you have a srvtab. - markus@cvs.openbsd.org 2000/08/04 14:30:07 [auth.c] unused - markus@cvs.openbsd.org 2000/08/04 14:30:35 [sshd_config] MaxStartups - markus@cvs.openbsd.org 2000/08/15 13:20:46 [authfd.c] cleanup; ok niels@ - markus@cvs.openbsd.org 2000/08/17 14:05:10 [session.c] cleanup login(1)-like jobs, no duplicate utmp entries - markus@cvs.openbsd.org 2000/08/17 14:06:34 [session.c sshd.8 sshd.c] sshd -u len, similar to telnetd
Diffstat (limited to 'sshd.8')
-rw-r--r--sshd.865
1 files changed, 50 insertions, 15 deletions
diff --git a/sshd.8 b/sshd.8
index b6aefe491..c8b99df38 100644
--- a/sshd.8
+++ b/sshd.8
@@ -9,7 +9,7 @@
9.\" 9.\"
10.\" Created: Sat Apr 22 21:55:14 1995 ylo 10.\" Created: Sat Apr 22 21:55:14 1995 ylo
11.\" 11.\"
12.\" $Id: sshd.8,v 1.25 2000/07/11 07:31:39 djm Exp $ 12.\" $Id: sshd.8,v 1.26 2000/08/18 03:59:06 djm Exp $
13.\" 13.\"
14.Dd September 25, 1999 14.Dd September 25, 1999
15.Dt SSHD 8 15.Dt SSHD 8
@@ -26,6 +26,7 @@
26.Op Fl h Ar host_key_file 26.Op Fl h Ar host_key_file
27.Op Fl k Ar key_gen_time 27.Op Fl k Ar key_gen_time
28.Op Fl p Ar port 28.Op Fl p Ar port
29.Op Fl u Ar len
29.Op Fl V Ar client_protocol_id 30.Op Fl V Ar client_protocol_id
30.Sh DESCRIPTION 31.Sh DESCRIPTION
31.Nm 32.Nm
@@ -104,7 +105,7 @@ into the machine).
104.Pp 105.Pp
105.Ss SSH protocol version 2 106.Ss SSH protocol version 2
106.Pp 107.Pp
107Version 2 works similar: 108Version 2 works similarly:
108Each host has a host-specific DSA key used to identify the host. 109Each host has a host-specific DSA key used to identify the host.
109However, when the daemon starts, it does not generate a server key. 110However, when the daemon starts, it does not generate a server key.
110Forward security is provided through a Diffie-Hellman key agreement. 111Forward security is provided through a Diffie-Hellman key agreement.
@@ -211,6 +212,22 @@ Quiet mode.
211Nothing is sent to the system log. 212Nothing is sent to the system log.
212Normally the beginning, 213Normally the beginning,
213authentication, and termination of each connection is logged. 214authentication, and termination of each connection is logged.
215.It Fl u Ar len
216This option is used to specify the size of the field
217in the
218.Li utmp
219structure that holds the remote host name.
220If the resolved host name is longer than
221.Ar len ,
222the dotted decimal value will be used instead.
223This allows hosts with very long host names that
224overflow this field to still be uniquely identified.
225Specifying
226.Fl u0
227indicates that only dotted decimal addresses
228should be put into the
229.Pa utmp
230file.
214.It Fl Q 231.It Fl Q
215Do not print an error message if RSA support is missing. 232Do not print an error message if RSA support is missing.
216.It Fl V Ar client_protocol_id 233.It Fl V Ar client_protocol_id
@@ -257,7 +274,7 @@ and
257.Ql ? 274.Ql ?
258can be used as 275can be used as
259wildcards in the patterns. 276wildcards in the patterns.
260Only group names are valid, a numerical group ID isn't recognized. 277Only group names are valid; a numerical group ID isn't recognized.
261By default login is allowed regardless of the primary group. 278By default login is allowed regardless of the primary group.
262.Pp 279.Pp
263.It Cm AllowUsers 280.It Cm AllowUsers
@@ -270,7 +287,7 @@ and
270.Ql ? 287.Ql ?
271can be used as 288can be used as
272wildcards in the patterns. 289wildcards in the patterns.
273Only user names are valid, a numerical user ID isn't recognized. 290Only user names are valid; a numerical user ID isn't recognized.
274By default login is allowed regardless of the user name. 291By default login is allowed regardless of the user name.
275.Pp 292.Pp
276.It Cm Ciphers 293.It Cm Ciphers
@@ -294,7 +311,7 @@ and
294.Ql ? 311.Ql ?
295can be used as 312can be used as
296wildcards in the patterns. 313wildcards in the patterns.
297Only group names are valid, a numerical group ID isn't recognized. 314Only group names are valid; a numerical group ID isn't recognized.
298By default login is allowed regardless of the primary group. 315By default login is allowed regardless of the primary group.
299.Pp 316.Pp
300.It Cm DenyUsers 317.It Cm DenyUsers
@@ -305,7 +322,7 @@ Login is disallowed for user names that match one of the patterns.
305and 322and
306.Ql ? 323.Ql ?
307can be used as wildcards in the patterns. 324can be used as wildcards in the patterns.
308Only user names are valid, a numerical user ID isn't recognized. 325Only user names are valid; a numerical user ID isn't recognized.
309By default login is allowed regardless of the user name. 326By default login is allowed regardless of the user name.
310.It Cm DSAAuthentication 327.It Cm DSAAuthentication
311Specifies whether DSA authentication is allowed. 328Specifies whether DSA authentication is allowed.
@@ -321,7 +338,7 @@ or
321.Dq no . 338.Dq no .
322The default is 339The default is
323.Dq no . 340.Dq no .
324.It Cm HostDsaKey 341.It Cm HostDSAKey
325Specifies the file containing the private DSA host key (default 342Specifies the file containing the private DSA host key (default
326.Pa /etc/ssh_host_dsa_key ) 343.Pa /etc/ssh_host_dsa_key )
327used by SSH protocol 2.0. 344used by SSH protocol 2.0.
@@ -383,7 +400,8 @@ Specifies whether Kerberos authentication is allowed.
383This can be in the form of a Kerberos ticket, or if 400This can be in the form of a Kerberos ticket, or if
384.Cm PasswordAuthentication 401.Cm PasswordAuthentication
385is yes, the password provided by the user will be validated through 402is yes, the password provided by the user will be validated through
386the Kerberos KDC. 403the Kerberos KDC. To use this option, the server needs a
404Kerberos servtab which allows the verification of the KDC's identity.
387Default is 405Default is
388.Dq yes . 406.Dq yes .
389.It Cm KerberosOrLocalPasswd 407.It Cm KerberosOrLocalPasswd
@@ -443,11 +461,28 @@ Additional connections will be dropped until authentication succeeds or the
443.Cm LoginGraceTime 461.Cm LoginGraceTime
444expires for a connection. 462expires for a connection.
445The default is 10. 463The default is 10.
464.Pp
465Alternatively, random early drop can be enabled by specifying
466the three colon separated values
467.Dq start:rate:full
468(e.g. "10:30:60").
469.Nm
470will refuse connection attempts with a probabillity of
471.Dq rate/100
472(30%)
473if there are currently
474.Dq start
475(10)
476unauthenticated connections.
477The probabillity increases linearly and all connection attempts
478are refused if the number of unauthenticated connections reaches
479.Dq full
480(60).
446.It Cm PasswordAuthentication 481.It Cm PasswordAuthentication
447Specifies whether password authentication is allowed. 482Specifies whether password authentication is allowed.
448The default is 483The default is
449.Dq yes . 484.Dq yes .
450Note that this option applies to both protocol version 1 and 2. 485Note that this option applies to both protocol versions 1 and 2.
451.It Cm PermitEmptyPasswords 486.It Cm PermitEmptyPasswords
452When password authentication is allowed, it specifies whether the 487When password authentication is allowed, it specifies whether the
453server allows login to accounts with empty password strings. 488server allows login to accounts with empty password strings.
@@ -568,7 +603,7 @@ Specifies whether
568is used for interactive login sessions. 603is used for interactive login sessions.
569Note that 604Note that
570.Xr login 1 605.Xr login 1
571is not never for remote command execution. 606is never used for remote command execution.
572The default is 607The default is
573.Dq no . 608.Dq no .
574.It Cm X11DisplayOffset 609.It Cm X11DisplayOffset
@@ -666,7 +701,7 @@ You don't want to type them in; instead, copy the
666.Pa identity.pub 701.Pa identity.pub
667file and edit it. 702file and edit it.
668.Pp 703.Pp
669The options (if present) consists of comma-separated option 704The options (if present) consist of comma-separated option
670specifications. 705specifications.
671No spaces are permitted, except within double quotes. 706No spaces are permitted, except within double quotes.
672The following option specifications are supported: 707The following option specifications are supported:
@@ -740,7 +775,7 @@ and
740files contain host public keys for all known hosts. 775files contain host public keys for all known hosts.
741The global file should 776The global file should
742be prepared by the administrator (optional), and the per-user file is 777be prepared by the administrator (optional), and the per-user file is
743maintained automatically: whenever the user connects an unknown host 778maintained automatically: whenever the user connects from an unknown host
744its key is added to the per-user file. 779its key is added to the per-user file.
745.Pp 780.Pp
746Each line in these files contains the following fields: hostnames, 781Each line in these files contains the following fields: hostnames,
@@ -815,7 +850,7 @@ Contains the process ID of the
815listening for connections (if there are several daemons running 850listening for connections (if there are several daemons running
816concurrently for different ports, this contains the pid of the one 851concurrently for different ports, this contains the pid of the one
817started last). 852started last).
818The contents of this file are not sensitive; it can be world-readable. 853The content of this file is not sensitive; it can be world-readable.
819.It Pa $HOME/.ssh/authorized_keys 854.It Pa $HOME/.ssh/authorized_keys
820Lists the RSA keys that can be used to log into the user's account. 855Lists the RSA keys that can be used to log into the user's account.
821This file must be readable by root (which may on some machines imply 856This file must be readable by root (which may on some machines imply
@@ -843,7 +878,7 @@ These files are consulted when using rhosts with RSA host
843authentication to check the public key of the host. 878authentication to check the public key of the host.
844The key must be listed in one of these files to be accepted. 879The key must be listed in one of these files to be accepted.
845The client uses the same files 880The client uses the same files
846to verify that the remote host is the one we intended to connect. 881to verify that the remote host is the one it intended to connect.
847These files should be writable only by root/the owner. 882These files should be writable only by root/the owner.
848.Pa /etc/ssh_known_hosts 883.Pa /etc/ssh_known_hosts
849should be world-readable, and 884should be world-readable, and
@@ -882,7 +917,7 @@ this file is exactly the same as for
882.Pa .rhosts . 917.Pa .rhosts .
883However, this file is 918However, this file is
884not used by rlogin and rshd, so using this permits access using SSH only. 919not used by rlogin and rshd, so using this permits access using SSH only.
885.Pa /etc/hosts.equiv 920.It Pa /etc/hosts.equiv
886This file is used during 921This file is used during
887.Pa .rhosts 922.Pa .rhosts
888authentication. 923authentication.