summaryrefslogtreecommitdiff
path: root/sshd.8
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2003-02-24 11:52:26 +1100
committerDamien Miller <djm@mindrot.org>2003-02-24 11:52:26 +1100
commitffadc583f63eb8b37750bdce6b70c6102ae621b4 (patch)
tree05ac7ef6ae0a837401d5913b08e449504748df75 /sshd.8
parent2eb26e89c5472e6b3041bb5c776e819835bcbf4c (diff)
- jmc@cvs.openbsd.org 2003/01/31 21:54:40
[sshd.8] typos; sshd(8): help and ok markus@ help and ok millert@
Diffstat (limited to 'sshd.8')
-rw-r--r--sshd.831
1 files changed, 19 insertions, 12 deletions
diff --git a/sshd.8 b/sshd.8
index 22ab70e00..a99c4f162 100644
--- a/sshd.8
+++ b/sshd.8
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: sshd.8,v 1.193 2002/09/24 20:59:44 todd Exp $ 37.\" $OpenBSD: sshd.8,v 1.194 2003/01/31 21:54:40 jmc Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSHD 8 39.Dt SSHD 8
40.Os 40.Os
@@ -43,6 +43,7 @@
43.Nd OpenSSH SSH daemon 43.Nd OpenSSH SSH daemon
44.Sh SYNOPSIS 44.Sh SYNOPSIS
45.Nm sshd 45.Nm sshd
46.Bk -words
46.Op Fl deiqtD46 47.Op Fl deiqtD46
47.Op Fl b Ar bits 48.Op Fl b Ar bits
48.Op Fl f Ar config_file 49.Op Fl f Ar config_file
@@ -52,6 +53,7 @@
52.Op Fl o Ar option 53.Op Fl o Ar option
53.Op Fl p Ar port 54.Op Fl p Ar port
54.Op Fl u Ar len 55.Op Fl u Ar len
56.Ek
55.Sh DESCRIPTION 57.Sh DESCRIPTION
56.Nm 58.Nm
57(SSH Daemon) is the daemon program for 59(SSH Daemon) is the daemon program for
@@ -75,7 +77,7 @@ This implementation of
75.Nm 77.Nm
76supports both SSH protocol version 1 and 2 simultaneously. 78supports both SSH protocol version 1 and 2 simultaneously.
77.Nm 79.Nm
78works as follows. 80works as follows:
79.Pp 81.Pp
80.Ss SSH protocol version 1 82.Ss SSH protocol version 1
81.Pp 83.Pp
@@ -86,7 +88,7 @@ the daemon starts, it generates a server RSA key (normally 768 bits).
86This key is normally regenerated every hour if it has been used, and 88This key is normally regenerated every hour if it has been used, and
87is never stored on disk. 89is never stored on disk.
88.Pp 90.Pp
89Whenever a client connects the daemon responds with its public 91Whenever a client connects, the daemon responds with its public
90host and server keys. 92host and server keys.
91The client compares the 93The client compares the
92RSA host key against its own database to verify that it has not changed. 94RSA host key against its own database to verify that it has not changed.
@@ -119,7 +121,7 @@ System security is not improved unless
119.Nm rshd , 121.Nm rshd ,
120.Nm rlogind , 122.Nm rlogind ,
121and 123and
122.Xr rexecd 124.Nm rexecd
123are disabled (thus completely disabling 125are disabled (thus completely disabling
124.Xr rlogin 126.Xr rlogin
125and 127and
@@ -189,7 +191,9 @@ The server sends verbose debug output to the system
189log, and does not put itself in the background. 191log, and does not put itself in the background.
190The server also will not fork and will only process one connection. 192The server also will not fork and will only process one connection.
191This option is only intended for debugging for the server. 193This option is only intended for debugging for the server.
192Multiple -d options increase the debugging level. 194Multiple
195.Fl d
196options increase the debugging level.
193Maximum is 3. 197Maximum is 3.
194.It Fl e 198.It Fl e
195When this option is specified, 199When this option is specified,
@@ -225,7 +229,8 @@ the different protocol versions and host key algorithms.
225.It Fl i 229.It Fl i
226Specifies that 230Specifies that
227.Nm 231.Nm
228is being run from inetd. 232is being run from
233.Xr inetd 8 .
229.Nm 234.Nm
230is normally not run 235is normally not run
231from inetd because it needs to generate the server key before it can 236from inetd because it needs to generate the server key before it can
@@ -282,7 +287,7 @@ should be put into the
282.Pa utmp 287.Pa utmp
283file. 288file.
284.Fl u0 289.Fl u0
285is also be used to prevent 290may also be used to prevent
286.Nm 291.Nm
287from making DNS requests unless the authentication 292from making DNS requests unless the authentication
288mechanism or configuration requires it. 293mechanism or configuration requires it.
@@ -446,7 +451,7 @@ authentication.
446The command supplied by the user (if any) is ignored. 451The command supplied by the user (if any) is ignored.
447The command is run on a pty if the client requests a pty; 452The command is run on a pty if the client requests a pty;
448otherwise it is run without a tty. 453otherwise it is run without a tty.
449If a 8-bit clean channel is required, 454If an 8-bit clean channel is required,
450one must not request a pty or should specify 455one must not request a pty or should specify
451.Cm no-pty . 456.Cm no-pty .
452A quote may be included in the command by quoting it with a backslash. 457A quote may be included in the command by quoting it with a backslash.
@@ -506,7 +511,7 @@ command="dump /home",no-pty,no-port-forwarding 1024 33 23.\|.\|.\|2323 backup.hu
506permitopen="10.2.1.55:80",permitopen="10.2.1.56:25" 1024 33 23.\|.\|.\|2323 511permitopen="10.2.1.55:80",permitopen="10.2.1.56:25" 1024 33 23.\|.\|.\|2323
507.Sh SSH_KNOWN_HOSTS FILE FORMAT 512.Sh SSH_KNOWN_HOSTS FILE FORMAT
508The 513The
509.Pa /etc/ssh/ssh_known_hosts , 514.Pa /etc/ssh/ssh_known_hosts
510and 515and
511.Pa $HOME/.ssh/known_hosts 516.Pa $HOME/.ssh/known_hosts
512files contain host public keys for all known hosts. 517files contain host public keys for all known hosts.
@@ -627,7 +632,7 @@ These files should be writable only by root/the owner.
627.Pa /etc/ssh/ssh_known_hosts 632.Pa /etc/ssh/ssh_known_hosts
628should be world-readable, and 633should be world-readable, and
629.Pa $HOME/.ssh/known_hosts 634.Pa $HOME/.ssh/known_hosts
630can but need not be world-readable. 635can, but need not be, world-readable.
631.It Pa /etc/nologin 636.It Pa /etc/nologin
632If this file exists, 637If this file exists,
633.Nm 638.Nm
@@ -644,7 +649,7 @@ Further details are described in
644This file contains host-username pairs, separated by a space, one per 649This file contains host-username pairs, separated by a space, one per
645line. 650line.
646The given user on the corresponding host is permitted to log in 651The given user on the corresponding host is permitted to log in
647without password. 652without a password.
648The same file is used by rlogind and rshd. 653The same file is used by rlogind and rshd.
649The file must 654The file must
650be writable only by the user; it is recommended that it not be 655be writable only by the user; it is recommended that it not be
@@ -713,7 +718,9 @@ controlled via the
713.Cm PermitUserEnvironment 718.Cm PermitUserEnvironment
714option. 719option.
715.It Pa $HOME/.ssh/rc 720.It Pa $HOME/.ssh/rc
716If this file exists, it is run with /bin/sh after reading the 721If this file exists, it is run with
722.Pa /bin/sh
723after reading the
717environment files but before starting the user's shell or command. 724environment files but before starting the user's shell or command.
718It must not produce any output on stdout; stderr must be used 725It must not produce any output on stdout; stderr must be used
719instead. 726instead.