diff options
author | Colin Watson <cjwatson@debian.org> | 2015-08-19 17:00:17 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2015-08-19 17:00:17 +0100 |
commit | 544df7a04ae5b5c1fc30be7c445ad685d7a02dc9 (patch) | |
tree | 33d2a87dd50fe5894ac6ec4579c83401b7ab00a4 /sshd_config.5 | |
parent | baccdb349b31c47cd76fb63211f754ed33a9707e (diff) | |
parent | 7de4b03a6e4071d454b72927ffaf52949fa34545 (diff) |
Import openssh_6.9p1.orig.tar.gz
Diffstat (limited to 'sshd_config.5')
-rw-r--r-- | sshd_config.5 | 102 |
1 files changed, 87 insertions, 15 deletions
diff --git a/sshd_config.5 b/sshd_config.5 index 6dce0c70c..5ab431890 100644 --- a/sshd_config.5 +++ b/sshd_config.5 | |||
@@ -33,8 +33,8 @@ | |||
33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
35 | .\" | 35 | .\" |
36 | .\" $OpenBSD: sshd_config.5,v 1.194 2015/02/20 23:46:01 djm Exp $ | 36 | .\" $OpenBSD: sshd_config.5,v 1.204 2015/06/05 03:44:14 djm Exp $ |
37 | .Dd $Mdocdate: February 20 2015 $ | 37 | .Dd $Mdocdate: June 5 2015 $ |
38 | .Dt SSHD_CONFIG 5 | 38 | .Dt SSHD_CONFIG 5 |
39 | .Os | 39 | .Os |
40 | .Sh NAME | 40 | .Sh NAME |
@@ -70,7 +70,11 @@ See | |||
70 | in | 70 | in |
71 | .Xr ssh_config 5 | 71 | .Xr ssh_config 5 |
72 | for how to configure the client. | 72 | for how to configure the client. |
73 | Note that environment passing is only supported for protocol 2. | 73 | Note that environment passing is only supported for protocol 2, and |
74 | that the | ||
75 | .Ev TERM | ||
76 | environment variable is always sent whenever the client | ||
77 | requests a pseudo-terminal as it is required by the protocol. | ||
74 | Variables are specified by name, which may contain the wildcard characters | 78 | Variables are specified by name, which may contain the wildcard characters |
75 | .Ql * | 79 | .Ql * |
76 | and | 80 | and |
@@ -230,9 +234,21 @@ The default is not to require multiple authentication; successful completion | |||
230 | of a single authentication method is sufficient. | 234 | of a single authentication method is sufficient. |
231 | .It Cm AuthorizedKeysCommand | 235 | .It Cm AuthorizedKeysCommand |
232 | Specifies a program to be used to look up the user's public keys. | 236 | Specifies a program to be used to look up the user's public keys. |
233 | The program must be owned by root and not writable by group or others. | 237 | The program must be owned by root, not writable by group or others and |
234 | It will be invoked with a single argument of the username | 238 | specified by an absolute path. |
235 | being authenticated, and should produce on standard output zero or | 239 | .Pp |
240 | Arguments to | ||
241 | .Cm AuthorizedKeysCommand | ||
242 | may be provided using the following tokens, which will be expanded | ||
243 | at runtime: %% is replaced by a literal '%', %u is replaced by the | ||
244 | username being authenticated, %h is replaced by the home directory | ||
245 | of the user being authenticated, %t is replaced with the key type | ||
246 | offered for authentication, %f is replaced with the fingerprint of | ||
247 | the key, and %k is replaced with the key being offered for authentication. | ||
248 | If no arguments are specified then the username of the target user | ||
249 | will be supplied. | ||
250 | .Pp | ||
251 | The program should produce on standard output zero or | ||
236 | more lines of authorized_keys output (see AUTHORIZED_KEYS in | 252 | more lines of authorized_keys output (see AUTHORIZED_KEYS in |
237 | .Xr sshd 8 ) . | 253 | .Xr sshd 8 ) . |
238 | If a key supplied by AuthorizedKeysCommand does not successfully authenticate | 254 | If a key supplied by AuthorizedKeysCommand does not successfully authenticate |
@@ -271,6 +287,42 @@ directory. | |||
271 | Multiple files may be listed, separated by whitespace. | 287 | Multiple files may be listed, separated by whitespace. |
272 | The default is | 288 | The default is |
273 | .Dq .ssh/authorized_keys .ssh/authorized_keys2 . | 289 | .Dq .ssh/authorized_keys .ssh/authorized_keys2 . |
290 | .It Cm AuthorizedPrincipalsCommand | ||
291 | Specifies a program to be used to generate the list of allowed | ||
292 | certificate principals as per | ||
293 | .Cm AuthorizedPrincipalsFile . | ||
294 | The program must be owned by root, not writable by group or others and | ||
295 | specified by an absolute path. | ||
296 | .Pp | ||
297 | Arguments to | ||
298 | .Cm AuthorizedPrincipalsCommand | ||
299 | may be provided using the following tokens, which will be expanded | ||
300 | at runtime: %% is replaced by a literal '%', %u is replaced by the | ||
301 | username being authenticated and %h is replaced by the home directory | ||
302 | of the user being authenticated. | ||
303 | .Pp | ||
304 | The program should produce on standard output zero or | ||
305 | more lines of | ||
306 | .Cm AuthorizedPrincipalsFile | ||
307 | output. | ||
308 | If either | ||
309 | .Cm AuthorizedPrincipalsCommand | ||
310 | or | ||
311 | .Cm AuthorizedPrincipalsFile | ||
312 | is specified, then certificates offered by the client for authentication | ||
313 | must contain a principal that is listed. | ||
314 | By default, no AuthorizedPrincipalsCommand is run. | ||
315 | .It Cm AuthorizedPrincipalsCommandUser | ||
316 | Specifies the user under whose account the AuthorizedPrincipalsCommand is run. | ||
317 | It is recommended to use a dedicated user that has no other role on the host | ||
318 | than running authorized principals commands. | ||
319 | If | ||
320 | .Cm AuthorizedPrincipalsCommand | ||
321 | is specified but | ||
322 | .Cm AuthorizedPrincipalsCommandUser | ||
323 | is not, then | ||
324 | .Xr sshd 8 | ||
325 | will refuse to start. | ||
274 | .It Cm AuthorizedPrincipalsFile | 326 | .It Cm AuthorizedPrincipalsFile |
275 | Specifies a file that lists principal names that are accepted for | 327 | Specifies a file that lists principal names that are accepted for |
276 | certificate authentication. | 328 | certificate authentication. |
@@ -570,6 +622,21 @@ on logout. | |||
570 | The default is | 622 | The default is |
571 | .Dq yes . | 623 | .Dq yes . |
572 | Note that this option applies to protocol version 2 only. | 624 | Note that this option applies to protocol version 2 only. |
625 | .It Cm GSSAPIStrictAcceptorCheck | ||
626 | Determines whether to be strict about the identity of the GSSAPI acceptor | ||
627 | a client authenticates against. | ||
628 | If set to | ||
629 | .Dq yes | ||
630 | then the client must authenticate against the | ||
631 | .Pa host | ||
632 | service on the current hostname. | ||
633 | If set to | ||
634 | .Dq no | ||
635 | then the client may authenticate against any service key stored in the | ||
636 | machine's default store. | ||
637 | This facility is provided to assist with operation on multi homed machines. | ||
638 | The default is | ||
639 | .Dq yes . | ||
573 | .It Cm HostbasedAcceptedKeyTypes | 640 | .It Cm HostbasedAcceptedKeyTypes |
574 | Specifies the key types that will be accepted for hostbased authentication | 641 | Specifies the key types that will be accepted for hostbased authentication |
575 | as a comma-separated pattern list. | 642 | as a comma-separated pattern list. |
@@ -826,16 +893,13 @@ The following forms may be used: | |||
826 | If | 893 | If |
827 | .Ar port | 894 | .Ar port |
828 | is not specified, | 895 | is not specified, |
829 | sshd will listen on the address and all prior | 896 | sshd will listen on the address and all |
830 | .Cm Port | 897 | .Cm Port |
831 | options specified. | 898 | options specified. |
832 | The default is to listen on all local addresses. | 899 | The default is to listen on all local addresses. |
833 | Multiple | 900 | Multiple |
834 | .Cm ListenAddress | 901 | .Cm ListenAddress |
835 | options are permitted. | 902 | options are permitted. |
836 | Additionally, any | ||
837 | .Cm Port | ||
838 | options must precede this option for non-port qualified addresses. | ||
839 | .It Cm LoginGraceTime | 903 | .It Cm LoginGraceTime |
840 | The server disconnects after this time if the user has not | 904 | The server disconnects after this time if the user has not |
841 | successfully logged in. | 905 | successfully logged in. |
@@ -1093,7 +1157,7 @@ The argument must be | |||
1093 | or | 1157 | or |
1094 | .Dq no . | 1158 | .Dq no . |
1095 | The default is | 1159 | The default is |
1096 | .Dq yes . | 1160 | .Dq no . |
1097 | .Pp | 1161 | .Pp |
1098 | If this option is set to | 1162 | If this option is set to |
1099 | .Dq without-password , | 1163 | .Dq without-password , |
@@ -1163,7 +1227,9 @@ The default is | |||
1163 | .Dq yes . | 1227 | .Dq yes . |
1164 | .It Cm PidFile | 1228 | .It Cm PidFile |
1165 | Specifies the file that contains the process ID of the | 1229 | Specifies the file that contains the process ID of the |
1166 | SSH daemon. | 1230 | SSH daemon, or |
1231 | .Dq none | ||
1232 | to not write one. | ||
1167 | The default is | 1233 | The default is |
1168 | .Pa /var/run/sshd.pid . | 1234 | .Pa /var/run/sshd.pid . |
1169 | .It Cm Port | 1235 | .It Cm Port |
@@ -1253,7 +1319,9 @@ which means that rekeying is performed after the cipher's default amount | |||
1253 | of data has been sent or received and no time based rekeying is done. | 1319 | of data has been sent or received and no time based rekeying is done. |
1254 | This option applies to protocol version 2 only. | 1320 | This option applies to protocol version 2 only. |
1255 | .It Cm RevokedKeys | 1321 | .It Cm RevokedKeys |
1256 | Specifies revoked public keys. | 1322 | Specifies revoked public keys file, or |
1323 | .Dq none | ||
1324 | to not use one. | ||
1257 | Keys listed in this file will be refused for public key authentication. | 1325 | Keys listed in this file will be refused for public key authentication. |
1258 | Note that if this file is not readable, then public key authentication will | 1326 | Note that if this file is not readable, then public key authentication will |
1259 | be refused for all users. | 1327 | be refused for all users. |
@@ -1366,7 +1434,9 @@ To disable TCP keepalive messages, the value should be set to | |||
1366 | .Dq no . | 1434 | .Dq no . |
1367 | .It Cm TrustedUserCAKeys | 1435 | .It Cm TrustedUserCAKeys |
1368 | Specifies a file containing public keys of certificate authorities that are | 1436 | Specifies a file containing public keys of certificate authorities that are |
1369 | trusted to sign user certificates for authentication. | 1437 | trusted to sign user certificates for authentication, or |
1438 | .Dq none | ||
1439 | to not use one. | ||
1370 | Keys are listed one per line; empty lines and comments starting with | 1440 | Keys are listed one per line; empty lines and comments starting with |
1371 | .Ql # | 1441 | .Ql # |
1372 | are allowed. | 1442 | are allowed. |
@@ -1519,7 +1589,9 @@ The default is | |||
1519 | .It Cm XAuthLocation | 1589 | .It Cm XAuthLocation |
1520 | Specifies the full pathname of the | 1590 | Specifies the full pathname of the |
1521 | .Xr xauth 1 | 1591 | .Xr xauth 1 |
1522 | program. | 1592 | program, or |
1593 | .Dq none | ||
1594 | to not use one. | ||
1523 | The default is | 1595 | The default is |
1524 | .Pa /usr/X11R6/bin/xauth . | 1596 | .Pa /usr/X11R6/bin/xauth . |
1525 | .El | 1597 | .El |