summaryrefslogtreecommitdiff
path: root/sshd_config.5
diff options
context:
space:
mode:
authornaddy@openbsd.org <naddy@openbsd.org>2019-12-19 15:09:30 +0000
committerDarren Tucker <dtucker@dtucker.net>2019-12-20 14:25:08 +1100
commitae024b22c4fd68e7f39681d605585889f9511108 (patch)
tree13b0f16f9f778ba7169ccc5a7ab11a62dec36368 /sshd_config.5
parentbc2dc091e0ac4ff6245c43a61ebe12c7e9ea0b7f (diff)
upstream: Document that security key-hosted keys can act as host
keys. Update the list of default host key algorithms in ssh_config.5 and sshd_config.5. Copy the description of the SecurityKeyProvider option to sshd_config.5. ok jmc@ OpenBSD-Commit-ID: edadf3566ab5e94582df4377fee3b8b702c7eca0
Diffstat (limited to 'sshd_config.5')
-rw-r--r--sshd_config.530
1 files changed, 21 insertions, 9 deletions
diff --git a/sshd_config.5 b/sshd_config.5
index 8bfb3b6c8..222193170 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: sshd_config.5,v 1.295 2019/11/30 07:07:59 jmc Exp $ 36.\" $OpenBSD: sshd_config.5,v 1.296 2019/12/19 15:09:30 naddy Exp $
37.Dd $Mdocdate: November 30 2019 $ 37.Dd $Mdocdate: December 19 2019 $
38.Dt SSHD_CONFIG 5 38.Dt SSHD_CONFIG 5
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -689,12 +689,16 @@ The default for this option is:
689ecdsa-sha2-nistp256-cert-v01@openssh.com, 689ecdsa-sha2-nistp256-cert-v01@openssh.com,
690ecdsa-sha2-nistp384-cert-v01@openssh.com, 690ecdsa-sha2-nistp384-cert-v01@openssh.com,
691ecdsa-sha2-nistp521-cert-v01@openssh.com, 691ecdsa-sha2-nistp521-cert-v01@openssh.com,
692sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
692ssh-ed25519-cert-v01@openssh.com, 693ssh-ed25519-cert-v01@openssh.com,
694sk-ssh-ed25519-cert-v01@openssh.com,
693rsa-sha2-512-cert-v01@openssh.com, 695rsa-sha2-512-cert-v01@openssh.com,
694rsa-sha2-256-cert-v01@openssh.com, 696rsa-sha2-256-cert-v01@openssh.com,
695ssh-rsa-cert-v01@openssh.com, 697ssh-rsa-cert-v01@openssh.com,
696ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521, 698ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
697ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa 699sk-ecdsa-sha2-nistp256@openssh.com,
700ssh-ed25519,sk-ssh-ed25519@openssh.com,
701rsa-sha2-512,rsa-sha2-256,ssh-rsa
698.Ed 702.Ed
699.Pp 703.Pp
700The list of available key types may also be obtained using 704The list of available key types may also be obtained using
@@ -768,12 +772,16 @@ The default for this option is:
768ecdsa-sha2-nistp256-cert-v01@openssh.com, 772ecdsa-sha2-nistp256-cert-v01@openssh.com,
769ecdsa-sha2-nistp384-cert-v01@openssh.com, 773ecdsa-sha2-nistp384-cert-v01@openssh.com,
770ecdsa-sha2-nistp521-cert-v01@openssh.com, 774ecdsa-sha2-nistp521-cert-v01@openssh.com,
775sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
771ssh-ed25519-cert-v01@openssh.com, 776ssh-ed25519-cert-v01@openssh.com,
777sk-ssh-ed25519-cert-v01@openssh.com,
772rsa-sha2-512-cert-v01@openssh.com, 778rsa-sha2-512-cert-v01@openssh.com,
773rsa-sha2-256-cert-v01@openssh.com, 779rsa-sha2-256-cert-v01@openssh.com,
774ssh-rsa-cert-v01@openssh.com, 780ssh-rsa-cert-v01@openssh.com,
775ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521, 781ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
776ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa 782sk-ecdsa-sha2-nistp256@openssh.com,
783ssh-ed25519,sk-ssh-ed25519@openssh.com,
784rsa-sha2-512,rsa-sha2-256,ssh-rsa
777.Ed 785.Ed
778.Pp 786.Pp
779The list of available key types may also be obtained using 787The list of available key types may also be obtained using
@@ -1427,19 +1435,19 @@ character, then the specified key types will be placed at the head of the
1427default set. 1435default set.
1428The default for this option is: 1436The default for this option is:
1429.Bd -literal -offset 3n 1437.Bd -literal -offset 3n
1430sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
1431ecdsa-sha2-nistp256-cert-v01@openssh.com, 1438ecdsa-sha2-nistp256-cert-v01@openssh.com,
1432ecdsa-sha2-nistp384-cert-v01@openssh.com, 1439ecdsa-sha2-nistp384-cert-v01@openssh.com,
1433ecdsa-sha2-nistp521-cert-v01@openssh.com, 1440ecdsa-sha2-nistp521-cert-v01@openssh.com,
1434sk-ssh-ed25519-cert-v01@openssh.com, 1441sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,
1435ssh-ed25519-cert-v01@openssh.com, 1442ssh-ed25519-cert-v01@openssh.com,
1443sk-ssh-ed25519-cert-v01@openssh.com,
1436rsa-sha2-512-cert-v01@openssh.com, 1444rsa-sha2-512-cert-v01@openssh.com,
1437rsa-sha2-256-cert-v01@openssh.com, 1445rsa-sha2-256-cert-v01@openssh.com,
1438ssh-rsa-cert-v01@openssh.com, 1446ssh-rsa-cert-v01@openssh.com,
1439sk-ecdsa-sha2-nistp256@openssh.com,
1440ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521, 1447ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
1441sk-ssh-ed25519@openssh.com, 1448sk-ecdsa-sha2-nistp256@openssh.com,
1442ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa 1449ssh-ed25519,sk-ssh-ed25519@openssh.com,
1450rsa-sha2-512,rsa-sha2-256,ssh-rsa
1443.Ed 1451.Ed
1444.Pp 1452.Pp
1445The list of available key types may also be obtained using 1453The list of available key types may also be obtained using
@@ -1518,6 +1526,10 @@ will be bound to this
1518If the routing domain is set to 1526If the routing domain is set to
1519.Cm \&%D , 1527.Cm \&%D ,
1520then the domain in which the incoming connection was received will be applied. 1528then the domain in which the incoming connection was received will be applied.
1529.It Cm SecurityKeyProvider
1530Specifies a path to a security key provider library that will be used when
1531loading any security key-hosted keys, overriding the default of using
1532the built-in support for USB HID keys.
1521.It Cm SetEnv 1533.It Cm SetEnv
1522Specifies one or more environment variables to set in child sessions started 1534Specifies one or more environment variables to set in child sessions started
1523by 1535by