summaryrefslogtreecommitdiff
path: root/sshd_config.5
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2004-03-01 02:25:32 +0000
committerColin Watson <cjwatson@debian.org>2004-03-01 02:25:32 +0000
commitea8116a11e3de70036dbc665ccb0d486cf89cac9 (patch)
treed73ccdff78d8608e156465af42e6a1b3527fb2d6 /sshd_config.5
parente39b311381a5609cc05acf298c42fba196dc524b (diff)
parentf5bda272678ec6dccaa5f29379cf60cb855018e8 (diff)
Merge 3.8p1 to the trunk. This builds and runs, but I haven't tested it
extensively yet. ProtocolKeepAlives is now just a compatibility alias for ServerAliveInterval.
Diffstat (limited to 'sshd_config.5')
-rw-r--r--sshd_config.566
1 files changed, 30 insertions, 36 deletions
diff --git a/sshd_config.5 b/sshd_config.5
index 727fdb12a..41228248c 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: sshd_config.5,v 1.25 2003/09/01 09:50:04 markus Exp $ 37.\" $OpenBSD: sshd_config.5,v 1.28 2004/02/17 19:35:21 jmc Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSHD_CONFIG 5 39.Dt SSHD_CONFIG 5
40.Os 40.Os
@@ -156,12 +156,12 @@ If this threshold is reached while client alive messages are being sent,
156will disconnect the client, terminating the session. 156will disconnect the client, terminating the session.
157It is important to note that the use of client alive messages is very 157It is important to note that the use of client alive messages is very
158different from 158different from
159.Cm KeepAlive 159.Cm TCPKeepAlive
160(below). 160(below).
161The client alive messages are sent through the encrypted channel 161The client alive messages are sent through the encrypted channel
162and therefore will not be spoofable. 162and therefore will not be spoofable.
163The TCP keepalive option enabled by 163The TCP keepalive option enabled by
164.Cm KeepAlive 164.Cm TCPKeepAlive
165is spoofable. 165is spoofable.
166The client alive mechanism is valuable when the client or 166The client alive mechanism is valuable when the client or
167server depend on knowing when a connection has become inactive. 167server depend on knowing when a connection has become inactive.
@@ -227,7 +227,7 @@ The default is
227.Dq no . 227.Dq no .
228.It Cm GSSAPIAuthentication 228.It Cm GSSAPIAuthentication
229Specifies whether user authentication based on GSSAPI is allowed. 229Specifies whether user authentication based on GSSAPI is allowed.
230The default is 230The default is
231.Dq no . 231.Dq no .
232Note that this option applies to protocol version 2 only. 232Note that this option applies to protocol version 2 only.
233.It Cm GSSAPICleanupCredentials 233.It Cm GSSAPICleanupCredentials
@@ -292,27 +292,6 @@ or
292.Cm HostbasedAuthentication . 292.Cm HostbasedAuthentication .
293The default is 293The default is
294.Dq no . 294.Dq no .
295.It Cm KeepAlive
296Specifies whether the system should send TCP keepalive messages to the
297other side.
298If they are sent, death of the connection or crash of one
299of the machines will be properly noticed.
300However, this means that
301connections will die if the route is down temporarily, and some people
302find it annoying.
303On the other hand, if keepalives are not sent,
304sessions may hang indefinitely on the server, leaving
305.Dq ghost
306users and consuming server resources.
307.Pp
308The default is
309.Dq yes
310(to send keepalives), and the server will notice
311if the network goes down or the client host crashes.
312This avoids infinitely hanging sessions.
313.Pp
314To disable keepalives, the value should be set to
315.Dq no .
316.It Cm KerberosAuthentication 295.It Cm KerberosAuthentication
317Specifies whether the password provided by the user for 296Specifies whether the password provided by the user for
318.Cm PasswordAuthentication 297.Cm PasswordAuthentication
@@ -533,13 +512,6 @@ Specifies whether public key authentication is allowed.
533The default is 512The default is
534.Dq yes . 513.Dq yes .
535Note that this option applies to protocol version 2 only. 514Note that this option applies to protocol version 2 only.
536.Cm RhostsRSAAuthentication
537should be used
538instead, because it performs RSA-based host authentication in addition
539to normal rhosts or /etc/hosts.equiv authentication.
540The default is
541.Dq no .
542This option applies to protocol version 1 only.
543.It Cm RhostsRSAAuthentication 515.It Cm RhostsRSAAuthentication
544Specifies whether rhosts or /etc/hosts.equiv authentication together 516Specifies whether rhosts or /etc/hosts.equiv authentication together
545with successful RSA host authentication is allowed. 517with successful RSA host authentication is allowed.
@@ -580,6 +552,27 @@ Gives the facility code that is used when logging messages from
580The possible values are: DAEMON, USER, AUTH, LOCAL0, LOCAL1, LOCAL2, 552The possible values are: DAEMON, USER, AUTH, LOCAL0, LOCAL1, LOCAL2,
581LOCAL3, LOCAL4, LOCAL5, LOCAL6, LOCAL7. 553LOCAL3, LOCAL4, LOCAL5, LOCAL6, LOCAL7.
582The default is AUTH. 554The default is AUTH.
555.It Cm TCPKeepAlive
556Specifies whether the system should send TCP keepalive messages to the
557other side.
558If they are sent, death of the connection or crash of one
559of the machines will be properly noticed.
560However, this means that
561connections will die if the route is down temporarily, and some people
562find it annoying.
563On the other hand, if TCP keepalives are not sent,
564sessions may hang indefinitely on the server, leaving
565.Dq ghost
566users and consuming server resources.
567.Pp
568The default is
569.Dq yes
570(to send TCP keepalive messages), and the server will notice
571if the network goes down or the client host crashes.
572This avoids infinitely hanging sessions.
573.Pp
574To disable TCP keepalive messages, the value should be set to
575.Dq no .
583.It Cm UseDNS 576.It Cm UseDNS
584Specifies whether 577Specifies whether
585.Nm sshd 578.Nm sshd
@@ -608,12 +601,13 @@ If
608.Cm UsePrivilegeSeparation 601.Cm UsePrivilegeSeparation
609is specified, it will be disabled after authentication. 602is specified, it will be disabled after authentication.
610.It Cm UsePAM 603.It Cm UsePAM
611Enables PAM authentication (via challenge-response) and session set up. 604Enables PAM authentication (via challenge-response) and session set up.
612If you enable this, you should probably disable 605If you enable this, you should probably disable
613.Cm PasswordAuthentication . 606.Cm PasswordAuthentication .
614If you enable 607If you enable
615.CM UsePAM 608.CM UsePAM
616then you will not be able to run sshd as a non-root user. 609then you will not be able to run sshd as a non-root user. The default is
610.Dq no .
617.It Cm UsePrivilegeSeparation 611.It Cm UsePrivilegeSeparation
618Specifies whether 612Specifies whether
619.Nm sshd 613.Nm sshd