summaryrefslogtreecommitdiff
path: root/sshd_config.5
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2015-08-22 10:05:45 +0100
committerColin Watson <cjwatson@debian.org>2015-08-22 10:05:45 +0100
commit58ddb8ad21f21f5358db0204c4ba9abf94a1ca11 (patch)
treec55df1f23e6fa0fb87a96d8ec4c06a68c3a82b45 /sshd_config.5
parent544df7a04ae5b5c1fc30be7c445ad685d7a02dc9 (diff)
parent1dc8d93ce69d6565747eb44446ed117187621b26 (diff)
Import openssh_7.0p1.orig.tar.gz
Diffstat (limited to 'sshd_config.5')
-rw-r--r--sshd_config.5106
1 files changed, 91 insertions, 15 deletions
diff --git a/sshd_config.5 b/sshd_config.5
index 5ab431890..58e277f95 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: sshd_config.5,v 1.204 2015/06/05 03:44:14 djm Exp $ 36.\" $OpenBSD: sshd_config.5,v 1.210 2015/08/06 14:53:21 deraadt Exp $
37.Dd $Mdocdate: June 5 2015 $ 37.Dd $Mdocdate: August 6 2015 $
38.Dt SSHD_CONFIG 5 38.Dt SSHD_CONFIG 5
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -434,6 +434,11 @@ The default is not to
434.It Cm Ciphers 434.It Cm Ciphers
435Specifies the ciphers allowed for protocol version 2. 435Specifies the ciphers allowed for protocol version 2.
436Multiple ciphers must be comma-separated. 436Multiple ciphers must be comma-separated.
437If the specified value begins with a
438.Sq +
439character, then the specified ciphers will be appended to the default set
440instead of replacing them.
441.Pp
437The supported ciphers are: 442The supported ciphers are:
438.Pp 443.Pp
439.Bl -item -compact -offset indent 444.Bl -item -compact -offset indent
@@ -640,9 +645,21 @@ The default is
640.It Cm HostbasedAcceptedKeyTypes 645.It Cm HostbasedAcceptedKeyTypes
641Specifies the key types that will be accepted for hostbased authentication 646Specifies the key types that will be accepted for hostbased authentication
642as a comma-separated pattern list. 647as a comma-separated pattern list.
643The default 648Alternately if the specified value begins with a
644.Dq * 649.Sq +
645will allow all key types. 650character, then the specified key types will be appended to the default set
651instead of replacing them.
652The default for this option is:
653.Bd -literal -offset 3n
654ecdsa-sha2-nistp256-cert-v01@openssh.com,
655ecdsa-sha2-nistp384-cert-v01@openssh.com,
656ecdsa-sha2-nistp521-cert-v01@openssh.com,
657ssh-ed25519-cert-v01@openssh.com,
658ssh-rsa-cert-v01@openssh.com,
659ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
660ssh-ed25519,ssh-rsa
661.Ed
662.Pp
646The 663The
647.Fl Q 664.Fl Q
648option of 665option of
@@ -694,9 +711,15 @@ for protocol version 1, and
694and 711and
695.Pa /etc/ssh/ssh_host_rsa_key 712.Pa /etc/ssh/ssh_host_rsa_key
696for protocol version 2. 713for protocol version 2.
714.Pp
697Note that 715Note that
698.Xr sshd 8 716.Xr sshd 8
699will refuse to use a file if it is group/world-accessible. 717will refuse to use a file if it is group/world-accessible
718and that the
719.Cm HostKeyAlgorithms
720option restricts which of the keys are actually used by
721.Xr sshd 8 .
722.Pp
700It is possible to have multiple host key files. 723It is possible to have multiple host key files.
701.Dq rsa1 724.Dq rsa1
702keys are used for version 1 and 725keys are used for version 1 and
@@ -718,6 +741,26 @@ If
718is specified, the location of the socket will be read from the 741is specified, the location of the socket will be read from the
719.Ev SSH_AUTH_SOCK 742.Ev SSH_AUTH_SOCK
720environment variable. 743environment variable.
744.It Cm HostKeyAlgorithms
745Specifies the protocol version 2 host key algorithms
746that the server offers.
747The default for this option is:
748.Bd -literal -offset 3n
749ecdsa-sha2-nistp256-cert-v01@openssh.com,
750ecdsa-sha2-nistp384-cert-v01@openssh.com,
751ecdsa-sha2-nistp521-cert-v01@openssh.com,
752ssh-ed25519-cert-v01@openssh.com,
753ssh-rsa-cert-v01@openssh.com,
754ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
755ssh-ed25519,ssh-rsa
756.Ed
757.Pp
758The list of available key types may also be obtained using the
759.Fl Q
760option of
761.Xr ssh 1
762with an argument of
763.Dq key .
721.It Cm IgnoreRhosts 764.It Cm IgnoreRhosts
722Specifies that 765Specifies that
723.Pa .rhosts 766.Pa .rhosts
@@ -821,6 +864,10 @@ The default is
821.It Cm KexAlgorithms 864.It Cm KexAlgorithms
822Specifies the available KEX (Key Exchange) algorithms. 865Specifies the available KEX (Key Exchange) algorithms.
823Multiple algorithms must be comma-separated. 866Multiple algorithms must be comma-separated.
867Alternately if the specified value begins with a
868.Sq +
869character, then the specified methods will be appended to the default set
870instead of replacing them.
824The supported algorithms are: 871The supported algorithms are:
825.Pp 872.Pp
826.Bl -item -compact -offset indent 873.Bl -item -compact -offset indent
@@ -919,6 +966,11 @@ Specifies the available MAC (message authentication code) algorithms.
919The MAC algorithm is used in protocol version 2 966The MAC algorithm is used in protocol version 2
920for data integrity protection. 967for data integrity protection.
921Multiple algorithms must be comma-separated. 968Multiple algorithms must be comma-separated.
969If the specified value begins with a
970.Sq +
971character, then the specified algorithms will be appended to the default set
972instead of replacing them.
973.Pp
922The algorithms that contain 974The algorithms that contain
923.Dq -etm 975.Dq -etm
924calculate the MAC after encryption (encrypt-then-mac). 976calculate the MAC after encryption (encrypt-then-mac).
@@ -1152,16 +1204,19 @@ Specifies whether root can log in using
1152.Xr ssh 1 . 1204.Xr ssh 1 .
1153The argument must be 1205The argument must be
1154.Dq yes , 1206.Dq yes ,
1207.Dq prohibit-password ,
1155.Dq without-password , 1208.Dq without-password ,
1156.Dq forced-commands-only , 1209.Dq forced-commands-only ,
1157or 1210or
1158.Dq no . 1211.Dq no .
1159The default is 1212The default is
1160.Dq no . 1213.Dq prohibit-password .
1161.Pp 1214.Pp
1162If this option is set to 1215If this option is set to
1216.Dq prohibit-password
1217or
1163.Dq without-password , 1218.Dq without-password ,
1164password authentication is disabled for root. 1219password and keyboard-interactive authentication are disabled for root.
1165.Pp 1220.Pp
1166If this option is set to 1221If this option is set to
1167.Dq forced-commands-only , 1222.Dq forced-commands-only ,
@@ -1279,9 +1334,21 @@ is identical to
1279.It Cm PubkeyAcceptedKeyTypes 1334.It Cm PubkeyAcceptedKeyTypes
1280Specifies the key types that will be accepted for public key authentication 1335Specifies the key types that will be accepted for public key authentication
1281as a comma-separated pattern list. 1336as a comma-separated pattern list.
1282The default 1337Alternately if the specified value begins with a
1283.Dq * 1338.Sq +
1284will allow all key types. 1339character, then the specified key types will be appended to the default set
1340instead of replacing them.
1341The default for this option is:
1342.Bd -literal -offset 3n
1343ecdsa-sha2-nistp256-cert-v01@openssh.com,
1344ecdsa-sha2-nistp384-cert-v01@openssh.com,
1345ecdsa-sha2-nistp521-cert-v01@openssh.com,
1346ssh-ed25519-cert-v01@openssh.com,
1347ssh-rsa-cert-v01@openssh.com,
1348ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
1349ssh-ed25519,ssh-rsa
1350.Ed
1351.Pp
1285The 1352The
1286.Fl Q 1353.Fl Q
1287option of 1354option of
@@ -1343,7 +1410,7 @@ The default is
1343This option applies to protocol version 1 only. 1410This option applies to protocol version 1 only.
1344.It Cm ServerKeyBits 1411.It Cm ServerKeyBits
1345Defines the number of bits in the ephemeral protocol version 1 server key. 1412Defines the number of bits in the ephemeral protocol version 1 server key.
1346The minimum value is 512, and the default is 1024. 1413The default and minimum value is 1024.
1347.It Cm StreamLocalBindMask 1414.It Cm StreamLocalBindMask
1348Sets the octal file creation mode mask 1415Sets the octal file creation mode mask
1349.Pq umask 1416.Pq umask
@@ -1451,11 +1518,20 @@ For more details on certificates, see the CERTIFICATES section in
1451.It Cm UseDNS 1518.It Cm UseDNS
1452Specifies whether 1519Specifies whether
1453.Xr sshd 8 1520.Xr sshd 8
1454should look up the remote host name and check that 1521should look up the remote host name, and to check that
1455the resolved host name for the remote IP address maps back to the 1522the resolved host name for the remote IP address maps back to the
1456very same IP address. 1523very same IP address.
1457The default is 1524.Pp
1458.Dq no . 1525If this option is set to
1526.Dq no
1527(the default) then only addresses and not host names may be used in
1528.Pa ~/.ssh/known_hosts
1529.Cm from
1530and
1531.Xr sshd_config 5
1532.Cm Match
1533.Cm Host
1534directives.
1459.It Cm UseLogin 1535.It Cm UseLogin
1460Specifies whether 1536Specifies whether
1461.Xr login 1 1537.Xr login 1