summaryrefslogtreecommitdiff
path: root/sshd_config.5
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2017-03-29 01:35:00 +0100
committerColin Watson <cjwatson@debian.org>2017-03-29 01:35:00 +0100
commit6fabaf6fd9b07cc8bc6a17c9c4a5b76849cfc874 (patch)
treeb4377d09196e24e2c6f2c2128f66f92cf7891105 /sshd_config.5
parent971a7653746a6972b907dfe0ce139c06e4a6f482 (diff)
parentd38f05dbdd291212bc95ea80648b72b7177e9f4e (diff)
Import openssh_7.5p1.orig.tar.gz
Diffstat (limited to 'sshd_config.5')
-rw-r--r--sshd_config.550
1 files changed, 24 insertions, 26 deletions
diff --git a/sshd_config.5 b/sshd_config.5
index 32b29d240..ac6ccc793 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: sshd_config.5,v 1.239 2016/11/30 03:00:05 djm Exp $ 36.\" $OpenBSD: sshd_config.5,v 1.243 2017/03/14 07:19:07 djm Exp $
37.Dd $Mdocdate: November 30 2016 $ 37.Dd $Mdocdate: March 14 2017 $
38.Dt SSHD_CONFIG 5 38.Dt SSHD_CONFIG 5
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -437,6 +437,10 @@ If the specified value begins with a
437.Sq + 437.Sq +
438character, then the specified ciphers will be appended to the default set 438character, then the specified ciphers will be appended to the default set
439instead of replacing them. 439instead of replacing them.
440If the specified value begins with a
441.Sq -
442character, then the specified ciphers (including wildcards) will be removed
443from the default set instead of replacing them.
440.Pp 444.Pp
441The supported ciphers are: 445The supported ciphers are:
442.Pp 446.Pp
@@ -649,6 +653,10 @@ Alternately if the specified value begins with a
649.Sq + 653.Sq +
650character, then the specified key types will be appended to the default set 654character, then the specified key types will be appended to the default set
651instead of replacing them. 655instead of replacing them.
656If the specified value begins with a
657.Sq -
658character, then the specified key types (including wildcards) will be removed
659from the default set instead of replacing them.
652The default for this option is: 660The default for this option is:
653.Bd -literal -offset 3n 661.Bd -literal -offset 3n
654ecdsa-sha2-nistp256-cert-v01@openssh.com, 662ecdsa-sha2-nistp256-cert-v01@openssh.com,
@@ -843,6 +851,10 @@ Alternately if the specified value begins with a
843.Sq + 851.Sq +
844character, then the specified methods will be appended to the default set 852character, then the specified methods will be appended to the default set
845instead of replacing them. 853instead of replacing them.
854If the specified value begins with a
855.Sq -
856character, then the specified methods (including wildcards) will be removed
857from the default set instead of replacing them.
846The supported algorithms are: 858The supported algorithms are:
847.Pp 859.Pp
848.Bl -item -compact -offset indent 860.Bl -item -compact -offset indent
@@ -933,6 +945,10 @@ If the specified value begins with a
933.Sq + 945.Sq +
934character, then the specified algorithms will be appended to the default set 946character, then the specified algorithms will be appended to the default set
935instead of replacing them. 947instead of replacing them.
948If the specified value begins with a
949.Sq -
950character, then the specified algorithms (including wildcards) will be removed
951from the default set instead of replacing them.
936.Pp 952.Pp
937The algorithms that contain 953The algorithms that contain
938.Qq -etm 954.Qq -etm
@@ -1280,6 +1296,10 @@ Alternately if the specified value begins with a
1280.Sq + 1296.Sq +
1281character, then the specified key types will be appended to the default set 1297character, then the specified key types will be appended to the default set
1282instead of replacing them. 1298instead of replacing them.
1299If the specified value begins with a
1300.Sq -
1301character, then the specified key types (including wildcards) will be removed
1302from the default set instead of replacing them.
1283The default for this option is: 1303The default for this option is:
1284.Bd -literal -offset 3n 1304.Bd -literal -offset 3n
1285ecdsa-sha2-nistp256-cert-v01@openssh.com, 1305ecdsa-sha2-nistp256-cert-v01@openssh.com,
@@ -1474,28 +1494,6 @@ is enabled, you will not be able to run
1474as a non-root user. 1494as a non-root user.
1475The default is 1495The default is
1476.Cm no . 1496.Cm no .
1477.It Cm UsePrivilegeSeparation
1478Specifies whether
1479.Xr sshd 8
1480separates privileges by creating an unprivileged child process
1481to deal with incoming network traffic.
1482After successful authentication, another process will be created that has
1483the privilege of the authenticated user.
1484The goal of privilege separation is to prevent privilege
1485escalation by containing any corruption within the unprivileged processes.
1486The argument must be
1487.Cm yes ,
1488.Cm no ,
1489or
1490.Cm sandbox .
1491If
1492.Cm UsePrivilegeSeparation
1493is set to
1494.Cm sandbox
1495then the pre-authentication unprivileged process is subject to additional
1496restrictions.
1497The default is
1498.Cm sandbox .
1499.It Cm VersionAddendum 1497.It Cm VersionAddendum
1500Optionally specifies additional text to append to the SSH protocol banner 1498Optionally specifies additional text to append to the SSH protocol banner
1501sent by the server upon connection. 1499sent by the server upon connection.
@@ -1644,13 +1642,13 @@ The username.
1644.El 1642.El
1645.Pp 1643.Pp
1646.Cm AuthorizedKeysCommand 1644.Cm AuthorizedKeysCommand
1647accepts the tokens %%, %f, %h, %t, and %u. 1645accepts the tokens %%, %f, %h, %k, %t, and %u.
1648.Pp 1646.Pp
1649.Cm AuthorizedKeysFile 1647.Cm AuthorizedKeysFile
1650accepts the tokens %%, %h, and %u. 1648accepts the tokens %%, %h, and %u.
1651.Pp 1649.Pp
1652.Cm AuthorizedPrincipalsCommand 1650.Cm AuthorizedPrincipalsCommand
1653accepts the tokens %%, %F, %f, %K, %k, %h, %i, %s, %T, %t, and %u. 1651accepts the tokens %%, %F, %f, %h, %i, %K, %k, %s, %T, %t, and %u.
1654.Pp 1652.Pp
1655.Cm AuthorizedPrincipalsFile 1653.Cm AuthorizedPrincipalsFile
1656accepts the tokens %%, %h, and %u. 1654accepts the tokens %%, %h, and %u.