summaryrefslogtreecommitdiff
path: root/sshd_config.5
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2014-02-10 00:18:28 +0000
committerColin Watson <cjwatson@debian.org>2014-02-10 00:18:28 +0000
commit9a975a9faed7c4f334e8c8490db3e77e102f2b21 (patch)
tree764a885ec9a963f6a8b15de6e1765f16b9ac4738 /sshd_config.5
parentee196dab7c5f97f0b80c8099343a375bead92010 (diff)
parentcdb6c90811caa5df2df856be9b0b16db020fe31d (diff)
Import openssh_6.5p1.orig.tar.gz
Diffstat (limited to 'sshd_config.5')
-rw-r--r--sshd_config.549
1 files changed, 35 insertions, 14 deletions
diff --git a/sshd_config.5 b/sshd_config.5
index 3abac6c10..3b21ea6e7 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: sshd_config.5,v 1.162 2013/07/19 07:37:48 markus Exp $ 36.\" $OpenBSD: sshd_config.5,v 1.170 2013/12/08 09:53:27 dtucker Exp $
37.Dd $Mdocdate: July 19 2013 $ 37.Dd $Mdocdate: December 8 2013 $
38.Dt SSHD_CONFIG 5 38.Dt SSHD_CONFIG 5
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -335,7 +335,8 @@ The default is not to
335.It Cm Ciphers 335.It Cm Ciphers
336Specifies the ciphers allowed for protocol version 2. 336Specifies the ciphers allowed for protocol version 2.
337Multiple ciphers must be comma-separated. 337Multiple ciphers must be comma-separated.
338The supported ciphers are 338The supported ciphers are:
339.Pp
339.Dq 3des-cbc , 340.Dq 3des-cbc ,
340.Dq aes128-cbc , 341.Dq aes128-cbc ,
341.Dq aes192-cbc , 342.Dq aes192-cbc ,
@@ -349,15 +350,23 @@ The supported ciphers are
349.Dq arcfour256 , 350.Dq arcfour256 ,
350.Dq arcfour , 351.Dq arcfour ,
351.Dq blowfish-cbc , 352.Dq blowfish-cbc ,
353.Dq cast128-cbc ,
352and 354and
353.Dq cast128-cbc . 355.Dq chacha20-poly1305@openssh.com .
356.Pp
354The default is: 357The default is:
355.Bd -literal -offset 3n 358.Bd -literal -offset 3n
356aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128, 359aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,
357aes128-gcm@openssh.com,aes256-gcm@openssh.com, 360aes128-gcm@openssh.com,aes256-gcm@openssh.com,
361chacha20-poly1305@openssh.com,
358aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc, 362aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,
359aes256-cbc,arcfour 363aes256-cbc,arcfour
360.Ed 364.Ed
365.Pp
366The list of available ciphers may also be obtained using the
367.Fl Q
368option of
369.Xr ssh 1 .
361.It Cm ClientAliveCountMax 370.It Cm ClientAliveCountMax
362Sets the number of client alive messages (see below) which may be 371Sets the number of client alive messages (see below) which may be
363sent without 372sent without
@@ -531,7 +540,8 @@ The default is
531.Pa /etc/ssh/ssh_host_key 540.Pa /etc/ssh/ssh_host_key
532for protocol version 1, and 541for protocol version 1, and
533.Pa /etc/ssh/ssh_host_dsa_key , 542.Pa /etc/ssh/ssh_host_dsa_key ,
534.Pa /etc/ssh/ssh_host_ecdsa_key 543.Pa /etc/ssh/ssh_host_ecdsa_key ,
544.Pa /etc/ssh/ssh_host_ed25519_key
535and 545and
536.Pa /etc/ssh/ssh_host_rsa_key 546.Pa /etc/ssh/ssh_host_rsa_key
537for protocol version 2. 547for protocol version 2.
@@ -542,7 +552,8 @@ It is possible to have multiple host key files.
542.Dq rsa1 552.Dq rsa1
543keys are used for version 1 and 553keys are used for version 1 and
544.Dq dsa , 554.Dq dsa ,
545.Dq ecdsa 555.Dq ecdsa ,
556.Dq ed25519
546or 557or
547.Dq rsa 558.Dq rsa
548are used for version 2 of the SSH protocol. 559are used for version 2 of the SSH protocol.
@@ -651,13 +662,14 @@ The default is
651Specifies the available KEX (Key Exchange) algorithms. 662Specifies the available KEX (Key Exchange) algorithms.
652Multiple algorithms must be comma-separated. 663Multiple algorithms must be comma-separated.
653The default is 664The default is
654.Dq ecdh-sha2-nistp256 , 665.Bd -literal -offset indent
655.Dq ecdh-sha2-nistp384 , 666curve25519-sha256@libssh.org,
656.Dq ecdh-sha2-nistp521 , 667ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,
657.Dq diffie-hellman-group-exchange-sha256 , 668diffie-hellman-group-exchange-sha256,
658.Dq diffie-hellman-group-exchange-sha1 , 669diffie-hellman-group-exchange-sha1,
659.Dq diffie-hellman-group14-sha1 , 670diffie-hellman-group14-sha1,
660.Dq diffie-hellman-group1-sha1 . 671diffie-hellman-group1-sha1
672.Ed
661.It Cm KeyRegenerationInterval 673.It Cm KeyRegenerationInterval
662In protocol version 1, the ephemeral server key is automatically regenerated 674In protocol version 1, the ephemeral server key is automatically regenerated
663after this many seconds (if it has been used). 675after this many seconds (if it has been used).
@@ -750,7 +762,9 @@ line or the end of the file.
750.Pp 762.Pp
751The arguments to 763The arguments to
752.Cm Match 764.Cm Match
753are one or more criteria-pattern pairs. 765are one or more criteria-pattern pairs or the single token
766.Cm All
767which matches all criteria.
754The available criteria are 768The available criteria are
755.Cm User , 769.Cm User ,
756.Cm Group , 770.Cm Group ,
@@ -811,6 +825,7 @@ Available keywords are
811.Cm PermitEmptyPasswords , 825.Cm PermitEmptyPasswords ,
812.Cm PermitOpen , 826.Cm PermitOpen ,
813.Cm PermitRootLogin , 827.Cm PermitRootLogin ,
828.Cm PermitTTY ,
814.Cm PermitTunnel , 829.Cm PermitTunnel ,
815.Cm PubkeyAuthentication , 830.Cm PubkeyAuthentication ,
816.Cm RekeyLimit , 831.Cm RekeyLimit ,
@@ -940,6 +955,12 @@ and
940.Dq ethernet . 955.Dq ethernet .
941The default is 956The default is
942.Dq no . 957.Dq no .
958.It Cm PermitTTY
959Specifies whether
960.Xr pty 4
961allocation is permitted.
962The default is
963.Dq yes .
943.It Cm PermitUserEnvironment 964.It Cm PermitUserEnvironment
944Specifies whether 965Specifies whether
945.Pa ~/.ssh/environment 966.Pa ~/.ssh/environment