diff options
-rw-r--r-- | ChangeLog | 7 | ||||
-rw-r--r-- | ssh.1 | 69 |
2 files changed, 68 insertions, 8 deletions
@@ -9,6 +9,11 @@ | |||
9 | final round of whacking FILES for duplicate info, and some consistency | 9 | final round of whacking FILES for duplicate info, and some consistency |
10 | fixes; | 10 | fixes; |
11 | ok djm | 11 | ok djm |
12 | - jmc@cvs.openbsd.org 2006/01/12 14:44:12 | ||
13 | [ssh.1] | ||
14 | split sections on tcp and x11 forwarding into two sections. | ||
15 | add an example in the tcp section, based on sth i wrote for ssh faq; | ||
16 | help + ok: djm markus dtucker | ||
12 | 17 | ||
13 | 20060109 | 18 | 20060109 |
14 | - (dtucker) [contrib/cygwin/ssh-host-config] Make sshd service depend on | 19 | - (dtucker) [contrib/cygwin/ssh-host-config] Make sshd service depend on |
@@ -3686,4 +3691,4 @@ | |||
3686 | - (djm) Trim deprecated options from INSTALL. Mention UsePAM | 3691 | - (djm) Trim deprecated options from INSTALL. Mention UsePAM |
3687 | - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu | 3692 | - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu |
3688 | 3693 | ||
3689 | $Id: ChangeLog,v 1.4085 2006/01/13 23:08:57 djm Exp $ | 3694 | $Id: ChangeLog,v 1.4086 2006/01/13 23:09:13 djm Exp $ |
@@ -34,7 +34,7 @@ | |||
34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
36 | .\" | 36 | .\" |
37 | .\" $OpenBSD: ssh.1,v 1.245 2006/01/06 13:29:10 jmc Exp $ | 37 | .\" $OpenBSD: ssh.1,v 1.246 2006/01/12 14:44:12 jmc Exp $ |
38 | .Dd September 25, 1999 | 38 | .Dd September 25, 1999 |
39 | .Dt SSH 1 | 39 | .Dt SSH 1 |
40 | .Os | 40 | .Os |
@@ -893,7 +893,67 @@ option. | |||
893 | Request rekeying of the connection | 893 | Request rekeying of the connection |
894 | (only useful for SSH protocol version 2 and if the peer supports it). | 894 | (only useful for SSH protocol version 2 and if the peer supports it). |
895 | .El | 895 | .El |
896 | .Sh X11 AND TCP FORWARDING | 896 | .Sh TCP FORWARDING |
897 | Forwarding of arbitrary TCP connections over the secure channel can | ||
898 | be specified either on the command line or in a configuration file. | ||
899 | One possible application of TCP forwarding is a secure connection to a | ||
900 | mail server; another is going through firewalls. | ||
901 | .Pp | ||
902 | In the example below, we look at encrypting communication between | ||
903 | an IRC client and server, even though the IRC server does not directly | ||
904 | support encrypted communications. | ||
905 | This works as follows: | ||
906 | the user connects to the remote host using | ||
907 | .Nm , | ||
908 | specifying a port to be used to forward connections | ||
909 | to the remote server. | ||
910 | After that it is possible to start the service which is to be encrypted | ||
911 | on the client machine, | ||
912 | connecting to the same local port, | ||
913 | and | ||
914 | .Nm | ||
915 | will encrypt and forward the connection. | ||
916 | .Pp | ||
917 | The following example tunnels an IRC session from client machine | ||
918 | .Dq 127.0.0.1 | ||
919 | (localhost) | ||
920 | to remote server | ||
921 | .Dq server.example.com : | ||
922 | .Bd -literal -offset 4n | ||
923 | $ ssh -f -L 1234:localhost:6667 server.example.com sleep 10 | ||
924 | $ irc -c '#users' -p 1234 pinky 127.0.0.1 | ||
925 | .Ed | ||
926 | .Pp | ||
927 | This tunnels a connection to IRC server | ||
928 | .Dq server.example.com , | ||
929 | joining channel | ||
930 | .Dq #users , | ||
931 | nickname | ||
932 | .Dq pinky , | ||
933 | using port 1234. | ||
934 | It doesn't matter which port is used, | ||
935 | as long as it's greater than 1023 | ||
936 | (remember, only root can open sockets on privileged ports) | ||
937 | and doesn't conflict with any ports already in use. | ||
938 | The connection is forwarded to port 6667 on the remote server, | ||
939 | since that's the standard port for IRC services. | ||
940 | .Pp | ||
941 | The | ||
942 | .Fl f | ||
943 | option backgrounds | ||
944 | .Nm | ||
945 | and the remote command | ||
946 | .Dq sleep 10 | ||
947 | is specified to allow an amount of time | ||
948 | (10 seconds, in the example) | ||
949 | to start the service which is to be tunnelled. | ||
950 | If no connections are made within the time specified, | ||
951 | .Nm | ||
952 | will exit. | ||
953 | Once opened, | ||
954 | a SSH connection will remain active | ||
955 | until all actively forwarded connections have closed. | ||
956 | .Sh X11 FORWARDING | ||
897 | If the | 957 | If the |
898 | .Cm ForwardX11 | 958 | .Cm ForwardX11 |
899 | variable is set to | 959 | variable is set to |
@@ -948,11 +1008,6 @@ and | |||
948 | options above) and | 1008 | options above) and |
949 | the user is using an authentication agent, the connection to the agent | 1009 | the user is using an authentication agent, the connection to the agent |
950 | is automatically forwarded to the remote side. | 1010 | is automatically forwarded to the remote side. |
951 | .Pp | ||
952 | Forwarding of arbitrary TCP/IP connections over the secure channel can | ||
953 | be specified either on the command line or in a configuration file. | ||
954 | One possible application of TCP/IP forwarding is a secure connection to an | ||
955 | electronic purse; another is going through firewalls. | ||
956 | .Sh ENVIRONMENT | 1011 | .Sh ENVIRONMENT |
957 | .Nm | 1012 | .Nm |
958 | will normally set the following environment variables: | 1013 | will normally set the following environment variables: |