summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ChangeLog13
-rw-r--r--scp.14
-rw-r--r--sftp.126
-rw-r--r--ssh-add.19
-rw-r--r--ssh-agent.17
-rw-r--r--ssh-keygen.14
-rw-r--r--ssh-keyscan.120
-rw-r--r--ssh-keysign.86
-rw-r--r--ssh.134
-rw-r--r--ssh_config.548
-rw-r--r--sshd_config.530
11 files changed, 122 insertions, 79 deletions
diff --git a/ChangeLog b/ChangeLog
index ac1ce7e07..82053128b 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,14 @@
120030401
2 - (djm) OpenBSD CVS Sync
3 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
4 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
5 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
6 - killed whitespace
7 - new sentence new line
8 - .Bk for arguments
9 ok markus@
10
11
120030326 1220030326
2 - (djm) OpenBSD CVS Sync 13 - (djm) OpenBSD CVS Sync
3 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51 14 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
@@ -1259,4 +1270,4 @@
1259 save auth method before monitor_reset_key_state(); bugzilla bug #284; 1270 save auth method before monitor_reset_key_state(); bugzilla bug #284;
1260 ok provos@ 1271 ok provos@
1261 1272
1262$Id: ChangeLog,v 1.2642 2003/03/26 05:01:11 djm Exp $ 1273$Id: ChangeLog,v 1.2643 2003/04/01 11:42:14 djm Exp $
diff --git a/scp.1 b/scp.1
index 89ebf7089..a3ec2e0c6 100644
--- a/scp.1
+++ b/scp.1
@@ -9,7 +9,7 @@
9.\" 9.\"
10.\" Created: Sun May 7 00:14:37 1995 ylo 10.\" Created: Sun May 7 00:14:37 1995 ylo
11.\" 11.\"
12.\" $OpenBSD: scp.1,v 1.26 2003/01/28 17:24:51 stevesk Exp $ 12.\" $OpenBSD: scp.1,v 1.27 2003/03/28 10:11:43 jmc Exp $
13.\" 13.\"
14.Dd September 25, 1999 14.Dd September 25, 1999
15.Dt SCP 1 15.Dt SCP 1
@@ -19,6 +19,7 @@
19.Nd secure copy (remote file copy program) 19.Nd secure copy (remote file copy program)
20.Sh SYNOPSIS 20.Sh SYNOPSIS
21.Nm scp 21.Nm scp
22.Bk -words
22.Op Fl pqrvBC1246 23.Op Fl pqrvBC1246
23.Op Fl F Ar ssh_config 24.Op Fl F Ar ssh_config
24.Op Fl S Ar program 25.Op Fl S Ar program
@@ -40,6 +41,7 @@
40.Ar host2 No : 41.Ar host2 No :
41.Oc Ar file2 42.Oc Ar file2
42.Sm on 43.Sm on
44.Ek
43.Sh DESCRIPTION 45.Sh DESCRIPTION
44.Nm 46.Nm
45copies files between hosts on a network. 47copies files between hosts on a network.
diff --git a/sftp.1 b/sftp.1
index ecd4d3174..02d2c274b 100644
--- a/sftp.1
+++ b/sftp.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: sftp.1,v 1.40 2003/01/10 08:19:07 fgsch Exp $ 1.\" $OpenBSD: sftp.1,v 1.41 2003/03/28 10:11:43 jmc Exp $
2.\" 2.\"
3.\" Copyright (c) 2001 Damien Miller. All rights reserved. 3.\" Copyright (c) 2001 Damien Miller. All rights reserved.
4.\" 4.\"
@@ -30,6 +30,7 @@
30.Nd Secure file transfer program 30.Nd Secure file transfer program
31.Sh SYNOPSIS 31.Sh SYNOPSIS
32.Nm sftp 32.Nm sftp
33.Bk -words
33.Op Fl vC1 34.Op Fl vC1
34.Op Fl b Ar batchfile 35.Op Fl b Ar batchfile
35.Op Fl o Ar ssh_option 36.Op Fl o Ar ssh_option
@@ -40,10 +41,15 @@
40.Op Fl R Ar num_requests 41.Op Fl R Ar num_requests
41.Op Fl S Ar program 42.Op Fl S Ar program
42.Ar host 43.Ar host
44.Ek
43.Nm sftp 45.Nm sftp
44.Op [\fIuser\fR@]\fIhost\fR[:\fIfile\fR [\fIfile\fR]] 46.Oo Oo Ar user Ns No @ Oc Ns
47.Ar host Ns Oo : Ns Ar file Oo
48.Ar file Oc Oc Oc
45.Nm sftp 49.Nm sftp
46.Op [\fIuser\fR@]\fIhost\fR[:\fIdir\fR[\fI/\fR]] 50.Oo Oo Ar user Ns No @ Oc Ns
51.Ar host Ns Oo : Ns Ar dir Ns
52.Oo Ar / Oc Oc Oc
47.Sh DESCRIPTION 53.Sh DESCRIPTION
48.Nm 54.Nm
49is an interactive file transfer program, similar to 55is an interactive file transfer program, similar to
@@ -77,13 +83,13 @@ non-interactive authentication.
77will abort if any of the following 83will abort if any of the following
78commands fail: 84commands fail:
79.Ic get , put , rename , ln , 85.Ic get , put , rename , ln ,
80.Ic rm , mkdir , chdir , ls , 86.Ic rm , mkdir , chdir , ls ,
81.Ic lchdir , chmod , chown , chgrp , lpwd 87.Ic lchdir , chmod , chown , chgrp , lpwd
82and 88and
83.Ic lmkdir . 89.Ic lmkdir .
84Termination on error can be suppressed on a command by command basis by 90Termination on error can be suppressed on a command by command basis by
85prefixing the command with a 91prefixing the command with a
86.Ic '-' 92.Ic '-'
87character (For example, 93character (For example,
88.Ic -rm /tmp/blah* 94.Ic -rm /tmp/blah*
89). 95).
@@ -95,19 +101,19 @@ in the format used in
95This is useful for specifying options 101This is useful for specifying options
96for which there is no separate 102for which there is no separate
97.Nm sftp 103.Nm sftp
98command-line flag. For example, to specify an alternate 104command-line flag. For example, to specify an alternate
99port use: 105port use:
100.Ic sftp -oPort=24 . 106.Ic sftp -oPort=24 .
101.It Fl s Ar subsystem | sftp_server 107.It Fl s Ar subsystem | sftp_server
102Specifies the SSH2 subsystem or the path for an sftp server 108Specifies the SSH2 subsystem or the path for an sftp server
103on the remote host. A path is useful for using sftp over 109on the remote host. A path is useful for using sftp over
104protocol version 1, or when the remote 110protocol version 1, or when the remote
105.Nm sshd 111.Nm sshd
106does not have an sftp subsystem configured. 112does not have an sftp subsystem configured.
107.It Fl v 113.It Fl v
108Raise logging level. This option is also passed to ssh. 114Raise logging level. This option is also passed to ssh.
109.It Fl B Ar buffer_size 115.It Fl B Ar buffer_size
110Specify the size of the buffer that 116Specify the size of the buffer that
111.Nm 117.Nm
112uses when transferring files. Larger buffers require fewer round trips at 118uses when transferring files. Larger buffers require fewer round trips at
113the cost of higher memory consumption. The default is 32768 bytes. 119the cost of higher memory consumption. The default is 32768 bytes.
diff --git a/ssh-add.1 b/ssh-add.1
index 25d7333e9..bcdb8e7f6 100644
--- a/ssh-add.1
+++ b/ssh-add.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-add.1,v 1.37 2003/02/10 11:51:47 markus Exp $ 1.\" $OpenBSD: ssh-add.1,v 1.38 2003/03/28 10:11:43 jmc Exp $
2.\" 2.\"
3.\" -*- nroff -*- 3.\" -*- nroff -*-
4.\" 4.\"
@@ -95,10 +95,11 @@ specified in
95.Xr sshd_config 5 . 95.Xr sshd_config 5 .
96.It Fl c 96.It Fl c
97Indicates that added identities should be subject to confirmation before 97Indicates that added identities should be subject to confirmation before
98being used for authentication. Confirmation is performed by the 98being used for authentication.
99Confirmation is performed by the
99.Ev SSH_ASKPASS 100.Ev SSH_ASKPASS
100program mentioned below. Successful confirmation is signaled by a zero 101program mentioned below.
101exit status from the 102Successful confirmation is signaled by a zero exit status from the
102.Ev SSH_ASKPASS 103.Ev SSH_ASKPASS
103program, rather than text entered into the requester. 104program, rather than text entered into the requester.
104.It Fl s Ar reader 105.It Fl s Ar reader
diff --git a/ssh-agent.1 b/ssh-agent.1
index 98f9dc80d..fde4608bb 100644
--- a/ssh-agent.1
+++ b/ssh-agent.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-agent.1,v 1.36 2003/01/21 18:14:36 marc Exp $ 1.\" $OpenBSD: ssh-agent.1,v 1.37 2003/03/28 10:11:43 jmc Exp $
2.\" 2.\"
3.\" Author: Tatu Ylonen <ylo@cs.hut.fi> 3.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -88,7 +88,7 @@ Kill the current agent (given by the
88.Ev SSH_AGENT_PID 88.Ev SSH_AGENT_PID
89environment variable). 89environment variable).
90.It Fl t Ar life 90.It Fl t Ar life
91Set a default value for the maximum lifetime of identities added to the agent. 91Set a default value for the maximum lifetime of identities added to the agent.
92The lifetime may be specified in seconds or in a time format specified in 92The lifetime may be specified in seconds or in a time format specified in
93.Xr sshd 8 . 93.Xr sshd 8 .
94A lifetime specified for an identity with 94A lifetime specified for an identity with
@@ -96,7 +96,8 @@ A lifetime specified for an identity with
96overrides this value. 96overrides this value.
97Without this option the default maximum lifetime is forever. 97Without this option the default maximum lifetime is forever.
98.It Fl d 98.It Fl d
99Debug mode. When this option is specified 99Debug mode.
100When this option is specified
100.Nm 101.Nm
101will not fork. 102will not fork.
102.El 103.El
diff --git a/ssh-keygen.1 b/ssh-keygen.1
index 78fdb496a..000e8ff2a 100644
--- a/ssh-keygen.1
+++ b/ssh-keygen.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-keygen.1,v 1.55 2002/11/26 02:35:30 stevesk Exp $ 1.\" $OpenBSD: ssh-keygen.1,v 1.56 2003/03/28 10:11:43 jmc Exp $
2.\" 2.\"
3.\" -*- nroff -*- 3.\" -*- nroff -*-
4.\" 4.\"
@@ -45,12 +45,14 @@
45.Nd authentication key generation, management and conversion 45.Nd authentication key generation, management and conversion
46.Sh SYNOPSIS 46.Sh SYNOPSIS
47.Nm ssh-keygen 47.Nm ssh-keygen
48.Bk -words
48.Op Fl q 49.Op Fl q
49.Op Fl b Ar bits 50.Op Fl b Ar bits
50.Fl t Ar type 51.Fl t Ar type
51.Op Fl N Ar new_passphrase 52.Op Fl N Ar new_passphrase
52.Op Fl C Ar comment 53.Op Fl C Ar comment
53.Op Fl f Ar output_keyfile 54.Op Fl f Ar output_keyfile
55.Ek
54.Nm ssh-keygen 56.Nm ssh-keygen
55.Fl p 57.Fl p
56.Op Fl P Ar old_passphrase 58.Op Fl P Ar old_passphrase
diff --git a/ssh-keyscan.1 b/ssh-keyscan.1
index 2f33ddf20..f6596c481 100644
--- a/ssh-keyscan.1
+++ b/ssh-keyscan.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-keyscan.1,v 1.14 2002/02/13 08:33:47 mpech Exp $ 1.\" $OpenBSD: ssh-keyscan.1,v 1.15 2003/03/28 10:11:43 jmc Exp $
2.\" 2.\"
3.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. 3.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>.
4.\" 4.\"
@@ -14,6 +14,7 @@
14.Nd gather ssh public keys 14.Nd gather ssh public keys
15.Sh SYNOPSIS 15.Sh SYNOPSIS
16.Nm ssh-keyscan 16.Nm ssh-keyscan
17.Bk -words
17.Op Fl v46 18.Op Fl v46
18.Op Fl p Ar port 19.Op Fl p Ar port
19.Op Fl T Ar timeout 20.Op Fl T Ar timeout
@@ -21,10 +22,12 @@
21.Op Fl f Ar file 22.Op Fl f Ar file
22.Op Ar host | addrlist namelist 23.Op Ar host | addrlist namelist
23.Op Ar ... 24.Op Ar ...
25.Ek
24.Sh DESCRIPTION 26.Sh DESCRIPTION
25.Nm 27.Nm
26is a utility for gathering the public ssh host keys of a number of 28is a utility for gathering the public ssh host keys of a number of
27hosts. It was designed to aid in building and verifying 29hosts.
30It was designed to aid in building and verifying
28.Pa ssh_known_hosts 31.Pa ssh_known_hosts
29files. 32files.
30.Nm 33.Nm
@@ -33,9 +36,11 @@ scripts.
33.Pp 36.Pp
34.Nm 37.Nm
35uses non-blocking socket I/O to contact as many hosts as possible in 38uses non-blocking socket I/O to contact as many hosts as possible in
36parallel, so it is very efficient. The keys from a domain of 1,000 39parallel, so it is very efficient.
40The keys from a domain of 1,000
37hosts can be collected in tens of seconds, even when some of those 41hosts can be collected in tens of seconds, even when some of those
38hosts are down or do not run ssh. For scanning, one does not need 42hosts are down or do not run ssh.
43For scanning, one does not need
39login access to the machines that are being scanned, nor does the 44login access to the machines that are being scanned, nor does the
40scanning process involve any encryption. 45scanning process involve any encryption.
41.Pp 46.Pp
@@ -44,12 +49,13 @@ The options are as follows:
44.It Fl p Ar port 49.It Fl p Ar port
45Port to connect to on the remote host. 50Port to connect to on the remote host.
46.It Fl T Ar timeout 51.It Fl T Ar timeout
47Set the timeout for connection attempts. If 52Set the timeout for connection attempts.
53If
48.Pa timeout 54.Pa timeout
49seconds have elapsed since a connection was initiated to a host or since the 55seconds have elapsed since a connection was initiated to a host or since the
50last time anything was read from that host, then the connection is 56last time anything was read from that host, then the connection is
51closed and the host in question considered unavailable. Default is 5 57closed and the host in question considered unavailable.
52seconds. 58Default is 5 seconds.
53.It Fl t Ar type 59.It Fl t Ar type
54Specifies the type of the key to fetch from the scanned hosts. 60Specifies the type of the key to fetch from the scanned hosts.
55The possible values are 61The possible values are
diff --git a/ssh-keysign.8 b/ssh-keysign.8
index 99d373406..2e3f8ff3e 100644
--- a/ssh-keysign.8
+++ b/ssh-keysign.8
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-keysign.8,v 1.5 2002/11/24 21:46:24 stevesk Exp $ 1.\" $OpenBSD: ssh-keysign.8,v 1.6 2003/03/28 10:11:43 jmc Exp $
2.\" 2.\"
3.\" Copyright (c) 2002 Markus Friedl. All rights reserved. 3.\" Copyright (c) 2002 Markus Friedl. All rights reserved.
4.\" 4.\"
@@ -62,8 +62,8 @@ Controls whether
62is enabled. 62is enabled.
63.It Pa /etc/ssh/ssh_host_dsa_key, /etc/ssh/ssh_host_rsa_key 63.It Pa /etc/ssh/ssh_host_dsa_key, /etc/ssh/ssh_host_rsa_key
64These files contain the private parts of the host keys used to 64These files contain the private parts of the host keys used to
65generate the digital signature. They 65generate the digital signature.
66should be owned by root, readable only by root, and not 66They should be owned by root, readable only by root, and not
67accessible to others. 67accessible to others.
68Since they are readable only by root, 68Since they are readable only by root,
69.Nm 69.Nm
diff --git a/ssh.1 b/ssh.1
index 27808b1f3..fd822bb3d 100644
--- a/ssh.1
+++ b/ssh.1
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: ssh.1,v 1.167 2002/09/27 15:46:21 stevesk Exp $ 37.\" $OpenBSD: ssh.1,v 1.168 2003/03/28 10:11:43 jmc Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSH 1 39.Dt SSH 1
40.Os 40.Os
@@ -48,6 +48,7 @@
48.Op Ar command 48.Op Ar command
49.Pp 49.Pp
50.Nm ssh 50.Nm ssh
51.Bk -words
51.Op Fl afgknqstvxACNTX1246 52.Op Fl afgknqstvxACNTX1246
52.Op Fl b Ar bind_address 53.Op Fl b Ar bind_address
53.Op Fl c Ar cipher_spec 54.Op Fl c Ar cipher_spec
@@ -66,6 +67,8 @@
66.Sm on 67.Sm on
67.Xc 68.Xc
68.Oc 69.Oc
70.Ek
71.Bk -words
69.Oo Fl R Xo 72.Oo Fl R Xo
70.Sm off 73.Sm off
71.Ar port : 74.Ar port :
@@ -77,6 +80,7 @@
77.Op Fl D Ar port 80.Op Fl D Ar port
78.Ar hostname | user@hostname 81.Ar hostname | user@hostname
79.Op Ar command 82.Op Ar command
83.Ek
80.Sh DESCRIPTION 84.Sh DESCRIPTION
81.Nm 85.Nm
82(SSH client) is a program for logging into a remote machine and for 86(SSH client) is a program for logging into a remote machine and for
@@ -361,7 +365,7 @@ variable is set to
361.Fl A 365.Fl A
362and 366and
363.Fl a 367.Fl a
364options described later) and 368options described later) and
365the user is using an authentication agent, the connection to the agent 369the user is using an authentication agent, the connection to the agent
366is automatically forwarded to the remote side. 370is automatically forwarded to the remote side.
367.Pp 371.Pp
@@ -403,10 +407,11 @@ Disables forwarding of the authentication agent connection.
403Enables forwarding of the authentication agent connection. 407Enables forwarding of the authentication agent connection.
404This can also be specified on a per-host basis in a configuration file. 408This can also be specified on a per-host basis in a configuration file.
405.Pp 409.Pp
406Agent forwarding should be enabled with caution. Users with the 410Agent forwarding should be enabled with caution.
407ability to bypass file permissions on the remote host (for the agent's 411Users with the ability to bypass file permissions on the remote host
408Unix-domain socket) can access the local agent through the forwarded 412(for the agent's Unix-domain socket)
409connection. An attacker cannot obtain key material from the agent, 413can access the local agent through the forwarded connection.
414An attacker cannot obtain key material from the agent,
410however they can perform operations on the keys that enable them to 415however they can perform operations on the keys that enable them to
411authenticate using the identities loaded into the agent. 416authenticate using the identities loaded into the agent.
412.It Fl b Ar bind_address 417.It Fl b Ar bind_address
@@ -428,8 +433,8 @@ is only supported in the
428client for interoperability with legacy protocol 1 implementations 433client for interoperability with legacy protocol 1 implementations
429that do not support the 434that do not support the
430.Ar 3des 435.Ar 3des
431cipher. Its use is strongly discouraged due to cryptographic 436cipher.
432weaknesses. 437Its use is strongly discouraged due to cryptographic weaknesses.
433.It Fl c Ar cipher_spec 438.It Fl c Ar cipher_spec
434Additionally, for protocol version 2 a comma-separated list of ciphers can 439Additionally, for protocol version 2 a comma-separated list of ciphers can
435be specified in order of preference. 440be specified in order of preference.
@@ -566,11 +571,11 @@ Disables X11 forwarding.
566Enables X11 forwarding. 571Enables X11 forwarding.
567This can also be specified on a per-host basis in a configuration file. 572This can also be specified on a per-host basis in a configuration file.
568.Pp 573.Pp
569X11 forwarding should be enabled with caution. Users with the ability 574X11 forwarding should be enabled with caution.
570to bypass file permissions on the remote host (for the user's X 575Users with the ability to bypass file permissions on the remote host
571authorization database) can access the local X11 display through the 576(for the user's X authorization database)
572forwarded connection. An attacker may then be able to perform 577can access the local X11 display through the forwarded connection.
573activities such as keystroke monitoring. 578An attacker may then be able to perform activities such as keystroke monitoring.
574.It Fl C 579.It Fl C
575Requests compression of all data (including stdin, stdout, stderr, and 580Requests compression of all data (including stdin, stdout, stderr, and
576data for forwarded X11 and TCP/IP connections). 581data for forwarded X11 and TCP/IP connections).
@@ -637,7 +642,8 @@ This works by allocating a socket to listen to
637on the local side, and whenever a connection is made to this port, the 642on the local side, and whenever a connection is made to this port, the
638connection is forwarded over the secure channel, and the application 643connection is forwarded over the secure channel, and the application
639protocol is then used to determine where to connect to from the 644protocol is then used to determine where to connect to from the
640remote machine. Currently the SOCKS4 protocol is supported, and 645remote machine.
646Currently the SOCKS4 protocol is supported, and
641.Nm 647.Nm
642will act as a SOCKS4 server. 648will act as a SOCKS4 server.
643Only root can forward privileged ports. 649Only root can forward privileged ports.
diff --git a/ssh_config.5 b/ssh_config.5
index 710c068c5..44208b431 100644
--- a/ssh_config.5
+++ b/ssh_config.5
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: ssh_config.5,v 1.6 2003/02/06 09:27:29 markus Exp $ 37.\" $OpenBSD: ssh_config.5,v 1.7 2003/03/28 10:11:43 jmc Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSH_CONFIG 5 39.Dt SSH_CONFIG 5
40.Os 40.Os
@@ -176,8 +176,8 @@ is only supported in the
176client for interoperability with legacy protocol 1 implementations 176client for interoperability with legacy protocol 1 implementations
177that do not support the 177that do not support the
178.Ar 3des 178.Ar 3des
179cipher. Its use is strongly discouraged due to cryptographic 179cipher.
180weaknesses. 180Its use is strongly discouraged due to cryptographic weaknesses.
181The default is 181The default is
182.Dq 3des . 182.Dq 3des .
183.It Cm Ciphers 183.It Cm Ciphers
@@ -193,7 +193,8 @@ The default is
193.It Cm ClearAllForwardings 193.It Cm ClearAllForwardings
194Specifies that all local, remote and dynamic port forwardings 194Specifies that all local, remote and dynamic port forwardings
195specified in the configuration files or on the command line be 195specified in the configuration files or on the command line be
196cleared. This option is primarily useful when used from the 196cleared.
197This option is primarily useful when used from the
197.Nm ssh 198.Nm ssh
198command line to clear port forwardings set in 199command line to clear port forwardings set in
199configuration files, and is automatically set by 200configuration files, and is automatically set by
@@ -230,13 +231,14 @@ The default is 1.
230Specifies that a TCP/IP port on the local machine be forwarded 231Specifies that a TCP/IP port on the local machine be forwarded
231over the secure channel, and the application 232over the secure channel, and the application
232protocol is then used to determine where to connect to from the 233protocol is then used to determine where to connect to from the
233remote machine. The argument must be a port number. 234remote machine.
235The argument must be a port number.
234Currently the SOCKS4 protocol is supported, and 236Currently the SOCKS4 protocol is supported, and
235.Nm ssh 237.Nm ssh
236will act as a SOCKS4 server. 238will act as a SOCKS4 server.
237Multiple forwardings may be specified, and 239Multiple forwardings may be specified, and
238additional forwardings can be given on the command line. Only 240additional forwardings can be given on the command line.
239the superuser can forward privileged ports. 241Only the superuser can forward privileged ports.
240.It Cm EscapeChar 242.It Cm EscapeChar
241Sets the escape character (default: 243Sets the escape character (default:
242.Ql ~ ) . 244.Ql ~ ) .
@@ -259,10 +261,11 @@ or
259The default is 261The default is
260.Dq no . 262.Dq no .
261.Pp 263.Pp
262Agent forwarding should be enabled with caution. Users with the 264Agent forwarding should be enabled with caution.
263ability to bypass file permissions on the remote host (for the agent's 265Users with the ability to bypass file permissions on the remote host
264Unix-domain socket) can access the local agent through the forwarded 266(for the agent's Unix-domain socket)
265connection. An attacker cannot obtain key material from the agent, 267can access the local agent through the forwarded connection.
268An attacker cannot obtain key material from the agent,
266however they can perform operations on the keys that enable them to 269however they can perform operations on the keys that enable them to
267authenticate using the identities loaded into the agent. 270authenticate using the identities loaded into the agent.
268.It Cm ForwardX11 271.It Cm ForwardX11
@@ -277,18 +280,18 @@ or
277The default is 280The default is
278.Dq no . 281.Dq no .
279.Pp 282.Pp
280X11 forwarding should be enabled with caution. Users with the ability 283X11 forwarding should be enabled with caution.
281to bypass file permissions on the remote host (for the user's X 284Users with the ability to bypass file permissions on the remote host
282authorization database) can access the local X11 display through the 285(for the user's X authorization database)
283forwarded connection. An attacker may then be able to perform 286can access the local X11 display through the forwarded connection.
284activities such as keystroke monitoring. 287An attacker may then be able to perform activities such as keystroke monitoring.
285.It Cm GatewayPorts 288.It Cm GatewayPorts
286Specifies whether remote hosts are allowed to connect to local 289Specifies whether remote hosts are allowed to connect to local
287forwarded ports. 290forwarded ports.
288By default, 291By default,
289.Nm ssh 292.Nm ssh
290binds local port forwardings to the loopback address. This 293binds local port forwardings to the loopback address.
291prevents other remote hosts from connecting to forwarded ports. 294This prevents other remote hosts from connecting to forwarded ports.
292.Cm GatewayPorts 295.Cm GatewayPorts
293can be used to specify that 296can be used to specify that
294.Nm ssh 297.Nm ssh
@@ -395,8 +398,9 @@ Gives the verbosity level that is used when logging messages from
395.Nm ssh . 398.Nm ssh .
396The possible values are: 399The possible values are:
397QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3. 400QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3.
398The default is INFO. DEBUG and DEBUG1 are equivalent. DEBUG2 401The default is INFO.
399and DEBUG3 each specify higher levels of verbose output. 402DEBUG and DEBUG1 are equivalent.
403DEBUG2 and DEBUG3 each specify higher levels of verbose output.
400.It Cm MACs 404.It Cm MACs
401Specifies the MAC (message authentication code) algorithms 405Specifies the MAC (message authentication code) algorithms
402in order of preference. 406in order of preference.
@@ -474,8 +478,8 @@ somewhere.
474Host key management will be done using the 478Host key management will be done using the
475HostName of the host being connected (defaulting to the name typed by 479HostName of the host being connected (defaulting to the name typed by
476the user). 480the user).
477Setting the command to 481Setting the command to
478.Dq none 482.Dq none
479disables this option entirely. 483disables this option entirely.
480Note that 484Note that
481.Cm CheckHostIP 485.Cm CheckHostIP
diff --git a/sshd_config.5 b/sshd_config.5
index 23ac0e96d..6f38a260a 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: sshd_config.5,v 1.14 2003/01/23 08:58:47 jmc Exp $ 37.\" $OpenBSD: sshd_config.5,v 1.15 2003/03/28 10:11:43 jmc Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSHD_CONFIG 5 39.Dt SSHD_CONFIG 5
40.Os 40.Os
@@ -211,8 +211,8 @@ Specifies whether remote hosts are allowed to connect to ports
211forwarded for the client. 211forwarded for the client.
212By default, 212By default,
213.Nm sshd 213.Nm sshd
214binds remote port forwardings to the loopback address. This 214binds remote port forwardings to the loopback address.
215prevents other remote hosts from connecting to forwarded ports. 215This prevents other remote hosts from connecting to forwarded ports.
216.Cm GatewayPorts 216.Cm GatewayPorts
217can be used to specify that 217can be used to specify that
218.Nm sshd 218.Nm sshd
@@ -370,7 +370,8 @@ is not specified,
370will listen on the address and all prior 370will listen on the address and all prior
371.Cm Port 371.Cm Port
372options specified. The default is to listen on all local 372options specified. The default is to listen on all local
373addresses. Multiple 373addresses.
374Multiple
374.Cm ListenAddress 375.Cm ListenAddress
375options are permitted. Additionally, any 376options are permitted. Additionally, any
376.Cm Port 377.Cm Port
@@ -385,10 +386,10 @@ Gives the verbosity level that is used when logging messages from
385.Nm sshd . 386.Nm sshd .
386The possible values are: 387The possible values are:
387QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3. 388QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3.
388The default is INFO. DEBUG and DEBUG1 are equivalent. DEBUG2 389The default is INFO.
389and DEBUG3 each specify higher levels of debugging output. 390DEBUG and DEBUG1 are equivalent.
390Logging with a DEBUG level violates the privacy of users 391DEBUG2 and DEBUG3 each specify higher levels of debugging output.
391and is not recommended. 392Logging with a DEBUG level violates the privacy of users and is not recommended.
392.It Cm MACs 393.It Cm MACs
393Specifies the available MAC (message authentication code) algorithms. 394Specifies the available MAC (message authentication code) algorithms.
394The MAC algorithm is used in protocol version 2 395The MAC algorithm is used in protocol version 2
@@ -599,16 +600,18 @@ will be disabled because
599.Xr login 1 600.Xr login 1
600does not know how to handle 601does not know how to handle
601.Xr xauth 1 602.Xr xauth 1
602cookies. If 603cookies.
604If
603.Cm UsePrivilegeSeparation 605.Cm UsePrivilegeSeparation
604is specified, it will be disabled after authentication. 606is specified, it will be disabled after authentication.
605.It Cm UsePrivilegeSeparation 607.It Cm UsePrivilegeSeparation
606Specifies whether 608Specifies whether
607.Nm sshd 609.Nm sshd
608separates privileges by creating an unprivileged child process 610separates privileges by creating an unprivileged child process
609to deal with incoming network traffic. After successful authentication, 611to deal with incoming network traffic.
610another process will be created that has the privilege of the authenticated 612After successful authentication, another process will be created that has
611user. The goal of privilege separation is to prevent privilege 613the privilege of the authenticated user.
614The goal of privilege separation is to prevent privilege
612escalation by containing any corruption within the unprivileged processes. 615escalation by containing any corruption within the unprivileged processes.
613The default is 616The default is
614.Dq yes . 617.Dq yes .
@@ -666,7 +669,8 @@ is enabled.
666Specifies whether 669Specifies whether
667.Nm sshd 670.Nm sshd
668should bind the X11 forwarding server to the loopback address or to 671should bind the X11 forwarding server to the loopback address or to
669the wildcard address. By default, 672the wildcard address.
673By default,
670.Nm sshd 674.Nm sshd
671binds the forwarding server to the loopback address and sets the 675binds the forwarding server to the loopback address and sets the
672hostname part of the 676hostname part of the