diff options
-rw-r--r-- | ChangeLog | 6 | ||||
-rw-r--r-- | sshd_config.5 | 14 |
2 files changed, 14 insertions, 6 deletions
@@ -1,3 +1,9 @@ | |||
1 | 20121104 | ||
2 | - (djm) OpenBSD CVS Sync | ||
3 | - jmc@cvs.openbsd.org 2012/10/31 08:04:50 | ||
4 | [sshd_config.5] | ||
5 | tweak previous; | ||
6 | |||
1 | 20121030 | 7 | 20121030 |
2 | - (djm) OpenBSD CVS Sync | 8 | - (djm) OpenBSD CVS Sync |
3 | - markus@cvs.openbsd.org 2012/10/05 12:34:39 | 9 | - markus@cvs.openbsd.org 2012/10/05 12:34:39 |
diff --git a/sshd_config.5 b/sshd_config.5 index de8f0f825..3cc901a82 100644 --- a/sshd_config.5 +++ b/sshd_config.5 | |||
@@ -33,8 +33,8 @@ | |||
33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
35 | .\" | 35 | .\" |
36 | .\" $OpenBSD: sshd_config.5,v 1.146 2012/10/30 21:29:55 djm Exp $ | 36 | .\" $OpenBSD: sshd_config.5,v 1.147 2012/10/31 08:04:50 jmc Exp $ |
37 | .Dd $Mdocdate: October 30 2012 $ | 37 | .Dd $Mdocdate: October 31 2012 $ |
38 | .Dt SSHD_CONFIG 5 | 38 | .Dt SSHD_CONFIG 5 |
39 | .Os | 39 | .Os |
40 | .Sh NAME | 40 | .Sh NAME |
@@ -152,11 +152,13 @@ in | |||
152 | .Xr ssh_config 5 | 152 | .Xr ssh_config 5 |
153 | for more information on patterns. | 153 | for more information on patterns. |
154 | .It Cm AuthorizedKeysCommand | 154 | .It Cm AuthorizedKeysCommand |
155 | Specifies a program to be used for lookup of the user's public keys. | 155 | Specifies a program to be used to look up the user's public keys. |
156 | The program will be invoked with a single argument of the username | 156 | The program will be invoked with a single argument of the username |
157 | being authenticated, and should produce on standard output zero or | 157 | being authenticated, and should produce on standard output zero or |
158 | more lines of authorized_keys output (see AUTHORIZED_KEYS in | 158 | more lines of authorized_keys output (see |
159 | .Xr sshd 8 ) | 159 | .Sx AUTHORIZED_KEYS |
160 | in | ||
161 | .Xr sshd 8 ) . | ||
160 | If a key supplied by AuthorizedKeysCommand does not successfully authenticate | 162 | If a key supplied by AuthorizedKeysCommand does not successfully authenticate |
161 | and authorize the user then public key authentication continues using the usual | 163 | and authorize the user then public key authentication continues using the usual |
162 | .Cm AuthorizedKeysFile | 164 | .Cm AuthorizedKeysFile |
@@ -727,9 +729,9 @@ Available keywords are | |||
727 | .Cm AllowGroups , | 729 | .Cm AllowGroups , |
728 | .Cm AllowTcpForwarding , | 730 | .Cm AllowTcpForwarding , |
729 | .Cm AllowUsers , | 731 | .Cm AllowUsers , |
730 | .Cm AuthorizedKeysFile , | ||
731 | .Cm AuthorizedKeysCommand , | 732 | .Cm AuthorizedKeysCommand , |
732 | .Cm AuthorizedKeysCommandUser , | 733 | .Cm AuthorizedKeysCommandUser , |
734 | .Cm AuthorizedKeysFile , | ||
733 | .Cm AuthorizedPrincipalsFile , | 735 | .Cm AuthorizedPrincipalsFile , |
734 | .Cm Banner , | 736 | .Cm Banner , |
735 | .Cm ChrootDirectory , | 737 | .Cm ChrootDirectory , |