summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ChangeLog6
-rw-r--r--sshd_config.514
2 files changed, 14 insertions, 6 deletions
diff --git a/ChangeLog b/ChangeLog
index 27ec898b8..f1d0580fc 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,9 @@
120121104
2 - (djm) OpenBSD CVS Sync
3 - jmc@cvs.openbsd.org 2012/10/31 08:04:50
4 [sshd_config.5]
5 tweak previous;
6
120121030 720121030
2 - (djm) OpenBSD CVS Sync 8 - (djm) OpenBSD CVS Sync
3 - markus@cvs.openbsd.org 2012/10/05 12:34:39 9 - markus@cvs.openbsd.org 2012/10/05 12:34:39
diff --git a/sshd_config.5 b/sshd_config.5
index de8f0f825..3cc901a82 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: sshd_config.5,v 1.146 2012/10/30 21:29:55 djm Exp $ 36.\" $OpenBSD: sshd_config.5,v 1.147 2012/10/31 08:04:50 jmc Exp $
37.Dd $Mdocdate: October 30 2012 $ 37.Dd $Mdocdate: October 31 2012 $
38.Dt SSHD_CONFIG 5 38.Dt SSHD_CONFIG 5
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -152,11 +152,13 @@ in
152.Xr ssh_config 5 152.Xr ssh_config 5
153for more information on patterns. 153for more information on patterns.
154.It Cm AuthorizedKeysCommand 154.It Cm AuthorizedKeysCommand
155Specifies a program to be used for lookup of the user's public keys. 155Specifies a program to be used to look up the user's public keys.
156The program will be invoked with a single argument of the username 156The program will be invoked with a single argument of the username
157being authenticated, and should produce on standard output zero or 157being authenticated, and should produce on standard output zero or
158more lines of authorized_keys output (see AUTHORIZED_KEYS in 158more lines of authorized_keys output (see
159.Xr sshd 8 ) 159.Sx AUTHORIZED_KEYS
160in
161.Xr sshd 8 ) .
160If a key supplied by AuthorizedKeysCommand does not successfully authenticate 162If a key supplied by AuthorizedKeysCommand does not successfully authenticate
161and authorize the user then public key authentication continues using the usual 163and authorize the user then public key authentication continues using the usual
162.Cm AuthorizedKeysFile 164.Cm AuthorizedKeysFile
@@ -727,9 +729,9 @@ Available keywords are
727.Cm AllowGroups , 729.Cm AllowGroups ,
728.Cm AllowTcpForwarding , 730.Cm AllowTcpForwarding ,
729.Cm AllowUsers , 731.Cm AllowUsers ,
730.Cm AuthorizedKeysFile ,
731.Cm AuthorizedKeysCommand , 732.Cm AuthorizedKeysCommand ,
732.Cm AuthorizedKeysCommandUser , 733.Cm AuthorizedKeysCommandUser ,
734.Cm AuthorizedKeysFile ,
733.Cm AuthorizedPrincipalsFile , 735.Cm AuthorizedPrincipalsFile ,
734.Cm Banner , 736.Cm Banner ,
735.Cm ChrootDirectory , 737.Cm ChrootDirectory ,