diff options
-rw-r--r-- | ChangeLog | 5 | ||||
-rw-r--r-- | ssh_config.5 | 152 |
2 files changed, 78 insertions, 79 deletions
@@ -169,6 +169,9 @@ | |||
169 | - jmc@cvs.openbsd.org 2006/02/24 20:31:31 | 169 | - jmc@cvs.openbsd.org 2006/02/24 20:31:31 |
170 | [ssh.1 ssh_config.5 sshd.8 sshd_config.5] | 170 | [ssh.1 ssh_config.5 sshd.8 sshd_config.5] |
171 | more consistency fixes; | 171 | more consistency fixes; |
172 | - jmc@cvs.openbsd.org 2006/02/24 23:20:07 | ||
173 | [ssh_config.5] | ||
174 | some grammar/wording fixes; | ||
172 | 175 | ||
173 | 20060313 | 176 | 20060313 |
174 | - (dtucker) [configure.ac] Bug #1171: Don't use printf("%lld", longlong) | 177 | - (dtucker) [configure.ac] Bug #1171: Don't use printf("%lld", longlong) |
@@ -4070,4 +4073,4 @@ | |||
4070 | - (djm) Trim deprecated options from INSTALL. Mention UsePAM | 4073 | - (djm) Trim deprecated options from INSTALL. Mention UsePAM |
4071 | - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu | 4074 | - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu |
4072 | 4075 | ||
4073 | $Id: ChangeLog,v 1.4187 2006/03/15 00:56:03 djm Exp $ | 4076 | $Id: ChangeLog,v 1.4188 2006/03/15 00:56:18 djm Exp $ |
diff --git a/ssh_config.5 b/ssh_config.5 index 66c9ed3f5..40fef73cf 100644 --- a/ssh_config.5 +++ b/ssh_config.5 | |||
@@ -34,7 +34,7 @@ | |||
34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
36 | .\" | 36 | .\" |
37 | .\" $OpenBSD: ssh_config.5,v 1.83 2006/02/24 20:31:31 jmc Exp $ | 37 | .\" $OpenBSD: ssh_config.5,v 1.84 2006/02/24 23:20:07 jmc Exp $ |
38 | .Dd September 25, 1999 | 38 | .Dd September 25, 1999 |
39 | .Dt SSH_CONFIG 5 | 39 | .Dt SSH_CONFIG 5 |
40 | .Os | 40 | .Os |
@@ -47,7 +47,7 @@ | |||
47 | .It Pa /etc/ssh/ssh_config | 47 | .It Pa /etc/ssh/ssh_config |
48 | .El | 48 | .El |
49 | .Sh DESCRIPTION | 49 | .Sh DESCRIPTION |
50 | .Nm ssh | 50 | .Xr ssh 1 |
51 | obtains configuration data from the following sources in | 51 | obtains configuration data from the following sources in |
52 | the following order: | 52 | the following order: |
53 | .Pp | 53 | .Pp |
@@ -154,7 +154,7 @@ Specifies which address family to use when connecting. | |||
154 | Valid arguments are | 154 | Valid arguments are |
155 | .Dq any , | 155 | .Dq any , |
156 | .Dq inet | 156 | .Dq inet |
157 | (use IPv4 only) or | 157 | (use IPv4 only), or |
158 | .Dq inet6 | 158 | .Dq inet6 |
159 | (use IPv6 only). | 159 | (use IPv6 only). |
160 | .It Cm BatchMode | 160 | .It Cm BatchMode |
@@ -188,7 +188,8 @@ The default is | |||
188 | .It Cm CheckHostIP | 188 | .It Cm CheckHostIP |
189 | If this flag is set to | 189 | If this flag is set to |
190 | .Dq yes , | 190 | .Dq yes , |
191 | ssh will additionally check the host IP address in the | 191 | .Xr ssh 1 |
192 | will additionally check the host IP address in the | ||
192 | .Pa known_hosts | 193 | .Pa known_hosts |
193 | file. | 194 | file. |
194 | This allows ssh to detect if a host key changed due to DNS spoofing. | 195 | This allows ssh to detect if a host key changed due to DNS spoofing. |
@@ -208,7 +209,7 @@ and | |||
208 | are supported. | 209 | are supported. |
209 | .Ar des | 210 | .Ar des |
210 | is only supported in the | 211 | is only supported in the |
211 | .Nm ssh | 212 | .Xr ssh 1 |
212 | client for interoperability with legacy protocol 1 implementations | 213 | client for interoperability with legacy protocol 1 implementations |
213 | that do not support the | 214 | that do not support the |
214 | .Ar 3des | 215 | .Ar 3des |
@@ -234,18 +235,18 @@ The supported ciphers are | |||
234 | .Dq blowfish-cbc , | 235 | .Dq blowfish-cbc , |
235 | and | 236 | and |
236 | .Dq cast128-cbc . | 237 | .Dq cast128-cbc . |
237 | The default is | 238 | The default is: |
238 | .Bd -literal | 239 | .Bd -literal -offset 3n |
239 | ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128, | 240 | aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128, |
240 | arcfour256,arcfour,aes192-cbc,aes256-cbc,aes128-ctr, | 241 | arcfour256,arcfour,aes192-cbc,aes256-cbc,aes128-ctr, |
241 | aes192-ctr,aes256-ctr'' | 242 | aes192-ctr,aes256-ctr |
242 | .Ed | 243 | .Ed |
243 | .It Cm ClearAllForwardings | 244 | .It Cm ClearAllForwardings |
244 | Specifies that all local, remote and dynamic port forwardings | 245 | Specifies that all local, remote, and dynamic port forwardings |
245 | specified in the configuration files or on the command line be | 246 | specified in the configuration files or on the command line be |
246 | cleared. | 247 | cleared. |
247 | This option is primarily useful when used from the | 248 | This option is primarily useful when used from the |
248 | .Nm ssh | 249 | .Xr ssh 1 |
249 | command line to clear port forwardings set in | 250 | command line to clear port forwardings set in |
250 | configuration files, and is automatically set by | 251 | configuration files, and is automatically set by |
251 | .Xr scp 1 | 252 | .Xr scp 1 |
@@ -278,15 +279,15 @@ The argument must be an integer. | |||
278 | This may be useful in scripts if the connection sometimes fails. | 279 | This may be useful in scripts if the connection sometimes fails. |
279 | The default is 1. | 280 | The default is 1. |
280 | .It Cm ConnectTimeout | 281 | .It Cm ConnectTimeout |
281 | Specifies the timeout (in seconds) used when connecting to the ssh | 282 | Specifies the timeout (in seconds) used when connecting to the |
282 | server, instead of using the default system TCP timeout. | 283 | SSH server, instead of using the default system TCP timeout. |
283 | This value is used only when the target is down or really unreachable, | 284 | This value is used only when the target is down or really unreachable, |
284 | not when it refuses the connection. | 285 | not when it refuses the connection. |
285 | .It Cm ControlMaster | 286 | .It Cm ControlMaster |
286 | Enables the sharing of multiple sessions over a single network connection. | 287 | Enables the sharing of multiple sessions over a single network connection. |
287 | When set to | 288 | When set to |
288 | .Dq yes | 289 | .Dq yes , |
289 | .Nm ssh | 290 | .Xr ssh 1 |
290 | will listen for connections on a control socket specified using the | 291 | will listen for connections on a control socket specified using the |
291 | .Cm ControlPath | 292 | .Cm ControlPath |
292 | argument. | 293 | argument. |
@@ -303,8 +304,7 @@ if the control socket does not exist, or is not listening. | |||
303 | .Pp | 304 | .Pp |
304 | Setting this to | 305 | Setting this to |
305 | .Dq ask | 306 | .Dq ask |
306 | will cause | 307 | will cause ssh |
307 | .Nm ssh | ||
308 | to listen for control connections, but require confirmation using the | 308 | to listen for control connections, but require confirmation using the |
309 | .Ev SSH_ASKPASS | 309 | .Ev SSH_ASKPASS |
310 | program before they are accepted (see | 310 | program before they are accepted (see |
@@ -312,9 +312,8 @@ program before they are accepted (see | |||
312 | for details). | 312 | for details). |
313 | If the | 313 | If the |
314 | .Cm ControlPath | 314 | .Cm ControlPath |
315 | can not be opened, | 315 | cannot be opened, |
316 | .Nm ssh | 316 | ssh will continue without connecting to a master instance. |
317 | will continue without connecting to a master instance. | ||
318 | .Pp | 317 | .Pp |
319 | X11 and | 318 | X11 and |
320 | .Xr ssh-agent 1 | 319 | .Xr ssh-agent 1 |
@@ -345,7 +344,7 @@ will be substituted by the local host name, | |||
345 | .Ql %h | 344 | .Ql %h |
346 | will be substituted by the target host name, | 345 | will be substituted by the target host name, |
347 | .Ql %p | 346 | .Ql %p |
348 | the port and | 347 | the port, and |
349 | .Ql %r | 348 | .Ql %r |
350 | by the remote login username. | 349 | by the remote login username. |
351 | It is recommended that any | 350 | It is recommended that any |
@@ -382,7 +381,7 @@ empty address or | |||
382 | indicates that the port should be available from all interfaces. | 381 | indicates that the port should be available from all interfaces. |
383 | .Pp | 382 | .Pp |
384 | Currently the SOCKS4 and SOCKS5 protocols are supported, and | 383 | Currently the SOCKS4 and SOCKS5 protocols are supported, and |
385 | .Nm ssh | 384 | .Xr ssh 1 |
386 | will act as a SOCKS server. | 385 | will act as a SOCKS server. |
387 | Multiple forwardings may be specified, and | 386 | Multiple forwardings may be specified, and |
388 | additional forwardings can be given on the command line. | 387 | additional forwardings can be given on the command line. |
@@ -457,12 +456,12 @@ if the | |||
457 | option is also enabled. | 456 | option is also enabled. |
458 | .It Cm ForwardX11Trusted | 457 | .It Cm ForwardX11Trusted |
459 | If this option is set to | 458 | If this option is set to |
460 | .Dq yes | 459 | .Dq yes , |
461 | then remote X11 clients will have full access to the original X11 display. | 460 | remote X11 clients will have full access to the original X11 display. |
462 | .Pp | 461 | .Pp |
463 | If this option is set to | 462 | If this option is set to |
464 | .Dq no | 463 | .Dq no , |
465 | then remote X11 clients will be considered untrusted and prevented | 464 | remote X11 clients will be considered untrusted and prevented |
466 | from stealing or tampering with data belonging to trusted X11 | 465 | from stealing or tampering with data belonging to trusted X11 |
467 | clients. | 466 | clients. |
468 | Furthermore, the | 467 | Furthermore, the |
@@ -479,12 +478,11 @@ the restrictions imposed on untrusted clients. | |||
479 | Specifies whether remote hosts are allowed to connect to local | 478 | Specifies whether remote hosts are allowed to connect to local |
480 | forwarded ports. | 479 | forwarded ports. |
481 | By default, | 480 | By default, |
482 | .Nm ssh | 481 | .Xr ssh 1 |
483 | binds local port forwardings to the loopback address. | 482 | binds local port forwardings to the loopback address. |
484 | This prevents other remote hosts from connecting to forwarded ports. | 483 | This prevents other remote hosts from connecting to forwarded ports. |
485 | .Cm GatewayPorts | 484 | .Cm GatewayPorts |
486 | can be used to specify that | 485 | can be used to specify that ssh |
487 | .Nm ssh | ||
488 | should bind local port forwardings to the wildcard address, | 486 | should bind local port forwardings to the wildcard address, |
489 | thus allowing remote hosts to connect to forwarded ports. | 487 | thus allowing remote hosts to connect to forwarded ports. |
490 | The argument must be | 488 | The argument must be |
@@ -509,13 +507,13 @@ The default is | |||
509 | Note that this option applies to protocol version 2 only. | 507 | Note that this option applies to protocol version 2 only. |
510 | .It Cm HashKnownHosts | 508 | .It Cm HashKnownHosts |
511 | Indicates that | 509 | Indicates that |
512 | .Nm ssh | 510 | .Xr ssh 1 |
513 | should hash host names and addresses when they are added to | 511 | should hash host names and addresses when they are added to |
514 | .Pa ~/.ssh/known_hosts . | 512 | .Pa ~/.ssh/known_hosts . |
515 | These hashed names may be used normally by | 513 | These hashed names may be used normally by |
516 | .Nm ssh | 514 | .Xr ssh 1 |
517 | and | 515 | and |
518 | .Nm sshd , | 516 | .Xr sshd 8 , |
519 | but they do not reveal identifying information should the file's contents | 517 | but they do not reveal identifying information should the file's contents |
520 | be disclosed. | 518 | be disclosed. |
521 | The default is | 519 | The default is |
@@ -544,30 +542,29 @@ The default for this option is: | |||
544 | Specifies an alias that should be used instead of the | 542 | Specifies an alias that should be used instead of the |
545 | real host name when looking up or saving the host key | 543 | real host name when looking up or saving the host key |
546 | in the host key database files. | 544 | in the host key database files. |
547 | This option is useful for tunneling ssh connections | 545 | This option is useful for tunneling SSH connections |
548 | or for multiple servers running on a single host. | 546 | or for multiple servers running on a single host. |
549 | .It Cm HostName | 547 | .It Cm HostName |
550 | Specifies the real host name to log into. | 548 | Specifies the real host name to log into. |
551 | This can be used to specify nicknames or abbreviations for hosts. | 549 | This can be used to specify nicknames or abbreviations for hosts. |
552 | Default is the name given on the command line. | 550 | The default is the name given on the command line. |
553 | Numeric IP addresses are also permitted (both on the command line and in | 551 | Numeric IP addresses are also permitted (both on the command line and in |
554 | .Cm HostName | 552 | .Cm HostName |
555 | specifications). | 553 | specifications). |
556 | .It Cm IdentitiesOnly | 554 | .It Cm IdentitiesOnly |
557 | Specifies that | 555 | Specifies that |
558 | .Nm ssh | 556 | .Xr ssh 1 |
559 | should only use the authentication identity files configured in the | 557 | should only use the authentication identity files configured in the |
560 | .Nm | 558 | .Nm |
561 | files, | 559 | files, |
562 | even if the | 560 | even if |
563 | .Nm ssh-agent | 561 | .Xr ssh-agent 1 |
564 | offers more identities. | 562 | offers more identities. |
565 | The argument to this keyword must be | 563 | The argument to this keyword must be |
566 | .Dq yes | 564 | .Dq yes |
567 | or | 565 | or |
568 | .Dq no . | 566 | .Dq no . |
569 | This option is intended for situations where | 567 | This option is intended for situations where ssh-agent |
570 | .Nm ssh-agent | ||
571 | offers many different identities. | 568 | offers many different identities. |
572 | The default is | 569 | The default is |
573 | .Dq no . | 570 | .Dq no . |
@@ -633,9 +630,9 @@ empty address or | |||
633 | indicates that the port should be available from all interfaces. | 630 | indicates that the port should be available from all interfaces. |
634 | .It Cm LogLevel | 631 | .It Cm LogLevel |
635 | Gives the verbosity level that is used when logging messages from | 632 | Gives the verbosity level that is used when logging messages from |
636 | .Nm ssh . | 633 | .Xr ssh 1 . |
637 | The possible values are: | 634 | The possible values are: |
638 | QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3. | 635 | QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2, and DEBUG3. |
639 | The default is INFO. | 636 | The default is INFO. |
640 | DEBUG and DEBUG1 are equivalent. | 637 | DEBUG and DEBUG1 are equivalent. |
641 | DEBUG2 and DEBUG3 each specify higher levels of verbose output. | 638 | DEBUG2 and DEBUG3 each specify higher levels of verbose output. |
@@ -645,7 +642,7 @@ in order of preference. | |||
645 | The MAC algorithm is used in protocol version 2 | 642 | The MAC algorithm is used in protocol version 2 |
646 | for data integrity protection. | 643 | for data integrity protection. |
647 | Multiple algorithms must be comma-separated. | 644 | Multiple algorithms must be comma-separated. |
648 | The default is | 645 | The default is: |
649 | .Dq hmac-md5,hmac-sha1,hmac-ripemd160,hmac-sha1-96,hmac-md5-96 . | 646 | .Dq hmac-md5,hmac-sha1,hmac-ripemd160,hmac-sha1-96,hmac-md5-96 . |
650 | .It Cm NoHostAuthenticationForLocalhost | 647 | .It Cm NoHostAuthenticationForLocalhost |
651 | This option can be used if the home directory is shared across machines. | 648 | This option can be used if the home directory is shared across machines. |
@@ -660,7 +657,7 @@ The default is to check the host key for localhost. | |||
660 | .It Cm NumberOfPasswordPrompts | 657 | .It Cm NumberOfPasswordPrompts |
661 | Specifies the number of password prompts before giving up. | 658 | Specifies the number of password prompts before giving up. |
662 | The argument to this keyword must be an integer. | 659 | The argument to this keyword must be an integer. |
663 | Default is 3. | 660 | The default is 3. |
664 | .It Cm PasswordAuthentication | 661 | .It Cm PasswordAuthentication |
665 | Specifies whether to use password authentication. | 662 | Specifies whether to use password authentication. |
666 | The argument to this keyword must be | 663 | The argument to this keyword must be |
@@ -684,7 +681,7 @@ The default is | |||
684 | .Dq no . | 681 | .Dq no . |
685 | .It Cm Port | 682 | .It Cm Port |
686 | Specifies the port number to connect on the remote host. | 683 | Specifies the port number to connect on the remote host. |
687 | Default is 22. | 684 | The default is 22. |
688 | .It Cm PreferredAuthentications | 685 | .It Cm PreferredAuthentications |
689 | Specifies the order in which the client should try protocol 2 | 686 | Specifies the order in which the client should try protocol 2 |
690 | authentication methods. | 687 | authentication methods. |
@@ -696,17 +693,16 @@ The default for this option is: | |||
696 | .Dq hostbased,publickey,keyboard-interactive,password . | 693 | .Dq hostbased,publickey,keyboard-interactive,password . |
697 | .It Cm Protocol | 694 | .It Cm Protocol |
698 | Specifies the protocol versions | 695 | Specifies the protocol versions |
699 | .Nm ssh | 696 | .Xr ssh 1 |
700 | should support in order of preference. | 697 | should support in order of preference. |
701 | The possible values are | 698 | The possible values are |
702 | .Dq 1 | 699 | .Sq 1 |
703 | and | 700 | and |
704 | .Dq 2 . | 701 | .Sq 2 . |
705 | Multiple versions must be comma-separated. | 702 | Multiple versions must be comma-separated. |
706 | The default is | 703 | The default is |
707 | .Dq 2,1 . | 704 | .Dq 2,1 . |
708 | This means that | 705 | This means that ssh |
709 | .Nm ssh | ||
710 | tries version 2 and falls back to version 1 | 706 | tries version 2 and falls back to version 1 |
711 | if version 2 is not available. | 707 | if version 2 is not available. |
712 | .It Cm ProxyCommand | 708 | .It Cm ProxyCommand |
@@ -764,9 +760,9 @@ or | |||
764 | .Sq G | 760 | .Sq G |
765 | to indicate Kilobytes, Megabytes, or Gigabytes, respectively. | 761 | to indicate Kilobytes, Megabytes, or Gigabytes, respectively. |
766 | The default is between | 762 | The default is between |
767 | .Dq 1G | 763 | .Sq 1G |
768 | and | 764 | and |
769 | .Dq 4G , | 765 | .Sq 4G , |
770 | depending on the cipher. | 766 | depending on the cipher. |
771 | This option applies to protocol version 2 only. | 767 | This option applies to protocol version 2 only. |
772 | .It Cm RemoteForward | 768 | .It Cm RemoteForward |
@@ -812,7 +808,7 @@ or | |||
812 | The default is | 808 | The default is |
813 | .Dq no . | 809 | .Dq no . |
814 | This option applies to protocol version 1 only and requires | 810 | This option applies to protocol version 1 only and requires |
815 | .Nm ssh | 811 | .Xr ssh 1 |
816 | to be setuid root. | 812 | to be setuid root. |
817 | .It Cm RSAAuthentication | 813 | .It Cm RSAAuthentication |
818 | Specifies whether to try RSA authentication. | 814 | Specifies whether to try RSA authentication. |
@@ -830,8 +826,8 @@ Note that this option applies to protocol version 1 only. | |||
830 | Specifies what variables from the local | 826 | Specifies what variables from the local |
831 | .Xr environ 7 | 827 | .Xr environ 7 |
832 | should be sent to the server. | 828 | should be sent to the server. |
833 | Note that environment passing is only supported for protocol 2, the | 829 | Note that environment passing is only supported for protocol 2. |
834 | server must also support it, and the server must be configured to | 830 | The server must also support it, and the server must be configured to |
835 | accept these environment variables. | 831 | accept these environment variables. |
836 | Refer to | 832 | Refer to |
837 | .Cm AcceptEnv | 833 | .Cm AcceptEnv |
@@ -851,11 +847,10 @@ for more information on patterns. | |||
851 | .It Cm ServerAliveCountMax | 847 | .It Cm ServerAliveCountMax |
852 | Sets the number of server alive messages (see below) which may be | 848 | Sets the number of server alive messages (see below) which may be |
853 | sent without | 849 | sent without |
854 | .Nm ssh | 850 | .Xr ssh 1 |
855 | receiving any messages back from the server. | 851 | receiving any messages back from the server. |
856 | If this threshold is reached while server alive messages are being sent, | 852 | If this threshold is reached while server alive messages are being sent, |
857 | .Nm ssh | 853 | ssh will disconnect from the server, terminating the session. |
858 | will disconnect from the server, terminating the session. | ||
859 | It is important to note that the use of server alive messages is very | 854 | It is important to note that the use of server alive messages is very |
860 | different from | 855 | different from |
861 | .Cm TCPKeepAlive | 856 | .Cm TCPKeepAlive |
@@ -871,14 +866,14 @@ server depend on knowing when a connection has become inactive. | |||
871 | The default value is 3. | 866 | The default value is 3. |
872 | If, for example, | 867 | If, for example, |
873 | .Cm ServerAliveInterval | 868 | .Cm ServerAliveInterval |
874 | (see below) is set to 15, and | 869 | (see below) is set to 15 and |
875 | .Cm ServerAliveCountMax | 870 | .Cm ServerAliveCountMax |
876 | is left at the default, if the server becomes unresponsive ssh | 871 | is left at the default, if the server becomes unresponsive, |
877 | will disconnect after approximately 45 seconds. | 872 | ssh will disconnect after approximately 45 seconds. |
878 | .It Cm ServerAliveInterval | 873 | .It Cm ServerAliveInterval |
879 | Sets a timeout interval in seconds after which if no data has been received | 874 | Sets a timeout interval in seconds after which if no data has been received |
880 | from the server, | 875 | from the server, |
881 | .Nm ssh | 876 | .Xr ssh 1 |
882 | will send a message through the encrypted | 877 | will send a message through the encrypted |
883 | channel to request a response from the server. | 878 | channel to request a response from the server. |
884 | The default | 879 | The default |
@@ -887,41 +882,39 @@ This option applies to protocol version 2 only. | |||
887 | .It Cm SmartcardDevice | 882 | .It Cm SmartcardDevice |
888 | Specifies which smartcard device to use. | 883 | Specifies which smartcard device to use. |
889 | The argument to this keyword is the device | 884 | The argument to this keyword is the device |
890 | .Nm ssh | 885 | .Xr ssh 1 |
891 | should use to communicate with a smartcard used for storing the user's | 886 | should use to communicate with a smartcard used for storing the user's |
892 | private RSA key. | 887 | private RSA key. |
893 | By default, no device is specified and smartcard support is not activated. | 888 | By default, no device is specified and smartcard support is not activated. |
894 | .It Cm StrictHostKeyChecking | 889 | .It Cm StrictHostKeyChecking |
895 | If this flag is set to | 890 | If this flag is set to |
896 | .Dq yes , | 891 | .Dq yes , |
897 | .Nm ssh | 892 | .Xr ssh 1 |
898 | will never automatically add host keys to the | 893 | will never automatically add host keys to the |
899 | .Pa ~/.ssh/known_hosts | 894 | .Pa ~/.ssh/known_hosts |
900 | file, and refuses to connect to hosts whose host key has changed. | 895 | file, and refuses to connect to hosts whose host key has changed. |
901 | This provides maximum protection against trojan horse attacks, | 896 | This provides maximum protection against trojan horse attacks, |
902 | however, can be annoying when the | 897 | though it can be annoying when the |
903 | .Pa /etc/ssh/ssh_known_hosts | 898 | .Pa /etc/ssh/ssh_known_hosts |
904 | file is poorly maintained, or connections to new hosts are | 899 | file is poorly maintained or when connections to new hosts are |
905 | frequently made. | 900 | frequently made. |
906 | This option forces the user to manually | 901 | This option forces the user to manually |
907 | add all new hosts. | 902 | add all new hosts. |
908 | If this flag is set to | 903 | If this flag is set to |
909 | .Dq no , | 904 | .Dq no , |
910 | .Nm ssh | 905 | ssh will automatically add new host keys to the |
911 | will automatically add new host keys to the | ||
912 | user known hosts files. | 906 | user known hosts files. |
913 | If this flag is set to | 907 | If this flag is set to |
914 | .Dq ask , | 908 | .Dq ask , |
915 | new host keys | 909 | new host keys |
916 | will be added to the user known host files only after the user | 910 | will be added to the user known host files only after the user |
917 | has confirmed that is what they really want to do, and | 911 | has confirmed that is what they really want to do, and |
918 | .Nm ssh | 912 | ssh will refuse to connect to hosts whose host key has changed. |
919 | will refuse to connect to hosts whose host key has changed. | ||
920 | The host keys of | 913 | The host keys of |
921 | known hosts will be verified automatically in all cases. | 914 | known hosts will be verified automatically in all cases. |
922 | The argument must be | 915 | The argument must be |
923 | .Dq yes , | 916 | .Dq yes , |
924 | .Dq no | 917 | .Dq no , |
925 | or | 918 | or |
926 | .Dq ask . | 919 | .Dq ask . |
927 | The default is | 920 | The default is |
@@ -952,7 +945,7 @@ instead of layer 3 (point-to-point) tunneling from the server. | |||
952 | The argument must be | 945 | The argument must be |
953 | .Dq yes , | 946 | .Dq yes , |
954 | .Dq point-to-point , | 947 | .Dq point-to-point , |
955 | .Dq ethernet | 948 | .Dq ethernet , |
956 | or | 949 | or |
957 | .Dq no . | 950 | .Dq no . |
958 | The default is | 951 | The default is |
@@ -971,8 +964,8 @@ or | |||
971 | The default is | 964 | The default is |
972 | .Dq no . | 965 | .Dq no . |
973 | If set to | 966 | If set to |
974 | .Dq yes | 967 | .Dq yes , |
975 | .Nm ssh | 968 | .Xr ssh 1 |
976 | must be setuid root. | 969 | must be setuid root. |
977 | Note that this option must be set to | 970 | Note that this option must be set to |
978 | .Dq yes | 971 | .Dq yes |
@@ -1005,12 +998,17 @@ need to confirm new host keys according to the | |||
1005 | option. | 998 | option. |
1006 | The argument must be | 999 | The argument must be |
1007 | .Dq yes , | 1000 | .Dq yes , |
1008 | .Dq no | 1001 | .Dq no , |
1009 | or | 1002 | or |
1010 | .Dq ask . | 1003 | .Dq ask . |
1011 | The default is | 1004 | The default is |
1012 | .Dq no . | 1005 | .Dq no . |
1013 | Note that this option applies to protocol version 2 only. | 1006 | Note that this option applies to protocol version 2 only. |
1007 | .Pp | ||
1008 | See also | ||
1009 | .Sx VERIFYING HOST KEYS | ||
1010 | in | ||
1011 | .Xr ssh 1 . | ||
1014 | .It Cm XAuthLocation | 1012 | .It Cm XAuthLocation |
1015 | Specifies the full pathname of the | 1013 | Specifies the full pathname of the |
1016 | .Xr xauth 1 | 1014 | .Xr xauth 1 |
@@ -1023,9 +1021,7 @@ The default is | |||
1023 | .It Pa ~/.ssh/config | 1021 | .It Pa ~/.ssh/config |
1024 | This is the per-user configuration file. | 1022 | This is the per-user configuration file. |
1025 | The format of this file is described above. | 1023 | The format of this file is described above. |
1026 | This file is used by the | 1024 | This file is used by the SSH client. |
1027 | .Nm ssh | ||
1028 | client. | ||
1029 | Because of the potential for abuse, this file must have strict permissions: | 1025 | Because of the potential for abuse, this file must have strict permissions: |
1030 | read/write for the user, and not accessible by others. | 1026 | read/write for the user, and not accessible by others. |
1031 | .It Pa /etc/ssh/ssh_config | 1027 | .It Pa /etc/ssh/ssh_config |