summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ssh-keygen.114
-rw-r--r--ssh-keysign.86
-rw-r--r--ssh.166
-rw-r--r--ssh_config.523
-rw-r--r--sshd.816
-rw-r--r--sshd_config.527
6 files changed, 55 insertions, 97 deletions
diff --git a/ssh-keygen.1 b/ssh-keygen.1
index 74b3124f5..37a4fc2b2 100644
--- a/ssh-keygen.1
+++ b/ssh-keygen.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-keygen.1,v 1.129 2015/11/13 04:34:15 djm Exp $ 1.\" $OpenBSD: ssh-keygen.1,v 1.130 2016/02/17 07:38:19 jmc Exp $
2.\" 2.\"
3.\" Author: Tatu Ylonen <ylo@cs.hut.fi> 3.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -35,7 +35,7 @@
35.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 35.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
36.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 36.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
37.\" 37.\"
38.Dd $Mdocdate: November 13 2015 $ 38.Dd $Mdocdate: February 17 2016 $
39.Dt SSH-KEYGEN 1 39.Dt SSH-KEYGEN 1
40.Os 40.Os
41.Sh NAME 41.Sh NAME
@@ -141,8 +141,12 @@
141generates, manages and converts authentication keys for 141generates, manages and converts authentication keys for
142.Xr ssh 1 . 142.Xr ssh 1 .
143.Nm 143.Nm
144can create RSA keys for use by SSH protocol version 1 and 144can create keys for use by SSH protocol versions 1 and 2.
145DSA, ECDSA, Ed25519 or RSA keys for use by SSH protocol version 2. 145Protocol 1 should not be used
146and is only offered to support legacy devices.
147It suffers from a number of cryptographic weaknesses
148and doesn't support many of the advanced features available for protocol 2.
149.Pp
146The type of key to be generated is specified with the 150The type of key to be generated is specified with the
147.Fl t 151.Fl t
148option. 152option.
@@ -474,7 +478,7 @@ At present, no options are valid for host keys.
474.It Fl o 478.It Fl o
475Causes 479Causes
476.Nm 480.Nm
477to save SSH protocol 2 private keys using the new OpenSSH format rather than 481to save private keys using the new OpenSSH format rather than
478the more compatible PEM format. 482the more compatible PEM format.
479The new format has increased resistance to brute-force password cracking 483The new format has increased resistance to brute-force password cracking
480but is not supported by versions of OpenSSH prior to 6.5. 484but is not supported by versions of OpenSSH prior to 6.5.
diff --git a/ssh-keysign.8 b/ssh-keysign.8
index 69d082954..19b0dbc53 100644
--- a/ssh-keysign.8
+++ b/ssh-keysign.8
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-keysign.8,v 1.14 2013/12/07 11:58:46 naddy Exp $ 1.\" $OpenBSD: ssh-keysign.8,v 1.15 2016/02/17 07:38:19 jmc Exp $
2.\" 2.\"
3.\" Copyright (c) 2002 Markus Friedl. All rights reserved. 3.\" Copyright (c) 2002 Markus Friedl. All rights reserved.
4.\" 4.\"
@@ -22,7 +22,7 @@
22.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 22.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 23.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24.\" 24.\"
25.Dd $Mdocdate: December 7 2013 $ 25.Dd $Mdocdate: February 17 2016 $
26.Dt SSH-KEYSIGN 8 26.Dt SSH-KEYSIGN 8
27.Os 27.Os
28.Sh NAME 28.Sh NAME
@@ -35,7 +35,7 @@
35is used by 35is used by
36.Xr ssh 1 36.Xr ssh 1
37to access the local host keys and generate the digital signature 37to access the local host keys and generate the digital signature
38required during host-based authentication with SSH protocol version 2. 38required during host-based authentication.
39.Pp 39.Pp
40.Nm 40.Nm
41is disabled by default and can only be enabled in the 41is disabled by default and can only be enabled in the
diff --git a/ssh.1 b/ssh.1
index afc3537b0..cc5334338 100644
--- a/ssh.1
+++ b/ssh.1
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: ssh.1,v 1.368 2016/02/16 07:47:54 jmc Exp $ 36.\" $OpenBSD: ssh.1,v 1.369 2016/02/17 07:38:19 jmc Exp $
37.Dd $Mdocdate: February 16 2016 $ 37.Dd $Mdocdate: February 17 2016 $
38.Dt SSH 1 38.Dt SSH 1
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -402,17 +402,15 @@ in
402for details. 402for details.
403.Pp 403.Pp
404.It Fl m Ar mac_spec 404.It Fl m Ar mac_spec
405Additionally, for protocol version 2 a comma-separated list of MAC 405A comma-separated list of MAC (message authentication code) algorithms,
406(message authentication code) algorithms can 406specified in order of preference.
407be specified in order of preference.
408See the 407See the
409.Cm MACs 408.Cm MACs
410keyword for more information. 409keyword for more information.
411.Pp 410.Pp
412.It Fl N 411.It Fl N
413Do not execute a remote command. 412Do not execute a remote command.
414This is useful for just forwarding ports 413This is useful for just forwarding ports.
415(protocol version 2 only).
416.Pp 414.Pp
417.It Fl n 415.It Fl n
418Redirects stdin from 416Redirects stdin from
@@ -664,8 +662,8 @@ for details.
664.Pp 662.Pp
665.It Fl s 663.It Fl s
666May be used to request invocation of a subsystem on the remote system. 664May be used to request invocation of a subsystem on the remote system.
667Subsystems are a feature of the SSH2 protocol which facilitate the use 665Subsystems facilitate the use of SSH
668of SSH as a secure transport for other applications (eg.\& 666as a secure transport for other applications (e.g.\&
669.Xr sftp 1 ) . 667.Xr sftp 1 ) .
670The subsystem is specified as the remote command. 668The subsystem is specified as the remote command.
671.Pp 669.Pp
@@ -710,7 +708,6 @@ Implies
710.Cm ExitOnForwardFailure 708.Cm ExitOnForwardFailure
711and 709and
712.Cm ClearAllForwardings . 710.Cm ClearAllForwardings .
713Works with Protocol version 2 only.
714.Pp 711.Pp
715.It Fl w Xo 712.It Fl w Xo
716.Ar local_tun Ns Op : Ns Ar remote_tun 713.Ar local_tun Ns Op : Ns Ar remote_tun
@@ -795,8 +792,10 @@ or the
795and 792and
796.Fl 2 793.Fl 2
797options (see above). 794options (see above).
798Protocol 1 should not be used - it suffers from a number of cryptographic 795Protocol 1 should not be used
799weaknesses and is only offered to support legacy devices. 796and is only offered to support legacy devices.
797It suffers from a number of cryptographic weaknesses
798and doesn't support many of the advanced features available for protocol 2.
800.Pp 799.Pp
801The methods available for authentication are: 800The methods available for authentication are:
802GSSAPI-based authentication, 801GSSAPI-based authentication,
@@ -805,8 +804,9 @@ public key authentication,
805challenge-response authentication, 804challenge-response authentication,
806and password authentication. 805and password authentication.
807Authentication methods are tried in the order specified above, 806Authentication methods are tried in the order specified above,
808though protocol 2 has a configuration option to change the default order: 807though
809.Cm PreferredAuthentications . 808.Cm PreferredAuthentications
809can be used to change the default order.
810.Pp 810.Pp
811Host-based authentication works as follows: 811Host-based authentication works as follows:
812If the machine the user logs in from is listed in 812If the machine the user logs in from is listed in
@@ -850,8 +850,6 @@ The server knows the public key, and only the user knows the private key.
850.Nm 850.Nm
851implements public key authentication protocol automatically, 851implements public key authentication protocol automatically,
852using one of the DSA, ECDSA, Ed25519 or RSA algorithms. 852using one of the DSA, ECDSA, Ed25519 or RSA algorithms.
853Protocol 1 is restricted to using only RSA keys,
854but protocol 2 may use any.
855The HISTORY section of 853The HISTORY section of
856.Xr ssl 8 854.Xr ssl 8
857contains a brief discussion of the DSA and RSA algorithms. 855contains a brief discussion of the DSA and RSA algorithms.
@@ -873,26 +871,26 @@ This stores the private key in
873.Pa ~/.ssh/identity 871.Pa ~/.ssh/identity
874(protocol 1), 872(protocol 1),
875.Pa ~/.ssh/id_dsa 873.Pa ~/.ssh/id_dsa
876(protocol 2 DSA), 874(DSA),
877.Pa ~/.ssh/id_ecdsa 875.Pa ~/.ssh/id_ecdsa
878(protocol 2 ECDSA), 876(ECDSA),
879.Pa ~/.ssh/id_ed25519 877.Pa ~/.ssh/id_ed25519
880(protocol 2 Ed25519), 878(Ed25519),
881or 879or
882.Pa ~/.ssh/id_rsa 880.Pa ~/.ssh/id_rsa
883(protocol 2 RSA) 881(RSA)
884and stores the public key in 882and stores the public key in
885.Pa ~/.ssh/identity.pub 883.Pa ~/.ssh/identity.pub
886(protocol 1), 884(protocol 1),
887.Pa ~/.ssh/id_dsa.pub 885.Pa ~/.ssh/id_dsa.pub
888(protocol 2 DSA), 886(DSA),
889.Pa ~/.ssh/id_ecdsa.pub 887.Pa ~/.ssh/id_ecdsa.pub
890(protocol 2 ECDSA), 888(ECDSA),
891.Pa ~/.ssh/id_ed25519.pub 889.Pa ~/.ssh/id_ed25519.pub
892(protocol 2 Ed25519), 890(Ed25519),
893or 891or
894.Pa ~/.ssh/id_rsa.pub 892.Pa ~/.ssh/id_rsa.pub
895(protocol 2 RSA) 893(RSA)
896in the user's home directory. 894in the user's home directory.
897The user should then copy the public key 895The user should then copy the public key
898to 896to
@@ -930,8 +928,6 @@ Challenge-response authentication works as follows:
930The server sends an arbitrary 928The server sends an arbitrary
931.Qq challenge 929.Qq challenge
932text, and prompts for a response. 930text, and prompts for a response.
933Protocol 2 allows multiple challenges and responses;
934protocol 1 is restricted to just one challenge/response.
935Examples of challenge-response authentication include 931Examples of challenge-response authentication include
936.Bx 932.Bx
937Authentication (see 933Authentication (see
@@ -1030,7 +1026,7 @@ at logout when waiting for forwarded connection / X11 sessions to terminate.
1030Display a list of escape characters. 1026Display a list of escape characters.
1031.It Cm ~B 1027.It Cm ~B
1032Send a BREAK to the remote system 1028Send a BREAK to the remote system
1033(only useful for SSH protocol version 2 and if the peer supports it). 1029(only useful if the peer supports it).
1034.It Cm ~C 1030.It Cm ~C
1035Open command line. 1031Open command line.
1036Currently this allows the addition of port forwardings using the 1032Currently this allows the addition of port forwardings using the
@@ -1063,7 +1059,7 @@ Basic help is available, using the
1063option. 1059option.
1064.It Cm ~R 1060.It Cm ~R
1065Request rekeying of the connection 1061Request rekeying of the connection
1066(only useful for SSH protocol version 2 and if the peer supports it). 1062(only useful if the peer supports it).
1067.It Cm ~V 1063.It Cm ~V
1068Decrease the verbosity 1064Decrease the verbosity
1069.Pq Ic LogLevel 1065.Pq Ic LogLevel
@@ -1531,20 +1527,6 @@ The file format and configuration options are described in
1531.It Pa /etc/ssh/ssh_host_rsa_key 1527.It Pa /etc/ssh/ssh_host_rsa_key
1532These files contain the private parts of the host keys 1528These files contain the private parts of the host keys
1533and are used for host-based authentication. 1529and are used for host-based authentication.
1534If protocol version 1 is used,
1535.Nm
1536must be setuid root, since the host key is readable only by root.
1537For protocol version 2,
1538.Nm
1539uses
1540.Xr ssh-keysign 8
1541to access the host keys,
1542eliminating the requirement that
1543.Nm
1544be setuid root when host-based authentication is used.
1545By default
1546.Nm
1547is not setuid root.
1548.Pp 1530.Pp
1549.It Pa /etc/ssh/ssh_known_hosts 1531.It Pa /etc/ssh/ssh_known_hosts
1550Systemwide list of known host keys. 1532Systemwide list of known host keys.
diff --git a/ssh_config.5 b/ssh_config.5
index c8ccfecb4..fcd538066 100644
--- a/ssh_config.5
+++ b/ssh_config.5
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: ssh_config.5,v 1.225 2016/02/16 05:11:04 djm Exp $ 36.\" $OpenBSD: ssh_config.5,v 1.226 2016/02/17 07:38:19 jmc Exp $
37.Dd $Mdocdate: February 16 2016 $ 37.Dd $Mdocdate: February 17 2016 $
38.Dt SSH_CONFIG 5 38.Dt SSH_CONFIG 5
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -824,12 +824,10 @@ The default is
824Specifies whether user authentication based on GSSAPI is allowed. 824Specifies whether user authentication based on GSSAPI is allowed.
825The default is 825The default is
826.Dq no . 826.Dq no .
827Note that this option applies to protocol version 2 only.
828.It Cm GSSAPIDelegateCredentials 827.It Cm GSSAPIDelegateCredentials
829Forward (delegate) credentials to the server. 828Forward (delegate) credentials to the server.
830The default is 829The default is
831.Dq no . 830.Dq no .
832Note that this option applies to protocol version 2 only.
833.It Cm HashKnownHosts 831.It Cm HashKnownHosts
834Indicates that 832Indicates that
835.Xr ssh 1 833.Xr ssh 1
@@ -856,9 +854,6 @@ or
856.Dq no . 854.Dq no .
857The default is 855The default is
858.Dq no . 856.Dq no .
859This option applies to protocol version 2 only and
860is similar to
861.Cm RhostsRSAAuthentication .
862.It Cm HostbasedKeyTypes 857.It Cm HostbasedKeyTypes
863Specifies the key types that will be used for hostbased authentication 858Specifies the key types that will be used for hostbased authentication
864as a comma-separated pattern list. 859as a comma-separated pattern list.
@@ -883,7 +878,7 @@ option of
883.Xr ssh 1 878.Xr ssh 1
884may be used to list supported key types. 879may be used to list supported key types.
885.It Cm HostKeyAlgorithms 880.It Cm HostKeyAlgorithms
886Specifies the protocol version 2 host key algorithms 881Specifies the host key algorithms
887that the client wants to use in order of preference. 882that the client wants to use in order of preference.
888Alternately if the specified value begins with a 883Alternately if the specified value begins with a
889.Sq + 884.Sq +
@@ -1170,8 +1165,7 @@ DEBUG2 and DEBUG3 each specify higher levels of verbose output.
1170.It Cm MACs 1165.It Cm MACs
1171Specifies the MAC (message authentication code) algorithms 1166Specifies the MAC (message authentication code) algorithms
1172in order of preference. 1167in order of preference.
1173The MAC algorithm is used in protocol version 2 1168The MAC algorithm is used for data integrity protection.
1174for data integrity protection.
1175Multiple algorithms must be comma-separated. 1169Multiple algorithms must be comma-separated.
1176If the specified value begins with a 1170If the specified value begins with a
1177.Sq + 1171.Sq +
@@ -1243,8 +1237,7 @@ private RSA key.
1243Specifies the port number to connect on the remote host. 1237Specifies the port number to connect on the remote host.
1244The default is 22. 1238The default is 22.
1245.It Cm PreferredAuthentications 1239.It Cm PreferredAuthentications
1246Specifies the order in which the client should try protocol 2 1240Specifies the order in which the client should try authentication methods.
1247authentication methods.
1248This allows a client to prefer one method (e.g.\& 1241This allows a client to prefer one method (e.g.\&
1249.Cm keyboard-interactive ) 1242.Cm keyboard-interactive )
1250over another method (e.g.\& 1243over another method (e.g.\&
@@ -1353,7 +1346,6 @@ or
1353.Dq no . 1346.Dq no .
1354The default is 1347The default is
1355.Dq yes . 1348.Dq yes .
1356This option applies to protocol version 2 only.
1357.It Cm RekeyLimit 1349.It Cm RekeyLimit
1358Specifies the maximum amount of data that may be transmitted before the 1350Specifies the maximum amount of data that may be transmitted before the
1359session key is renegotiated, optionally followed a maximum amount of 1351session key is renegotiated, optionally followed a maximum amount of
@@ -1379,7 +1371,6 @@ is
1379.Dq default none , 1371.Dq default none ,
1380which means that rekeying is performed after the cipher's default amount 1372which means that rekeying is performed after the cipher's default amount
1381of data has been sent or received and no time based rekeying is done. 1373of data has been sent or received and no time based rekeying is done.
1382This option applies to protocol version 2 only.
1383.It Cm RemoteForward 1374.It Cm RemoteForward
1384Specifies that a TCP port on the remote machine be forwarded over 1375Specifies that a TCP port on the remote machine be forwarded over
1385the secure channel to the specified host and port from the local machine. 1376the secure channel to the specified host and port from the local machine.
@@ -1472,7 +1463,6 @@ Note that this option applies to protocol version 1 only.
1472Specifies what variables from the local 1463Specifies what variables from the local
1473.Xr environ 7 1464.Xr environ 7
1474should be sent to the server. 1465should be sent to the server.
1475Note that environment passing is only supported for protocol 2.
1476The server must also support it, and the server must be configured to 1466The server must also support it, and the server must be configured to
1477accept these environment variables. 1467accept these environment variables.
1478Note that the 1468Note that the
@@ -1520,7 +1510,6 @@ If, for example,
1520.Cm ServerAliveCountMax 1510.Cm ServerAliveCountMax
1521is left at the default, if the server becomes unresponsive, 1511is left at the default, if the server becomes unresponsive,
1522ssh will disconnect after approximately 45 seconds. 1512ssh will disconnect after approximately 45 seconds.
1523This option applies to protocol version 2 only.
1524.It Cm ServerAliveInterval 1513.It Cm ServerAliveInterval
1525Sets a timeout interval in seconds after which if no data has been received 1514Sets a timeout interval in seconds after which if no data has been received
1526from the server, 1515from the server,
@@ -1529,7 +1518,6 @@ will send a message through the encrypted
1529channel to request a response from the server. 1518channel to request a response from the server.
1530The default 1519The default
1531is 0, indicating that these messages will not be sent to the server. 1520is 0, indicating that these messages will not be sent to the server.
1532This option applies to protocol version 2 only.
1533.It Cm StreamLocalBindMask 1521.It Cm StreamLocalBindMask
1534Sets the octal file creation mode mask 1522Sets the octal file creation mode mask
1535.Pq umask 1523.Pq umask
@@ -1726,7 +1714,6 @@ or
1726.Dq ask . 1714.Dq ask .
1727The default is 1715The default is
1728.Dq no . 1716.Dq no .
1729Note that this option applies to protocol version 2 only.
1730.Pp 1717.Pp
1731See also VERIFYING HOST KEYS in 1718See also VERIFYING HOST KEYS in
1732.Xr ssh 1 . 1719.Xr ssh 1 .
diff --git a/sshd.8 b/sshd.8
index e658523a5..6c521f23e 100644
--- a/sshd.8
+++ b/sshd.8
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: sshd.8,v 1.283 2016/02/05 03:07:06 djm Exp $ 36.\" $OpenBSD: sshd.8,v 1.284 2016/02/17 07:38:19 jmc Exp $
37.Dd $Mdocdate: February 5 2016 $ 37.Dd $Mdocdate: February 17 2016 $
38.Dt SSHD 8 38.Dt SSHD 8
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -275,14 +275,12 @@ though this can be changed via the
275.Cm Protocol 275.Cm Protocol
276option in 276option in
277.Xr sshd_config 5 . 277.Xr sshd_config 5 .
278Protocol 2 supports DSA, ECDSA, Ed25519 and RSA keys; 278Protocol 1 should not be used
279protocol 1 only supports RSA keys. 279and is only offered to support legacy devices.
280For both protocols,
281each host has a host-specific key,
282normally 2048 bits,
283used to identify the host.
284.Pp 280.Pp
285Forward security for protocol 1 is provided through 281Each host has a host-specific key,
282used to identify the host.
283Partial forward security for protocol 1 is provided through
286an additional server key, 284an additional server key,
287normally 1024 bits, 285normally 1024 bits,
288generated when the server starts. 286generated when the server starts.
diff --git a/sshd_config.5 b/sshd_config.5
index 711a02524..ef9190568 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: sshd_config.5,v 1.218 2016/02/16 05:11:04 djm Exp $ 36.\" $OpenBSD: sshd_config.5,v 1.219 2016/02/17 07:38:19 jmc Exp $
37.Dd $Mdocdate: February 16 2016 $ 37.Dd $Mdocdate: February 17 2016 $
38.Dt SSHD_CONFIG 5 38.Dt SSHD_CONFIG 5
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -70,8 +70,7 @@ See
70in 70in
71.Xr ssh_config 5 71.Xr ssh_config 5
72for how to configure the client. 72for how to configure the client.
73Note that environment passing is only supported for protocol 2, and 73The
74that the
75.Ev TERM 74.Ev TERM
76environment variable is always sent whenever the client 75environment variable is always sent whenever the client
77requests a pseudo-terminal as it is required by the protocol. 76requests a pseudo-terminal as it is required by the protocol.
@@ -226,7 +225,7 @@ of
226.Dq publickey,publickey 225.Dq publickey,publickey
227will require successful authentication using two different public keys. 226will require successful authentication using two different public keys.
228.Pp 227.Pp
229This option is only available for SSH protocol 2 and will yield a fatal 228This option will yield a fatal
230error if enabled if protocol 1 is also enabled. 229error if enabled if protocol 1 is also enabled.
231Note that each authentication method listed should also be explicitly enabled 230Note that each authentication method listed should also be explicitly enabled
232in the configuration. 231in the configuration.
@@ -373,7 +372,6 @@ authentication is allowed.
373If the argument is 372If the argument is
374.Dq none 373.Dq none
375then no banner is displayed. 374then no banner is displayed.
376This option is only available for protocol version 2.
377By default, no banner is displayed. 375By default, no banner is displayed.
378.It Cm ChallengeResponseAuthentication 376.It Cm ChallengeResponseAuthentication
379Specifies whether challenge-response authentication is allowed (e.g. via 377Specifies whether challenge-response authentication is allowed (e.g. via
@@ -437,7 +435,7 @@ The default is
437indicating not to 435indicating not to
438.Xr chroot 2 . 436.Xr chroot 2 .
439.It Cm Ciphers 437.It Cm Ciphers
440Specifies the ciphers allowed for protocol version 2. 438Specifies the ciphers allowed.
441Multiple ciphers must be comma-separated. 439Multiple ciphers must be comma-separated.
442If the specified value begins with a 440If the specified value begins with a
443.Sq + 441.Sq +
@@ -518,7 +516,6 @@ If
518.Cm ClientAliveCountMax 516.Cm ClientAliveCountMax
519is left at the default, unresponsive SSH clients 517is left at the default, unresponsive SSH clients
520will be disconnected after approximately 45 seconds. 518will be disconnected after approximately 45 seconds.
521This option applies to protocol version 2 only.
522.It Cm ClientAliveInterval 519.It Cm ClientAliveInterval
523Sets a timeout interval in seconds after which if no data has been received 520Sets a timeout interval in seconds after which if no data has been received
524from the client, 521from the client,
@@ -527,7 +524,6 @@ will send a message through the encrypted
527channel to request a response from the client. 524channel to request a response from the client.
528The default 525The default
529is 0, indicating that these messages will not be sent to the client. 526is 0, indicating that these messages will not be sent to the client.
530This option applies to protocol version 2 only.
531.It Cm Compression 527.It Cm Compression
532Specifies whether compression is allowed, or delayed until 528Specifies whether compression is allowed, or delayed until
533the user has authenticated successfully. 529the user has authenticated successfully.
@@ -627,13 +623,11 @@ The default is
627Specifies whether user authentication based on GSSAPI is allowed. 623Specifies whether user authentication based on GSSAPI is allowed.
628The default is 624The default is
629.Dq no . 625.Dq no .
630Note that this option applies to protocol version 2 only.
631.It Cm GSSAPICleanupCredentials 626.It Cm GSSAPICleanupCredentials
632Specifies whether to automatically destroy the user's credentials cache 627Specifies whether to automatically destroy the user's credentials cache
633on logout. 628on logout.
634The default is 629The default is
635.Dq yes . 630.Dq yes .
636Note that this option applies to protocol version 2 only.
637.It Cm GSSAPIStrictAcceptorCheck 631.It Cm GSSAPIStrictAcceptorCheck
638Determines whether to be strict about the identity of the GSSAPI acceptor 632Determines whether to be strict about the identity of the GSSAPI acceptor
639a client authenticates against. 633a client authenticates against.
@@ -676,9 +670,6 @@ may be used to list supported key types.
676Specifies whether rhosts or /etc/hosts.equiv authentication together 670Specifies whether rhosts or /etc/hosts.equiv authentication together
677with successful public key client host authentication is allowed 671with successful public key client host authentication is allowed
678(host-based authentication). 672(host-based authentication).
679This option is similar to
680.Cm RhostsRSAAuthentication
681and applies to protocol version 2 only.
682The default is 673The default is
683.Dq no . 674.Dq no .
684.It Cm HostbasedUsesNameFromPacketOnly 675.It Cm HostbasedUsesNameFromPacketOnly
@@ -749,7 +740,7 @@ is specified, the location of the socket will be read from the
749.Ev SSH_AUTH_SOCK 740.Ev SSH_AUTH_SOCK
750environment variable. 741environment variable.
751.It Cm HostKeyAlgorithms 742.It Cm HostKeyAlgorithms
752Specifies the protocol version 2 host key algorithms 743Specifies the host key algorithms
753that the server offers. 744that the server offers.
754The default for this option is: 745The default for this option is:
755.Bd -literal -offset 3n 746.Bd -literal -offset 3n
@@ -970,8 +961,7 @@ DEBUG2 and DEBUG3 each specify higher levels of debugging output.
970Logging with a DEBUG level violates the privacy of users and is not recommended. 961Logging with a DEBUG level violates the privacy of users and is not recommended.
971.It Cm MACs 962.It Cm MACs
972Specifies the available MAC (message authentication code) algorithms. 963Specifies the available MAC (message authentication code) algorithms.
973The MAC algorithm is used in protocol version 2 964The MAC algorithm is used for data integrity protection.
974for data integrity protection.
975Multiple algorithms must be comma-separated. 965Multiple algorithms must be comma-separated.
976If the specified value begins with a 966If the specified value begins with a
977.Sq + 967.Sq +
@@ -1380,7 +1370,6 @@ may be used to list supported key types.
1380Specifies whether public key authentication is allowed. 1370Specifies whether public key authentication is allowed.
1381The default is 1371The default is
1382.Dq yes . 1372.Dq yes .
1383Note that this option applies to protocol version 2 only.
1384.It Cm RekeyLimit 1373.It Cm RekeyLimit
1385Specifies the maximum amount of data that may be transmitted before the 1374Specifies the maximum amount of data that may be transmitted before the
1386session key is renegotiated, optionally followed a maximum amount of 1375session key is renegotiated, optionally followed a maximum amount of
@@ -1406,7 +1395,6 @@ is
1406.Dq default none , 1395.Dq default none ,
1407which means that rekeying is performed after the cipher's default amount 1396which means that rekeying is performed after the cipher's default amount
1408of data has been sent or received and no time based rekeying is done. 1397of data has been sent or received and no time based rekeying is done.
1409This option applies to protocol version 2 only.
1410.It Cm RevokedKeys 1398.It Cm RevokedKeys
1411Specifies revoked public keys file, or 1399Specifies revoked public keys file, or
1412.Dq none 1400.Dq none
@@ -1493,7 +1481,6 @@ This may simplify configurations using
1493to force a different filesystem root on clients. 1481to force a different filesystem root on clients.
1494.Pp 1482.Pp
1495By default no subsystems are defined. 1483By default no subsystems are defined.
1496Note that this option applies to protocol version 2 only.
1497.It Cm SyslogFacility 1484.It Cm SyslogFacility
1498Gives the facility code that is used when logging messages from 1485Gives the facility code that is used when logging messages from
1499.Xr sshd 8 . 1486.Xr sshd 8 .