summaryrefslogtreecommitdiff
path: root/ssh.0
diff options
context:
space:
mode:
Diffstat (limited to 'ssh.0')
-rw-r--r--ssh.068
1 files changed, 39 insertions, 29 deletions
diff --git a/ssh.0 b/ssh.0
index 8d53ad289..3d2036253 100644
--- a/ssh.0
+++ b/ssh.0
@@ -135,15 +135,15 @@ DESCRIPTION
135 with a PKCS#11 token providing the user's private RSA key. 135 with a PKCS#11 token providing the user's private RSA key.
136 136
137 -i identity_file 137 -i identity_file
138 Selects a file from which the identity (private key) for RSA or 138 Selects a file from which the identity (private key) for public
139 DSA authentication is read. The default is ~/.ssh/identity for 139 key authentication is read. The default is ~/.ssh/identity for
140 protocol version 1, and ~/.ssh/id_rsa and ~/.ssh/id_dsa for 140 protocol version 1, and ~/.ssh/id_dsa, ~/.ssh/id_ecdsa and
141 protocol version 2. Identity files may also be specified on a 141 ~/.ssh/id_rsa for protocol version 2. Identity files may also be
142 per-host basis in the configuration file. It is possible to have 142 specified on a per-host basis in the configuration file. It is
143 multiple -i options (and multiple identities specified in 143 possible to have multiple -i options (and multiple identities
144 configuration files). ssh will also try to load certificate 144 specified in configuration files). ssh will also try to load
145 information from the filename obtained by appending -cert.pub to 145 certificate information from the filename obtained by appending
146 identity filenames. 146 -cert.pub to identity filenames.
147 147
148 -K Enables GSSAPI-based authentication and forwarding (delegation) 148 -K Enables GSSAPI-based authentication and forwarding (delegation)
149 of GSSAPI credentials to the server. 149 of GSSAPI credentials to the server.
@@ -244,7 +244,9 @@ DESCRIPTION
244 HostName 244 HostName
245 IdentityFile 245 IdentityFile
246 IdentitiesOnly 246 IdentitiesOnly
247 IPQoS
247 KbdInteractiveDevices 248 KbdInteractiveDevices
249 KexAlgorithms
248 LocalCommand 250 LocalCommand
249 LocalForward 251 LocalForward
250 LogLevel 252 LogLevel
@@ -380,9 +382,6 @@ DESCRIPTION
380 configuration file and a system-wide configuration file. The file format 382 configuration file and a system-wide configuration file. The file format
381 and configuration options are described in ssh_config(5). 383 and configuration options are described in ssh_config(5).
382 384
383 ssh exits with the exit status of the remote command or with 255 if an
384 error occurred.
385
386AUTHENTICATION 385AUTHENTICATION
387 The OpenSSH SSH client supports SSH protocols 1 and 2. The default is to 386 The OpenSSH SSH client supports SSH protocols 1 and 2. The default is to
388 use protocol 2 only, though this can be changed via the Protocol option 387 use protocol 2 only, though this can be changed via the Protocol option
@@ -421,9 +420,9 @@ AUTHENTICATION
421 creates a public/private key pair for authentication purposes. The 420 creates a public/private key pair for authentication purposes. The
422 server knows the public key, and only the user knows the private key. 421 server knows the public key, and only the user knows the private key.
423 ssh implements public key authentication protocol automatically, using 422 ssh implements public key authentication protocol automatically, using
424 either the RSA or DSA algorithms. Protocol 1 is restricted to using only 423 one of the DSA, ECDSA or RSA algorithms. Protocol 1 is restricted to
425 RSA keys, but protocol 2 may use either. The HISTORY section of ssl(8) 424 using only RSA keys, but protocol 2 may use any. The HISTORY section of
426 contains a brief discussion of the two algorithms. 425 ssl(8) contains a brief discussion of the DSA and RSA algorithms.
427 426
428 The file ~/.ssh/authorized_keys lists the public keys that are permitted 427 The file ~/.ssh/authorized_keys lists the public keys that are permitted
429 for logging in. When the user logs in, the ssh program tells the server 428 for logging in. When the user logs in, the ssh program tells the server
@@ -433,14 +432,15 @@ AUTHENTICATION
433 432
434 The user creates his/her key pair by running ssh-keygen(1). This stores 433 The user creates his/her key pair by running ssh-keygen(1). This stores
435 the private key in ~/.ssh/identity (protocol 1), ~/.ssh/id_dsa (protocol 434 the private key in ~/.ssh/identity (protocol 1), ~/.ssh/id_dsa (protocol
436 2 DSA), or ~/.ssh/id_rsa (protocol 2 RSA) and stores the public key in 435 2 DSA), ~/.ssh/id_ecdsa (protocol 2 ECDSA), or ~/.ssh/id_rsa (protocol 2
437 ~/.ssh/identity.pub (protocol 1), ~/.ssh/id_dsa.pub (protocol 2 DSA), or 436 RSA) and stores the public key in ~/.ssh/identity.pub (protocol 1),
438 ~/.ssh/id_rsa.pub (protocol 2 RSA) in the user's home directory. The 437 ~/.ssh/id_dsa.pub (protocol 2 DSA), ~/.ssh/id_ecdsa.pub (protocol 2
439 user should then copy the public key to ~/.ssh/authorized_keys in his/her 438 ECDSA), or ~/.ssh/id_rsa.pub (protocol 2 RSA) in the user's home
440 home directory on the remote machine. The authorized_keys file 439 directory. The user should then copy the public key to
441 corresponds to the conventional ~/.rhosts file, and has one key per line, 440 ~/.ssh/authorized_keys in his/her home directory on the remote machine.
442 though the lines can be very long. After this, the user can log in 441 The authorized_keys file corresponds to the conventional ~/.rhosts file,
443 without giving the password. 442 and has one key per line, though the lines can be very long. After this,
443 the user can log in without giving the password.
444 444
445 A variation on public key authentication is available in the form of 445 A variation on public key authentication is available in the form of
446 certificate authentication: instead of a set of public/private keys, 446 certificate authentication: instead of a set of public/private keys,
@@ -763,10 +763,10 @@ FILES
763 for the user, and not accessible by others. 763 for the user, and not accessible by others.
764 764
765 ~/.ssh/authorized_keys 765 ~/.ssh/authorized_keys
766 Lists the public keys (RSA/DSA) that can be used for logging in 766 Lists the public keys (DSA/ECDSA/RSA) that can be used for
767 as this user. The format of this file is described in the 767 logging in as this user. The format of this file is described in
768 sshd(8) manual page. This file is not highly sensitive, but the 768 the sshd(8) manual page. This file is not highly sensitive, but
769 recommended permissions are read/write for the user, and not 769 the recommended permissions are read/write for the user, and not
770 accessible by others. 770 accessible by others.
771 771
772 ~/.ssh/config 772 ~/.ssh/config
@@ -781,6 +781,7 @@ FILES
781 781
782 ~/.ssh/identity 782 ~/.ssh/identity
783 ~/.ssh/id_dsa 783 ~/.ssh/id_dsa
784 ~/.ssh/id_ecdsa
784 ~/.ssh/id_rsa 785 ~/.ssh/id_rsa
785 Contains the private key for authentication. These files contain 786 Contains the private key for authentication. These files contain
786 sensitive data and should be readable by the user but not 787 sensitive data and should be readable by the user but not
@@ -792,6 +793,7 @@ FILES
792 793
793 ~/.ssh/identity.pub 794 ~/.ssh/identity.pub
794 ~/.ssh/id_dsa.pub 795 ~/.ssh/id_dsa.pub
796 ~/.ssh/id_ecdsa.pub
795 ~/.ssh/id_rsa.pub 797 ~/.ssh/id_rsa.pub
796 Contains the public key for authentication. These files are not 798 Contains the public key for authentication. These files are not
797 sensitive and can (but need not) be readable by anyone. 799 sensitive and can (but need not) be readable by anyone.
@@ -822,6 +824,7 @@ FILES
822 824
823 /etc/ssh/ssh_host_key 825 /etc/ssh/ssh_host_key
824 /etc/ssh/ssh_host_dsa_key 826 /etc/ssh/ssh_host_dsa_key
827 /etc/ssh/ssh_host_ecdsa_key
825 /etc/ssh/ssh_host_rsa_key 828 /etc/ssh/ssh_host_rsa_key
826 These three files contain the private parts of the host keys and 829 These three files contain the private parts of the host keys and
827 are used for host-based authentication. If protocol version 1 is 830 are used for host-based authentication. If protocol version 1 is
@@ -842,6 +845,10 @@ FILES
842 just before the user's shell (or command) is started. See the 845 just before the user's shell (or command) is started. See the
843 sshd(8) manual page for more information. 846 sshd(8) manual page for more information.
844 847
848EXIT STATUS
849 ssh exits with the exit status of the remote command or with 255 if an
850 error occurred.
851
845SEE ALSO 852SEE ALSO
846 scp(1), sftp(1), ssh-add(1), ssh-agent(1), ssh-keygen(1), ssh-keyscan(1), 853 scp(1), sftp(1), ssh-add(1), ssh-agent(1), ssh-keygen(1), ssh-keyscan(1),
847 tun(4), hosts.equiv(5), ssh_config(5), ssh-keysign(8), sshd(8) 854 tun(4), hosts.equiv(5), ssh_config(5), ssh-keysign(8), sshd(8)
@@ -874,7 +881,10 @@ SEE ALSO
874 881
875 The Secure Shell (SSH) Public Key File Format, RFC 4716, 2006. 882 The Secure Shell (SSH) Public Key File Format, RFC 4716, 2006.
876 883
877 A. Perrig, D. Song, Hash Visualization: a New Technique to improve 884 Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer,
885 RFC 5656, 2009.
886
887 A. Perrig and D. Song, Hash Visualization: a New Technique to improve
878 Real-World Security, 1999, International Workshop on Cryptographic 888 Real-World Security, 1999, International Workshop on Cryptographic
879 Techniques and E-Commerce (CrypTEC '99). 889 Techniques and E-Commerce (CrypTEC '99).
880 890
@@ -885,4 +895,4 @@ AUTHORS
885 created OpenSSH. Markus Friedl contributed the support for SSH protocol 895 created OpenSSH. Markus Friedl contributed the support for SSH protocol
886 versions 1.5 and 2.0. 896 versions 1.5 and 2.0.
887 897
888OpenBSD 4.8 August 4, 2010 OpenBSD 4.8 898OpenBSD 4.8 November 18, 2010 OpenBSD 4.8