diff options
Diffstat (limited to 'ssh.0')
-rw-r--r-- | ssh.0 | 68 |
1 files changed, 39 insertions, 29 deletions
@@ -135,15 +135,15 @@ DESCRIPTION | |||
135 | with a PKCS#11 token providing the user's private RSA key. | 135 | with a PKCS#11 token providing the user's private RSA key. |
136 | 136 | ||
137 | -i identity_file | 137 | -i identity_file |
138 | Selects a file from which the identity (private key) for RSA or | 138 | Selects a file from which the identity (private key) for public |
139 | DSA authentication is read. The default is ~/.ssh/identity for | 139 | key authentication is read. The default is ~/.ssh/identity for |
140 | protocol version 1, and ~/.ssh/id_rsa and ~/.ssh/id_dsa for | 140 | protocol version 1, and ~/.ssh/id_dsa, ~/.ssh/id_ecdsa and |
141 | protocol version 2. Identity files may also be specified on a | 141 | ~/.ssh/id_rsa for protocol version 2. Identity files may also be |
142 | per-host basis in the configuration file. It is possible to have | 142 | specified on a per-host basis in the configuration file. It is |
143 | multiple -i options (and multiple identities specified in | 143 | possible to have multiple -i options (and multiple identities |
144 | configuration files). ssh will also try to load certificate | 144 | specified in configuration files). ssh will also try to load |
145 | information from the filename obtained by appending -cert.pub to | 145 | certificate information from the filename obtained by appending |
146 | identity filenames. | 146 | -cert.pub to identity filenames. |
147 | 147 | ||
148 | -K Enables GSSAPI-based authentication and forwarding (delegation) | 148 | -K Enables GSSAPI-based authentication and forwarding (delegation) |
149 | of GSSAPI credentials to the server. | 149 | of GSSAPI credentials to the server. |
@@ -244,7 +244,9 @@ DESCRIPTION | |||
244 | HostName | 244 | HostName |
245 | IdentityFile | 245 | IdentityFile |
246 | IdentitiesOnly | 246 | IdentitiesOnly |
247 | IPQoS | ||
247 | KbdInteractiveDevices | 248 | KbdInteractiveDevices |
249 | KexAlgorithms | ||
248 | LocalCommand | 250 | LocalCommand |
249 | LocalForward | 251 | LocalForward |
250 | LogLevel | 252 | LogLevel |
@@ -380,9 +382,6 @@ DESCRIPTION | |||
380 | configuration file and a system-wide configuration file. The file format | 382 | configuration file and a system-wide configuration file. The file format |
381 | and configuration options are described in ssh_config(5). | 383 | and configuration options are described in ssh_config(5). |
382 | 384 | ||
383 | ssh exits with the exit status of the remote command or with 255 if an | ||
384 | error occurred. | ||
385 | |||
386 | AUTHENTICATION | 385 | AUTHENTICATION |
387 | The OpenSSH SSH client supports SSH protocols 1 and 2. The default is to | 386 | The OpenSSH SSH client supports SSH protocols 1 and 2. The default is to |
388 | use protocol 2 only, though this can be changed via the Protocol option | 387 | use protocol 2 only, though this can be changed via the Protocol option |
@@ -421,9 +420,9 @@ AUTHENTICATION | |||
421 | creates a public/private key pair for authentication purposes. The | 420 | creates a public/private key pair for authentication purposes. The |
422 | server knows the public key, and only the user knows the private key. | 421 | server knows the public key, and only the user knows the private key. |
423 | ssh implements public key authentication protocol automatically, using | 422 | ssh implements public key authentication protocol automatically, using |
424 | either the RSA or DSA algorithms. Protocol 1 is restricted to using only | 423 | one of the DSA, ECDSA or RSA algorithms. Protocol 1 is restricted to |
425 | RSA keys, but protocol 2 may use either. The HISTORY section of ssl(8) | 424 | using only RSA keys, but protocol 2 may use any. The HISTORY section of |
426 | contains a brief discussion of the two algorithms. | 425 | ssl(8) contains a brief discussion of the DSA and RSA algorithms. |
427 | 426 | ||
428 | The file ~/.ssh/authorized_keys lists the public keys that are permitted | 427 | The file ~/.ssh/authorized_keys lists the public keys that are permitted |
429 | for logging in. When the user logs in, the ssh program tells the server | 428 | for logging in. When the user logs in, the ssh program tells the server |
@@ -433,14 +432,15 @@ AUTHENTICATION | |||
433 | 432 | ||
434 | The user creates his/her key pair by running ssh-keygen(1). This stores | 433 | The user creates his/her key pair by running ssh-keygen(1). This stores |
435 | the private key in ~/.ssh/identity (protocol 1), ~/.ssh/id_dsa (protocol | 434 | the private key in ~/.ssh/identity (protocol 1), ~/.ssh/id_dsa (protocol |
436 | 2 DSA), or ~/.ssh/id_rsa (protocol 2 RSA) and stores the public key in | 435 | 2 DSA), ~/.ssh/id_ecdsa (protocol 2 ECDSA), or ~/.ssh/id_rsa (protocol 2 |
437 | ~/.ssh/identity.pub (protocol 1), ~/.ssh/id_dsa.pub (protocol 2 DSA), or | 436 | RSA) and stores the public key in ~/.ssh/identity.pub (protocol 1), |
438 | ~/.ssh/id_rsa.pub (protocol 2 RSA) in the user's home directory. The | 437 | ~/.ssh/id_dsa.pub (protocol 2 DSA), ~/.ssh/id_ecdsa.pub (protocol 2 |
439 | user should then copy the public key to ~/.ssh/authorized_keys in his/her | 438 | ECDSA), or ~/.ssh/id_rsa.pub (protocol 2 RSA) in the user's home |
440 | home directory on the remote machine. The authorized_keys file | 439 | directory. The user should then copy the public key to |
441 | corresponds to the conventional ~/.rhosts file, and has one key per line, | 440 | ~/.ssh/authorized_keys in his/her home directory on the remote machine. |
442 | though the lines can be very long. After this, the user can log in | 441 | The authorized_keys file corresponds to the conventional ~/.rhosts file, |
443 | without giving the password. | 442 | and has one key per line, though the lines can be very long. After this, |
443 | the user can log in without giving the password. | ||
444 | 444 | ||
445 | A variation on public key authentication is available in the form of | 445 | A variation on public key authentication is available in the form of |
446 | certificate authentication: instead of a set of public/private keys, | 446 | certificate authentication: instead of a set of public/private keys, |
@@ -763,10 +763,10 @@ FILES | |||
763 | for the user, and not accessible by others. | 763 | for the user, and not accessible by others. |
764 | 764 | ||
765 | ~/.ssh/authorized_keys | 765 | ~/.ssh/authorized_keys |
766 | Lists the public keys (RSA/DSA) that can be used for logging in | 766 | Lists the public keys (DSA/ECDSA/RSA) that can be used for |
767 | as this user. The format of this file is described in the | 767 | logging in as this user. The format of this file is described in |
768 | sshd(8) manual page. This file is not highly sensitive, but the | 768 | the sshd(8) manual page. This file is not highly sensitive, but |
769 | recommended permissions are read/write for the user, and not | 769 | the recommended permissions are read/write for the user, and not |
770 | accessible by others. | 770 | accessible by others. |
771 | 771 | ||
772 | ~/.ssh/config | 772 | ~/.ssh/config |
@@ -781,6 +781,7 @@ FILES | |||
781 | 781 | ||
782 | ~/.ssh/identity | 782 | ~/.ssh/identity |
783 | ~/.ssh/id_dsa | 783 | ~/.ssh/id_dsa |
784 | ~/.ssh/id_ecdsa | ||
784 | ~/.ssh/id_rsa | 785 | ~/.ssh/id_rsa |
785 | Contains the private key for authentication. These files contain | 786 | Contains the private key for authentication. These files contain |
786 | sensitive data and should be readable by the user but not | 787 | sensitive data and should be readable by the user but not |
@@ -792,6 +793,7 @@ FILES | |||
792 | 793 | ||
793 | ~/.ssh/identity.pub | 794 | ~/.ssh/identity.pub |
794 | ~/.ssh/id_dsa.pub | 795 | ~/.ssh/id_dsa.pub |
796 | ~/.ssh/id_ecdsa.pub | ||
795 | ~/.ssh/id_rsa.pub | 797 | ~/.ssh/id_rsa.pub |
796 | Contains the public key for authentication. These files are not | 798 | Contains the public key for authentication. These files are not |
797 | sensitive and can (but need not) be readable by anyone. | 799 | sensitive and can (but need not) be readable by anyone. |
@@ -822,6 +824,7 @@ FILES | |||
822 | 824 | ||
823 | /etc/ssh/ssh_host_key | 825 | /etc/ssh/ssh_host_key |
824 | /etc/ssh/ssh_host_dsa_key | 826 | /etc/ssh/ssh_host_dsa_key |
827 | /etc/ssh/ssh_host_ecdsa_key | ||
825 | /etc/ssh/ssh_host_rsa_key | 828 | /etc/ssh/ssh_host_rsa_key |
826 | These three files contain the private parts of the host keys and | 829 | These three files contain the private parts of the host keys and |
827 | are used for host-based authentication. If protocol version 1 is | 830 | are used for host-based authentication. If protocol version 1 is |
@@ -842,6 +845,10 @@ FILES | |||
842 | just before the user's shell (or command) is started. See the | 845 | just before the user's shell (or command) is started. See the |
843 | sshd(8) manual page for more information. | 846 | sshd(8) manual page for more information. |
844 | 847 | ||
848 | EXIT STATUS | ||
849 | ssh exits with the exit status of the remote command or with 255 if an | ||
850 | error occurred. | ||
851 | |||
845 | SEE ALSO | 852 | SEE ALSO |
846 | scp(1), sftp(1), ssh-add(1), ssh-agent(1), ssh-keygen(1), ssh-keyscan(1), | 853 | scp(1), sftp(1), ssh-add(1), ssh-agent(1), ssh-keygen(1), ssh-keyscan(1), |
847 | tun(4), hosts.equiv(5), ssh_config(5), ssh-keysign(8), sshd(8) | 854 | tun(4), hosts.equiv(5), ssh_config(5), ssh-keysign(8), sshd(8) |
@@ -874,7 +881,10 @@ SEE ALSO | |||
874 | 881 | ||
875 | The Secure Shell (SSH) Public Key File Format, RFC 4716, 2006. | 882 | The Secure Shell (SSH) Public Key File Format, RFC 4716, 2006. |
876 | 883 | ||
877 | A. Perrig, D. Song, Hash Visualization: a New Technique to improve | 884 | Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer, |
885 | RFC 5656, 2009. | ||
886 | |||
887 | A. Perrig and D. Song, Hash Visualization: a New Technique to improve | ||
878 | Real-World Security, 1999, International Workshop on Cryptographic | 888 | Real-World Security, 1999, International Workshop on Cryptographic |
879 | Techniques and E-Commerce (CrypTEC '99). | 889 | Techniques and E-Commerce (CrypTEC '99). |
880 | 890 | ||
@@ -885,4 +895,4 @@ AUTHORS | |||
885 | created OpenSSH. Markus Friedl contributed the support for SSH protocol | 895 | created OpenSSH. Markus Friedl contributed the support for SSH protocol |
886 | versions 1.5 and 2.0. | 896 | versions 1.5 and 2.0. |
887 | 897 | ||
888 | OpenBSD 4.8 August 4, 2010 OpenBSD 4.8 | 898 | OpenBSD 4.8 November 18, 2010 OpenBSD 4.8 |