diff options
Diffstat (limited to 'ssh.0')
-rw-r--r-- | ssh.0 | 50 |
1 files changed, 33 insertions, 17 deletions
@@ -4,13 +4,13 @@ NAME | |||
4 | ssh M-bM-^@M-^S OpenSSH SSH client (remote login program) | 4 | ssh M-bM-^@M-^S OpenSSH SSH client (remote login program) |
5 | 5 | ||
6 | SYNOPSIS | 6 | SYNOPSIS |
7 | ssh [-46AaCfGgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] | 7 | ssh [-46AaCfGgKkMNnqsTtVvXxYy] [-B bind_interface] [-b bind_address] |
8 | [-D [bind_address:]port] [-E log_file] [-e escape_char] | 8 | [-c cipher_spec] [-D [bind_address:]port] [-E log_file] |
9 | [-F configfile] [-I pkcs11] [-i identity_file] | 9 | [-e escape_char] [-F configfile] [-I pkcs11] [-i identity_file] |
10 | [-J [user@]host[:port]] [-L address] [-l login_name] [-m mac_spec] | 10 | [-J destination] [-L address] [-l login_name] [-m mac_spec] |
11 | [-O ctl_cmd] [-o option] [-p port] [-Q query_option] [-R address] | 11 | [-O ctl_cmd] [-o option] [-p port] [-Q query_option] [-R address] |
12 | [-S ctl_path] [-W host:port] [-w local_tun[:remote_tun]] | 12 | [-S ctl_path] [-W host:port] [-w local_tun[:remote_tun]] destination |
13 | [user@]hostname [command] | 13 | [command] |
14 | 14 | ||
15 | DESCRIPTION | 15 | DESCRIPTION |
16 | ssh (SSH client) is a program for logging into a remote machine and for | 16 | ssh (SSH client) is a program for logging into a remote machine and for |
@@ -19,11 +19,12 @@ DESCRIPTION | |||
19 | network. X11 connections, arbitrary TCP ports and UNIX-domain sockets | 19 | network. X11 connections, arbitrary TCP ports and UNIX-domain sockets |
20 | can also be forwarded over the secure channel. | 20 | can also be forwarded over the secure channel. |
21 | 21 | ||
22 | ssh connects and logs into the specified hostname (with optional user | 22 | ssh connects and logs into the specified destination, which may be |
23 | name). The user must prove his/her identity to the remote machine using | 23 | specified as either [user@]hostname or a URI of the form |
24 | one of several methods (see below). | 24 | ssh://[user@]hostname[:port]. The user must prove his/her identity to |
25 | the remote machine using one of several methods (see below). | ||
25 | 26 | ||
26 | If command is specified, it is executed on the remote host instead of a | 27 | If a command is specified, it is executed on the remote host instead of a |
27 | login shell. | 28 | login shell. |
28 | 29 | ||
29 | The options are as follows: | 30 | The options are as follows: |
@@ -46,6 +47,11 @@ DESCRIPTION | |||
46 | 47 | ||
47 | -a Disables forwarding of the authentication agent connection. | 48 | -a Disables forwarding of the authentication agent connection. |
48 | 49 | ||
50 | -B bind_interface | ||
51 | Bind to the address of bind_interface before attempting to | ||
52 | connect to the destination host. This is only useful on systems | ||
53 | with more than one address. | ||
54 | |||
49 | -b bind_address | 55 | -b bind_address |
50 | Use bind_address on the local machine as the source address of | 56 | Use bind_address on the local machine as the source address of |
51 | the connection. Only useful on systems with more than one | 57 | the connection. Only useful on systems with more than one |
@@ -138,12 +144,12 @@ DESCRIPTION | |||
138 | information from the filename obtained by appending -cert.pub to | 144 | information from the filename obtained by appending -cert.pub to |
139 | identity filenames. | 145 | identity filenames. |
140 | 146 | ||
141 | -J [user@]host[:port] | 147 | -J destination |
142 | Connect to the target host by first making a ssh connection to | 148 | Connect to the target host by first making a ssh connection to |
143 | the jump host and then establishing a TCP forwarding to the | 149 | the jump host described by destination and then establishing a |
144 | ultimate destination from there. Multiple jump hops may be | 150 | TCP forwarding to the ultimate destination from there. Multiple |
145 | specified separated by comma characters. This is a shortcut to | 151 | jump hops may be specified separated by comma characters. This |
146 | specify a ProxyJump configuration directive. | 152 | is a shortcut to specify a ProxyJump configuration directive. |
147 | 153 | ||
148 | -K Enables GSSAPI-based authentication and forwarding (delegation) | 154 | -K Enables GSSAPI-based authentication and forwarding (delegation) |
149 | of GSSAPI credentials to the server. | 155 | of GSSAPI credentials to the server. |
@@ -785,6 +791,16 @@ ENVIRONMENT | |||
785 | command. If the current session has no tty, this | 791 | command. If the current session has no tty, this |
786 | variable is not set. | 792 | variable is not set. |
787 | 793 | ||
794 | SSH_TUNNEL Optionally set by sshd(8) to contain the interface | ||
795 | names assigned if tunnel forwarding was requested | ||
796 | by the client. | ||
797 | |||
798 | SSH_USER_AUTH Optionally set by sshd(8), this variable may | ||
799 | contain a pathname to a file that lists the | ||
800 | authentication methods successfully used when the | ||
801 | session was established, including any public keys | ||
802 | that were used. | ||
803 | |||
788 | TZ This variable is set to indicate the present time | 804 | TZ This variable is set to indicate the present time |
789 | zone if it was set when the daemon was started | 805 | zone if it was set when the daemon was started |
790 | (i.e. the daemon passes the value on to new | 806 | (i.e. the daemon passes the value on to new |
@@ -846,7 +862,7 @@ FILES | |||
846 | ignore a private key file if it is accessible by others. It is | 862 | ignore a private key file if it is accessible by others. It is |
847 | possible to specify a passphrase when generating the key which | 863 | possible to specify a passphrase when generating the key which |
848 | will be used to encrypt the sensitive part of this file using | 864 | will be used to encrypt the sensitive part of this file using |
849 | 3DES. | 865 | AES-128. |
850 | 866 | ||
851 | ~/.ssh/id_dsa.pub | 867 | ~/.ssh/id_dsa.pub |
852 | ~/.ssh/id_ecdsa.pub | 868 | ~/.ssh/id_ecdsa.pub |
@@ -957,4 +973,4 @@ AUTHORS | |||
957 | created OpenSSH. Markus Friedl contributed the support for SSH protocol | 973 | created OpenSSH. Markus Friedl contributed the support for SSH protocol |
958 | versions 1.5 and 2.0. | 974 | versions 1.5 and 2.0. |
959 | 975 | ||
960 | OpenBSD 6.2 September 21, 2017 OpenBSD 6.2 | 976 | OpenBSD 6.2 February 23, 2018 OpenBSD 6.2 |