summaryrefslogtreecommitdiff
path: root/ssh.1
diff options
context:
space:
mode:
Diffstat (limited to 'ssh.1')
-rw-r--r--ssh.135
1 files changed, 24 insertions, 11 deletions
diff --git a/ssh.1 b/ssh.1
index 2606b15b1..c8892fed4 100644
--- a/ssh.1
+++ b/ssh.1
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: ssh.1,v 1.348 2014/07/24 22:57:10 millert Exp $ 36.\" $OpenBSD: ssh.1,v 1.356 2015/03/03 06:48:58 djm Exp $
37.Dd $Mdocdate: July 24 2014 $ 37.Dd $Mdocdate: March 3 2015 $
38.Dt SSH 1 38.Dt SSH 1
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -43,7 +43,7 @@
43.Sh SYNOPSIS 43.Sh SYNOPSIS
44.Nm ssh 44.Nm ssh
45.Bk -words 45.Bk -words
46.Op Fl 1246AaCfgKkMNnqsTtVvXxYy 46.Op Fl 1246AaCfGgKkMNnqsTtVvXxYy
47.Op Fl b Ar bind_address 47.Op Fl b Ar bind_address
48.Op Fl c Ar cipher_spec 48.Op Fl c Ar cipher_spec
49.Op Fl D Oo Ar bind_address : Oc Ns Ar port 49.Op Fl D Oo Ar bind_address : Oc Ns Ar port
@@ -58,7 +58,7 @@
58.Op Fl O Ar ctl_cmd 58.Op Fl O Ar ctl_cmd
59.Op Fl o Ar option 59.Op Fl o Ar option
60.Op Fl p Ar port 60.Op Fl p Ar port
61.Op Fl Q Cm cipher | cipher-auth | mac | kex | key 61.Op Fl Q Cm cipher | cipher-auth | mac | kex | key | protocol-version
62.Op Fl R Oo Ar bind_address : Oc Ns Ar port : Ns Ar host : Ns Ar hostport 62.Op Fl R Oo Ar bind_address : Oc Ns Ar port : Ns Ar host : Ns Ar hostport
63.Op Fl S Ar ctl_path 63.Op Fl S Ar ctl_path
64.Op Fl W Ar host : Ns Ar port 64.Op Fl W Ar host : Ns Ar port
@@ -251,6 +251,14 @@ then a client started with
251.Fl f 251.Fl f
252will wait for all remote port forwards to be successfully established 252will wait for all remote port forwards to be successfully established
253before placing itself in the background. 253before placing itself in the background.
254.It Fl G
255Causes
256.Nm
257to print its configuration after evaluating
258.Cm Host
259and
260.Cm Match
261blocks and exit.
254.It Fl g 262.It Fl g
255Allows remote hosts to connect to local forwarded ports. 263Allows remote hosts to connect to local forwarded ports.
256If used on a multiplexed connection, then this option must be specified 264If used on a multiplexed connection, then this option must be specified
@@ -425,6 +433,7 @@ For full details of the options listed below, and their possible values, see
425.It DynamicForward 433.It DynamicForward
426.It EscapeChar 434.It EscapeChar
427.It ExitOnForwardFailure 435.It ExitOnForwardFailure
436.It FingerprintHash
428.It ForwardAgent 437.It ForwardAgent
429.It ForwardX11 438.It ForwardX11
430.It ForwardX11Timeout 439.It ForwardX11Timeout
@@ -436,6 +445,7 @@ For full details of the options listed below, and their possible values, see
436.It HashKnownHosts 445.It HashKnownHosts
437.It Host 446.It Host
438.It HostbasedAuthentication 447.It HostbasedAuthentication
448.It HostbasedKeyTypes
439.It HostKeyAlgorithms 449.It HostKeyAlgorithms
440.It HostKeyAlias 450.It HostKeyAlias
441.It HostName 451.It HostName
@@ -475,6 +485,7 @@ For full details of the options listed below, and their possible values, see
475.It TCPKeepAlive 485.It TCPKeepAlive
476.It Tunnel 486.It Tunnel
477.It TunnelDevice 487.It TunnelDevice
488.It UpdateHostKeys
478.It UsePrivilegedPort 489.It UsePrivilegedPort
479.It User 490.It User
480.It UserKnownHostsFile 491.It UserKnownHostsFile
@@ -486,7 +497,7 @@ For full details of the options listed below, and their possible values, see
486Port to connect to on the remote host. 497Port to connect to on the remote host.
487This can be specified on a 498This can be specified on a
488per-host basis in the configuration file. 499per-host basis in the configuration file.
489.It Fl Q Cm cipher | cipher-auth | mac | kex | key 500.It Fl Q Cm cipher | cipher-auth | mac | kex | key | protocol-version
490Queries 501Queries
491.Nm 502.Nm
492for the algorithms supported for the specified version 2. 503for the algorithms supported for the specified version 2.
@@ -500,7 +511,9 @@ The available features are:
500.Ar kex 511.Ar kex
501(key exchange algorithms), 512(key exchange algorithms),
502.Ar key 513.Ar key
503(key types). 514(key types) and
515.Ar protocol-version
516(supported SSH protocol versions).
504.It Fl q 517.It Fl q
505Quiet mode. 518Quiet mode.
506Causes most warning and diagnostic messages to be suppressed. 519Causes most warning and diagnostic messages to be suppressed.
@@ -748,7 +761,7 @@ key pair for authentication purposes.
748The server knows the public key, and only the user knows the private key. 761The server knows the public key, and only the user knows the private key.
749.Nm 762.Nm
750implements public key authentication protocol automatically, 763implements public key authentication protocol automatically,
751using one of the DSA, ECDSA, ED25519 or RSA algorithms. 764using one of the DSA, ECDSA, Ed25519 or RSA algorithms.
752Protocol 1 is restricted to using only RSA keys, 765Protocol 1 is restricted to using only RSA keys,
753but protocol 2 may use any. 766but protocol 2 may use any.
754The HISTORY section of 767The HISTORY section of
@@ -780,7 +793,7 @@ This stores the private key in
780.Pa ~/.ssh/id_ecdsa 793.Pa ~/.ssh/id_ecdsa
781(protocol 2 ECDSA), 794(protocol 2 ECDSA),
782.Pa ~/.ssh/id_ed25519 795.Pa ~/.ssh/id_ed25519
783(protocol 2 ED25519), 796(protocol 2 Ed25519),
784or 797or
785.Pa ~/.ssh/id_rsa 798.Pa ~/.ssh/id_rsa
786(protocol 2 RSA) 799(protocol 2 RSA)
@@ -792,7 +805,7 @@ and stores the public key in
792.Pa ~/.ssh/id_ecdsa.pub 805.Pa ~/.ssh/id_ecdsa.pub
793(protocol 2 ECDSA), 806(protocol 2 ECDSA),
794.Pa ~/.ssh/id_ed25519.pub 807.Pa ~/.ssh/id_ed25519.pub
795(protocol 2 ED25519), 808(protocol 2 Ed25519),
796or 809or
797.Pa ~/.ssh/id_rsa.pub 810.Pa ~/.ssh/id_rsa.pub
798(protocol 2 RSA) 811(protocol 2 RSA)
@@ -1087,7 +1100,7 @@ Fingerprints can be determined using
1087If the fingerprint is already known, it can be matched 1100If the fingerprint is already known, it can be matched
1088and the key can be accepted or rejected. 1101and the key can be accepted or rejected.
1089Because of the difficulty of comparing host keys 1102Because of the difficulty of comparing host keys
1090just by looking at hex strings, 1103just by looking at fingerprint strings,
1091there is also support to compare host keys visually, 1104there is also support to compare host keys visually,
1092using 1105using
1093.Em random art . 1106.Em random art .
@@ -1332,7 +1345,7 @@ secret, but the recommended permissions are read/write/execute for the user,
1332and not accessible by others. 1345and not accessible by others.
1333.Pp 1346.Pp
1334.It Pa ~/.ssh/authorized_keys 1347.It Pa ~/.ssh/authorized_keys
1335Lists the public keys (DSA, ECDSA, ED25519, RSA) 1348Lists the public keys (DSA, ECDSA, Ed25519, RSA)
1336that can be used for logging in as this user. 1349that can be used for logging in as this user.
1337The format of this file is described in the 1350The format of this file is described in the
1338.Xr sshd 8 1351.Xr sshd 8