summaryrefslogtreecommitdiff
path: root/ssh.1
diff options
context:
space:
mode:
Diffstat (limited to 'ssh.1')
-rw-r--r--ssh.134
1 files changed, 20 insertions, 14 deletions
diff --git a/ssh.1 b/ssh.1
index 27808b1f3..fd822bb3d 100644
--- a/ssh.1
+++ b/ssh.1
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: ssh.1,v 1.167 2002/09/27 15:46:21 stevesk Exp $ 37.\" $OpenBSD: ssh.1,v 1.168 2003/03/28 10:11:43 jmc Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSH 1 39.Dt SSH 1
40.Os 40.Os
@@ -48,6 +48,7 @@
48.Op Ar command 48.Op Ar command
49.Pp 49.Pp
50.Nm ssh 50.Nm ssh
51.Bk -words
51.Op Fl afgknqstvxACNTX1246 52.Op Fl afgknqstvxACNTX1246
52.Op Fl b Ar bind_address 53.Op Fl b Ar bind_address
53.Op Fl c Ar cipher_spec 54.Op Fl c Ar cipher_spec
@@ -66,6 +67,8 @@
66.Sm on 67.Sm on
67.Xc 68.Xc
68.Oc 69.Oc
70.Ek
71.Bk -words
69.Oo Fl R Xo 72.Oo Fl R Xo
70.Sm off 73.Sm off
71.Ar port : 74.Ar port :
@@ -77,6 +80,7 @@
77.Op Fl D Ar port 80.Op Fl D Ar port
78.Ar hostname | user@hostname 81.Ar hostname | user@hostname
79.Op Ar command 82.Op Ar command
83.Ek
80.Sh DESCRIPTION 84.Sh DESCRIPTION
81.Nm 85.Nm
82(SSH client) is a program for logging into a remote machine and for 86(SSH client) is a program for logging into a remote machine and for
@@ -361,7 +365,7 @@ variable is set to
361.Fl A 365.Fl A
362and 366and
363.Fl a 367.Fl a
364options described later) and 368options described later) and
365the user is using an authentication agent, the connection to the agent 369the user is using an authentication agent, the connection to the agent
366is automatically forwarded to the remote side. 370is automatically forwarded to the remote side.
367.Pp 371.Pp
@@ -403,10 +407,11 @@ Disables forwarding of the authentication agent connection.
403Enables forwarding of the authentication agent connection. 407Enables forwarding of the authentication agent connection.
404This can also be specified on a per-host basis in a configuration file. 408This can also be specified on a per-host basis in a configuration file.
405.Pp 409.Pp
406Agent forwarding should be enabled with caution. Users with the 410Agent forwarding should be enabled with caution.
407ability to bypass file permissions on the remote host (for the agent's 411Users with the ability to bypass file permissions on the remote host
408Unix-domain socket) can access the local agent through the forwarded 412(for the agent's Unix-domain socket)
409connection. An attacker cannot obtain key material from the agent, 413can access the local agent through the forwarded connection.
414An attacker cannot obtain key material from the agent,
410however they can perform operations on the keys that enable them to 415however they can perform operations on the keys that enable them to
411authenticate using the identities loaded into the agent. 416authenticate using the identities loaded into the agent.
412.It Fl b Ar bind_address 417.It Fl b Ar bind_address
@@ -428,8 +433,8 @@ is only supported in the
428client for interoperability with legacy protocol 1 implementations 433client for interoperability with legacy protocol 1 implementations
429that do not support the 434that do not support the
430.Ar 3des 435.Ar 3des
431cipher. Its use is strongly discouraged due to cryptographic 436cipher.
432weaknesses. 437Its use is strongly discouraged due to cryptographic weaknesses.
433.It Fl c Ar cipher_spec 438.It Fl c Ar cipher_spec
434Additionally, for protocol version 2 a comma-separated list of ciphers can 439Additionally, for protocol version 2 a comma-separated list of ciphers can
435be specified in order of preference. 440be specified in order of preference.
@@ -566,11 +571,11 @@ Disables X11 forwarding.
566Enables X11 forwarding. 571Enables X11 forwarding.
567This can also be specified on a per-host basis in a configuration file. 572This can also be specified on a per-host basis in a configuration file.
568.Pp 573.Pp
569X11 forwarding should be enabled with caution. Users with the ability 574X11 forwarding should be enabled with caution.
570to bypass file permissions on the remote host (for the user's X 575Users with the ability to bypass file permissions on the remote host
571authorization database) can access the local X11 display through the 576(for the user's X authorization database)
572forwarded connection. An attacker may then be able to perform 577can access the local X11 display through the forwarded connection.
573activities such as keystroke monitoring. 578An attacker may then be able to perform activities such as keystroke monitoring.
574.It Fl C 579.It Fl C
575Requests compression of all data (including stdin, stdout, stderr, and 580Requests compression of all data (including stdin, stdout, stderr, and
576data for forwarded X11 and TCP/IP connections). 581data for forwarded X11 and TCP/IP connections).
@@ -637,7 +642,8 @@ This works by allocating a socket to listen to
637on the local side, and whenever a connection is made to this port, the 642on the local side, and whenever a connection is made to this port, the
638connection is forwarded over the secure channel, and the application 643connection is forwarded over the secure channel, and the application
639protocol is then used to determine where to connect to from the 644protocol is then used to determine where to connect to from the
640remote machine. Currently the SOCKS4 protocol is supported, and 645remote machine.
646Currently the SOCKS4 protocol is supported, and
641.Nm 647.Nm
642will act as a SOCKS4 server. 648will act as a SOCKS4 server.
643Only root can forward privileged ports. 649Only root can forward privileged ports.