summaryrefslogtreecommitdiff
path: root/ssh.1
diff options
context:
space:
mode:
Diffstat (limited to 'ssh.1')
-rw-r--r--ssh.158
1 files changed, 52 insertions, 6 deletions
diff --git a/ssh.1 b/ssh.1
index 1bf6b5e1c..1883578f2 100644
--- a/ssh.1
+++ b/ssh.1
@@ -34,8 +34,8 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: ssh.1,v 1.270 2007/06/12 13:43:55 jmc Exp $ 37.\" $OpenBSD: ssh.1,v 1.277 2008/07/02 13:47:39 djm Exp $
38.Dd $Mdocdate: June 12 2007 $ 38.Dd $Mdocdate: July 2 2008 $
39.Dt SSH 1 39.Dt SSH 1
40.Os 40.Os
41.Sh NAME 41.Sh NAME
@@ -290,6 +290,15 @@ This implies
290The recommended way to start X11 programs at a remote site is with 290The recommended way to start X11 programs at a remote site is with
291something like 291something like
292.Ic ssh -f host xterm . 292.Ic ssh -f host xterm .
293.Pp
294If the
295.Cm ExitOnForwardFailure
296configuration option is set to
297.Dq yes ,
298then a client started with
299.Fl f
300will wait for all remote port forwards to be successfully established
301before placing itself in the background.
293.It Fl g 302.It Fl g
294Allows remote hosts to connect to local forwarded ports. 303Allows remote hosts to connect to local forwarded ports.
295.It Fl I Ar smartcard_device 304.It Fl I Ar smartcard_device
@@ -498,6 +507,7 @@ For full details of the options listed below, and their possible values, see
498.It User 507.It User
499.It UserKnownHostsFile 508.It UserKnownHostsFile
500.It VerifyHostKeyDNS 509.It VerifyHostKeyDNS
510.It VisualHostKey
501.It XAuthLocation 511.It XAuthLocation
502.El 512.El
503.It Fl p Ar port 513.It Fl p Ar port
@@ -506,7 +516,7 @@ This can be specified on a
506per-host basis in the configuration file. 516per-host basis in the configuration file.
507.It Fl q 517.It Fl q
508Quiet mode. 518Quiet mode.
509Causes all warning and diagnostic messages to be suppressed. 519Causes most warning and diagnostic messages to be suppressed.
510.It Fl R Xo 520.It Fl R Xo
511.Sm off 521.Sm off
512.Oo Ar bind_address : Oc 522.Oo Ar bind_address : Oc
@@ -1027,9 +1037,31 @@ Fingerprints can be determined using
1027.Pp 1037.Pp
1028.Dl $ ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key 1038.Dl $ ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key
1029.Pp 1039.Pp
1030If the fingerprint is already known, 1040If the fingerprint is already known, it can be matched
1031it can be matched and verified, 1041and the key can be accepted or rejected.
1032and the key can be accepted. 1042Because of the difficulty of comparing host keys
1043just by looking at hex strings,
1044there is also support to compare host keys visually,
1045using
1046.Em random art .
1047By setting the
1048.Cm VisualHostKey
1049option to
1050.Dq yes ,
1051a small ASCII graphic gets displayed on every login to a server, no matter
1052if the session itself is interactive or not.
1053By learning the pattern a known server produces, a user can easily
1054find out that the host key has changed when a completely different pattern
1055is displayed.
1056Because these patterns are not unambiguous however, a pattern that looks
1057similar to the pattern remembered only gives a good probability that the
1058host key is the same, not guaranteed proof.
1059.Pp
1060To get a listing of the fingerprints along with their random art for
1061all known hosts, the following command line can be used:
1062.Pp
1063.Dl $ ssh-keygen -lv -f ~/.ssh/known_hosts
1064.Pp
1033If the fingerprint is unknown, 1065If the fingerprint is unknown,
1034an alternative method of verification is available: 1066an alternative method of verification is available:
1035SSH fingerprints verified by DNS. 1067SSH fingerprints verified by DNS.
@@ -1245,6 +1277,13 @@ This file is used in exactly the same way as
1245but allows host-based authentication without permitting login with 1277but allows host-based authentication without permitting login with
1246rlogin/rsh. 1278rlogin/rsh.
1247.Pp 1279.Pp
1280.It ~/.ssh/
1281This directory is the default location for all user-specific configuration
1282and authentication information.
1283There is no general requirement to keep the entire contents of this directory
1284secret, but the recommended permissions are read/write/execute for the user,
1285and not accessible by others.
1286.Pp
1248.It ~/.ssh/authorized_keys 1287.It ~/.ssh/authorized_keys
1249Lists the public keys (RSA/DSA) that can be used for logging in as this user. 1288Lists the public keys (RSA/DSA) that can be used for logging in as this user.
1250The format of this file is described in the 1289The format of this file is described in the
@@ -1426,6 +1465,13 @@ manual page for more information.
1426.%T "The Secure Shell (SSH) Public Key File Format" 1465.%T "The Secure Shell (SSH) Public Key File Format"
1427.%D 2006 1466.%D 2006
1428.Re 1467.Re
1468.Rs
1469.%T "Hash Visualization: a New Technique to improve Real-World Security"
1470.%A A. Perrig
1471.%A D. Song
1472.%D 1999
1473.%O "International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99)"
1474.Re
1429.Sh AUTHORS 1475.Sh AUTHORS
1430OpenSSH is a derivative of the original and free 1476OpenSSH is a derivative of the original and free
1431ssh 1.2.12 release by Tatu Ylonen. 1477ssh 1.2.12 release by Tatu Ylonen.