summaryrefslogtreecommitdiff
path: root/ssh.1
diff options
context:
space:
mode:
Diffstat (limited to 'ssh.1')
-rw-r--r--ssh.158
1 files changed, 52 insertions, 6 deletions
diff --git a/ssh.1 b/ssh.1
index 8b5c46c74..1229201da 100644
--- a/ssh.1
+++ b/ssh.1
@@ -34,8 +34,8 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: ssh.1,v 1.270 2007/06/12 13:43:55 jmc Exp $ 37.\" $OpenBSD: ssh.1,v 1.277 2008/07/02 13:47:39 djm Exp $
38.Dd $Mdocdate: June 12 2007 $ 38.Dd $Mdocdate: July 2 2008 $
39.Dt SSH 1 39.Dt SSH 1
40.Os 40.Os
41.Sh NAME 41.Sh NAME
@@ -290,6 +290,15 @@ This implies
290The recommended way to start X11 programs at a remote site is with 290The recommended way to start X11 programs at a remote site is with
291something like 291something like
292.Ic ssh -f host xterm . 292.Ic ssh -f host xterm .
293.Pp
294If the
295.Cm ExitOnForwardFailure
296configuration option is set to
297.Dq yes ,
298then a client started with
299.Fl f
300will wait for all remote port forwards to be successfully established
301before placing itself in the background.
293.It Fl g 302.It Fl g
294Allows remote hosts to connect to local forwarded ports. 303Allows remote hosts to connect to local forwarded ports.
295.It Fl I Ar smartcard_device 304.It Fl I Ar smartcard_device
@@ -498,6 +507,7 @@ For full details of the options listed below, and their possible values, see
498.It User 507.It User
499.It UserKnownHostsFile 508.It UserKnownHostsFile
500.It VerifyHostKeyDNS 509.It VerifyHostKeyDNS
510.It VisualHostKey
501.It XAuthLocation 511.It XAuthLocation
502.El 512.El
503.It Fl p Ar port 513.It Fl p Ar port
@@ -506,7 +516,7 @@ This can be specified on a
506per-host basis in the configuration file. 516per-host basis in the configuration file.
507.It Fl q 517.It Fl q
508Quiet mode. 518Quiet mode.
509Causes all warning and diagnostic messages to be suppressed. 519Causes most warning and diagnostic messages to be suppressed.
510Only fatal errors are displayed. 520Only fatal errors are displayed.
511If a second 521If a second
512.Fl q 522.Fl q
@@ -1035,9 +1045,31 @@ Fingerprints can be determined using
1035.Pp 1045.Pp
1036.Dl $ ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key 1046.Dl $ ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key
1037.Pp 1047.Pp
1038If the fingerprint is already known, 1048If the fingerprint is already known, it can be matched
1039it can be matched and verified, 1049and the key can be accepted or rejected.
1040and the key can be accepted. 1050Because of the difficulty of comparing host keys
1051just by looking at hex strings,
1052there is also support to compare host keys visually,
1053using
1054.Em random art .
1055By setting the
1056.Cm VisualHostKey
1057option to
1058.Dq yes ,
1059a small ASCII graphic gets displayed on every login to a server, no matter
1060if the session itself is interactive or not.
1061By learning the pattern a known server produces, a user can easily
1062find out that the host key has changed when a completely different pattern
1063is displayed.
1064Because these patterns are not unambiguous however, a pattern that looks
1065similar to the pattern remembered only gives a good probability that the
1066host key is the same, not guaranteed proof.
1067.Pp
1068To get a listing of the fingerprints along with their random art for
1069all known hosts, the following command line can be used:
1070.Pp
1071.Dl $ ssh-keygen -lv -f ~/.ssh/known_hosts
1072.Pp
1041If the fingerprint is unknown, 1073If the fingerprint is unknown,
1042an alternative method of verification is available: 1074an alternative method of verification is available:
1043SSH fingerprints verified by DNS. 1075SSH fingerprints verified by DNS.
@@ -1253,6 +1285,13 @@ This file is used in exactly the same way as
1253but allows host-based authentication without permitting login with 1285but allows host-based authentication without permitting login with
1254rlogin/rsh. 1286rlogin/rsh.
1255.Pp 1287.Pp
1288.It ~/.ssh/
1289This directory is the default location for all user-specific configuration
1290and authentication information.
1291There is no general requirement to keep the entire contents of this directory
1292secret, but the recommended permissions are read/write/execute for the user,
1293and not accessible by others.
1294.Pp
1256.It ~/.ssh/authorized_keys 1295.It ~/.ssh/authorized_keys
1257Lists the public keys (RSA/DSA) that can be used for logging in as this user. 1296Lists the public keys (RSA/DSA) that can be used for logging in as this user.
1258The format of this file is described in the 1297The format of this file is described in the
@@ -1438,6 +1477,13 @@ manual page for more information.
1438.%T "The Secure Shell (SSH) Public Key File Format" 1477.%T "The Secure Shell (SSH) Public Key File Format"
1439.%D 2006 1478.%D 2006
1440.Re 1479.Re
1480.Rs
1481.%T "Hash Visualization: a New Technique to improve Real-World Security"
1482.%A A. Perrig
1483.%A D. Song
1484.%D 1999
1485.%O "International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99)"
1486.Re
1441.Sh AUTHORS 1487.Sh AUTHORS
1442OpenSSH is a derivative of the original and free 1488OpenSSH is a derivative of the original and free
1443ssh 1.2.12 release by Tatu Ylonen. 1489ssh 1.2.12 release by Tatu Ylonen.