summaryrefslogtreecommitdiff
path: root/ssh.1
diff options
context:
space:
mode:
Diffstat (limited to 'ssh.1')
-rw-r--r--ssh.132
1 files changed, 24 insertions, 8 deletions
diff --git a/ssh.1 b/ssh.1
index c8892fed4..217886319 100644
--- a/ssh.1
+++ b/ssh.1
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: ssh.1,v 1.356 2015/03/03 06:48:58 djm Exp $ 36.\" $OpenBSD: ssh.1,v 1.358 2015/05/22 05:28:45 djm Exp $
37.Dd $Mdocdate: March 3 2015 $ 37.Dd $Mdocdate: May 22 2015 $
38.Dt SSH 1 38.Dt SSH 1
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -584,9 +584,9 @@ of SSH as a secure transport for other applications (eg.\&
584.Xr sftp 1 ) . 584.Xr sftp 1 ) .
585The subsystem is specified as the remote command. 585The subsystem is specified as the remote command.
586.It Fl T 586.It Fl T
587Disable pseudo-tty allocation. 587Disable pseudo-terminal allocation.
588.It Fl t 588.It Fl t
589Force pseudo-tty allocation. 589Force pseudo-terminal allocation.
590This can be used to execute arbitrary 590This can be used to execute arbitrary
591screen-based programs on a remote machine, which can be very useful, 591screen-based programs on a remote machine, which can be very useful,
592e.g. when implementing menu services. 592e.g. when implementing menu services.
@@ -880,15 +880,26 @@ option can be used to control logins to machines whose
880host key is not known or has changed. 880host key is not known or has changed.
881.Pp 881.Pp
882When the user's identity has been accepted by the server, the server 882When the user's identity has been accepted by the server, the server
883either executes the given command, or logs into the machine and gives 883either executes the given command in a non-interactive session or,
884the user a normal shell on the remote machine. 884if no command has been specified, logs into the machine and gives
885the user a normal shell as an interactive session.
885All communication with 886All communication with
886the remote command or shell will be automatically encrypted. 887the remote command or shell will be automatically encrypted.
887.Pp 888.Pp
888If a pseudo-terminal has been allocated (normal login session), the 889If an interactive session is requested
890.Nm
891by default will only request a pseudo-terminal (pty) for interactive
892sessions when the client has one.
893The flags
894.Fl T
895and
896.Fl t
897can be used to override this behaviour.
898.Pp
899If a pseudo-terminal has been allocated the
889user may use the escape characters noted below. 900user may use the escape characters noted below.
890.Pp 901.Pp
891If no pseudo-tty has been allocated, 902If no pseudo-terminal has been allocated,
892the session is transparent and can be used to reliably transfer binary data. 903the session is transparent and can be used to reliably transfer binary data.
893On most systems, setting the escape character to 904On most systems, setting the escape character to
894.Dq none 905.Dq none
@@ -1099,6 +1110,11 @@ Fingerprints can be determined using
1099.Pp 1110.Pp
1100If the fingerprint is already known, it can be matched 1111If the fingerprint is already known, it can be matched
1101and the key can be accepted or rejected. 1112and the key can be accepted or rejected.
1113If only legacy (MD5) fingerprints for the server are available, the
1114.Xr ssh-keygen 1
1115.Fl E
1116option may be used to downgrade the fingerprint algorithm to match.
1117.Pp
1102Because of the difficulty of comparing host keys 1118Because of the difficulty of comparing host keys
1103just by looking at fingerprint strings, 1119just by looking at fingerprint strings,
1104there is also support to compare host keys visually, 1120there is also support to compare host keys visually,