summaryrefslogtreecommitdiff
path: root/ssh.1
diff options
context:
space:
mode:
Diffstat (limited to 'ssh.1')
-rw-r--r--ssh.155
1 files changed, 36 insertions, 19 deletions
diff --git a/ssh.1 b/ssh.1
index 63b057336..986802598 100644
--- a/ssh.1
+++ b/ssh.1
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: ssh.1,v 1.334 2013/07/18 01:12:26 djm Exp $ 36.\" $OpenBSD: ssh.1,v 1.343 2013/12/07 11:58:46 naddy Exp $
37.Dd $Mdocdate: July 18 2013 $ 37.Dd $Mdocdate: December 7 2013 $
38.Dt SSH 1 38.Dt SSH 1
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -58,6 +58,7 @@
58.Op Fl O Ar ctl_cmd 58.Op Fl O Ar ctl_cmd
59.Op Fl o Ar option 59.Op Fl o Ar option
60.Op Fl p Ar port 60.Op Fl p Ar port
61.Op Fl Q Cm cipher | cipher-auth | mac | kex | key
61.Op Fl R Oo Ar bind_address : Oc Ns Ar port : Ns Ar host : Ns Ar hostport 62.Op Fl R Oo Ar bind_address : Oc Ns Ar port : Ns Ar host : Ns Ar hostport
62.Op Fl S Ar ctl_path 63.Op Fl S Ar ctl_path
63.Op Fl W Ar host : Ns Ar port 64.Op Fl W Ar host : Ns Ar port
@@ -65,8 +66,6 @@
65.Oo Ar user Ns @ Oc Ns Ar hostname 66.Oo Ar user Ns @ Oc Ns Ar hostname
66.Op Ar command 67.Op Ar command
67.Ek 68.Ek
68.Nm
69.Fl Q Ar protocol_feature
70.Sh DESCRIPTION 69.Sh DESCRIPTION
71.Nm 70.Nm
72(SSH client) is a program for logging into a remote machine and for 71(SSH client) is a program for logging into a remote machine and for
@@ -280,7 +279,8 @@ The default is
280.Pa ~/.ssh/identity 279.Pa ~/.ssh/identity
281for protocol version 1, and 280for protocol version 1, and
282.Pa ~/.ssh/id_dsa , 281.Pa ~/.ssh/id_dsa ,
283.Pa ~/.ssh/id_ecdsa 282.Pa ~/.ssh/id_ecdsa ,
283.Pa ~/.ssh/id_ed25519
284and 284and
285.Pa ~/.ssh/id_rsa 285.Pa ~/.ssh/id_rsa
286for protocol version 2. 286for protocol version 2.
@@ -417,6 +417,11 @@ For full details of the options listed below, and their possible values, see
417.It AddressFamily 417.It AddressFamily
418.It BatchMode 418.It BatchMode
419.It BindAddress 419.It BindAddress
420.It CanonicalDomains
421.It CanonicalizeFallbackLocal
422.It CanonicalizeHostname
423.It CanonicalizeMaxDots
424.It CanonicalizePermittedCNAMEs
420.It ChallengeResponseAuthentication 425.It ChallengeResponseAuthentication
421.It CheckHostIP 426.It CheckHostIP
422.It Cipher 427.It Cipher
@@ -456,6 +461,7 @@ For full details of the options listed below, and their possible values, see
456.It LocalForward 461.It LocalForward
457.It LogLevel 462.It LogLevel
458.It MACs 463.It MACs
464.It Match
459.It NoHostAuthenticationForLocalhost 465.It NoHostAuthenticationForLocalhost
460.It NumberOfPasswordPrompts 466.It NumberOfPasswordPrompts
461.It PasswordAuthentication 467.It PasswordAuthentication
@@ -465,6 +471,7 @@ For full details of the options listed below, and their possible values, see
465.It PreferredAuthentications 471.It PreferredAuthentications
466.It Protocol 472.It Protocol
467.It ProxyCommand 473.It ProxyCommand
474.It ProxyUseFdpass
468.It PubkeyAuthentication 475.It PubkeyAuthentication
469.It RekeyLimit 476.It RekeyLimit
470.It RemoteForward 477.It RemoteForward
@@ -489,21 +496,21 @@ For full details of the options listed below, and their possible values, see
489Port to connect to on the remote host. 496Port to connect to on the remote host.
490This can be specified on a 497This can be specified on a
491per-host basis in the configuration file. 498per-host basis in the configuration file.
492.It Fl Q Ar protocol_feature 499.It Fl Q Cm cipher | cipher-auth | mac | kex | key
493Queries 500Queries
494.Nm 501.Nm
495for the algorithms supported for the specified version 2 502for the algorithms supported for the specified version 2.
496.Ar protocol_feature . 503The available features are:
497The queriable features are: 504.Ar cipher
498.Dq cipher
499(supported symmetric ciphers), 505(supported symmetric ciphers),
500.Dq MAC 506.Ar cipher-auth
507(supported symmetric ciphers that support authenticated encryption),
508.Ar mac
501(supported message integrity codes), 509(supported message integrity codes),
502.Dq KEX 510.Ar kex
503(key exchange algorithms), 511(key exchange algorithms),
504.Dq key 512.Ar key
505(key types). 513(key types).
506Protocol features are treated case-insensitively.
507.It Fl q 514.It Fl q
508Quiet mode. 515Quiet mode.
509Causes most warning and diagnostic messages to be suppressed. 516Causes most warning and diagnostic messages to be suppressed.
@@ -751,7 +758,7 @@ key pair for authentication purposes.
751The server knows the public key, and only the user knows the private key. 758The server knows the public key, and only the user knows the private key.
752.Nm 759.Nm
753implements public key authentication protocol automatically, 760implements public key authentication protocol automatically,
754using one of the DSA, ECDSA or RSA algorithms. 761using one of the DSA, ECDSA, ED25519 or RSA algorithms.
755Protocol 1 is restricted to using only RSA keys, 762Protocol 1 is restricted to using only RSA keys,
756but protocol 2 may use any. 763but protocol 2 may use any.
757The HISTORY section of 764The HISTORY section of
@@ -782,6 +789,8 @@ This stores the private key in
782(protocol 2 DSA), 789(protocol 2 DSA),
783.Pa ~/.ssh/id_ecdsa 790.Pa ~/.ssh/id_ecdsa
784(protocol 2 ECDSA), 791(protocol 2 ECDSA),
792.Pa ~/.ssh/id_ed25519
793(protocol 2 ED25519),
785or 794or
786.Pa ~/.ssh/id_rsa 795.Pa ~/.ssh/id_rsa
787(protocol 2 RSA) 796(protocol 2 RSA)
@@ -792,6 +801,8 @@ and stores the public key in
792(protocol 2 DSA), 801(protocol 2 DSA),
793.Pa ~/.ssh/id_ecdsa.pub 802.Pa ~/.ssh/id_ecdsa.pub
794(protocol 2 ECDSA), 803(protocol 2 ECDSA),
804.Pa ~/.ssh/id_ed25519.pub
805(protocol 2 ED25519),
795or 806or
796.Pa ~/.ssh/id_rsa.pub 807.Pa ~/.ssh/id_rsa.pub
797(protocol 2 RSA) 808(protocol 2 RSA)
@@ -831,9 +842,12 @@ text, and prompts for a response.
831Protocol 2 allows multiple challenges and responses; 842Protocol 2 allows multiple challenges and responses;
832protocol 1 is restricted to just one challenge/response. 843protocol 1 is restricted to just one challenge/response.
833Examples of challenge-response authentication include 844Examples of challenge-response authentication include
834BSD Authentication (see 845.Bx
846Authentication (see
835.Xr login.conf 5 ) 847.Xr login.conf 5 )
836and PAM (some non-OpenBSD systems). 848and PAM (some
849.Pf non- Ox
850systems).
837.Pp 851.Pp
838Finally, if other authentication methods fail, 852Finally, if other authentication methods fail,
839.Nm 853.Nm
@@ -1328,8 +1342,8 @@ secret, but the recommended permissions are read/write/execute for the user,
1328and not accessible by others. 1342and not accessible by others.
1329.Pp 1343.Pp
1330.It Pa ~/.ssh/authorized_keys 1344.It Pa ~/.ssh/authorized_keys
1331Lists the public keys (DSA/ECDSA/RSA) that can be used for logging in as 1345Lists the public keys (DSA, ECDSA, ED25519, RSA)
1332this user. 1346that can be used for logging in as this user.
1333The format of this file is described in the 1347The format of this file is described in the
1334.Xr sshd 8 1348.Xr sshd 8
1335manual page. 1349manual page.
@@ -1353,6 +1367,7 @@ above.
1353.It Pa ~/.ssh/identity 1367.It Pa ~/.ssh/identity
1354.It Pa ~/.ssh/id_dsa 1368.It Pa ~/.ssh/id_dsa
1355.It Pa ~/.ssh/id_ecdsa 1369.It Pa ~/.ssh/id_ecdsa
1370.It Pa ~/.ssh/id_ed25519
1356.It Pa ~/.ssh/id_rsa 1371.It Pa ~/.ssh/id_rsa
1357Contains the private key for authentication. 1372Contains the private key for authentication.
1358These files 1373These files
@@ -1367,6 +1382,7 @@ sensitive part of this file using 3DES.
1367.It Pa ~/.ssh/identity.pub 1382.It Pa ~/.ssh/identity.pub
1368.It Pa ~/.ssh/id_dsa.pub 1383.It Pa ~/.ssh/id_dsa.pub
1369.It Pa ~/.ssh/id_ecdsa.pub 1384.It Pa ~/.ssh/id_ecdsa.pub
1385.It Pa ~/.ssh/id_ed25519.pub
1370.It Pa ~/.ssh/id_rsa.pub 1386.It Pa ~/.ssh/id_rsa.pub
1371Contains the public key for authentication. 1387Contains the public key for authentication.
1372These files are not 1388These files are not
@@ -1406,6 +1422,7 @@ The file format and configuration options are described in
1406.It Pa /etc/ssh/ssh_host_key 1422.It Pa /etc/ssh/ssh_host_key
1407.It Pa /etc/ssh/ssh_host_dsa_key 1423.It Pa /etc/ssh/ssh_host_dsa_key
1408.It Pa /etc/ssh/ssh_host_ecdsa_key 1424.It Pa /etc/ssh/ssh_host_ecdsa_key
1425.It Pa /etc/ssh/ssh_host_ed25519_key
1409.It Pa /etc/ssh/ssh_host_rsa_key 1426.It Pa /etc/ssh/ssh_host_rsa_key
1410These files contain the private parts of the host keys 1427These files contain the private parts of the host keys
1411and are used for host-based authentication. 1428and are used for host-based authentication.