summaryrefslogtreecommitdiff
path: root/ssh.1
diff options
context:
space:
mode:
Diffstat (limited to 'ssh.1')
-rw-r--r--ssh.169
1 files changed, 48 insertions, 21 deletions
diff --git a/ssh.1 b/ssh.1
index 6c6271ee4..3f815b8e7 100644
--- a/ssh.1
+++ b/ssh.1
@@ -34,8 +34,8 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: ssh.1,v 1.283 2009/03/19 15:15:09 jmc Exp $ 37.\" $OpenBSD: ssh.1,v 1.302 2010/03/05 10:28:21 djm Exp $
38.Dd $Mdocdate: March 19 2009 $ 38.Dd $Mdocdate: March 5 2010 $
39.Dt SSH 1 39.Dt SSH 1
40.Os 40.Os
41.Sh NAME 41.Sh NAME
@@ -54,6 +54,7 @@
54.Oc 54.Oc
55.Op Fl e Ar escape_char 55.Op Fl e Ar escape_char
56.Op Fl F Ar configfile 56.Op Fl F Ar configfile
57.Op Fl I Ar pkcs11
57.Bk -words 58.Bk -words
58.Op Fl i Ar identity_file 59.Op Fl i Ar identity_file
59.Ek 60.Ek
@@ -77,12 +78,11 @@
77.Sm on 78.Sm on
78.Oc 79.Oc
79.Op Fl S Ar ctl_path 80.Op Fl S Ar ctl_path
80.Bk -words 81.Op Fl W Ar host : Ns Ar port
81.Oo Fl w Ar local_tun Ns 82.Oo Fl w Ar local_tun Ns
82.Op : Ns Ar remote_tun Oc 83.Op : Ns Ar remote_tun Oc
83.Oo Ar user Ns @ Oc Ns Ar hostname 84.Oo Ar user Ns @ Oc Ns Ar hostname
84.Op Ar command 85.Op Ar command
85.Ek
86.Sh DESCRIPTION 86.Sh DESCRIPTION
87.Nm 87.Nm
88(SSH client) is a program for logging into a remote machine and for 88(SSH client) is a program for logging into a remote machine and for
@@ -132,8 +132,9 @@ This can also be specified on a per-host basis in a configuration file.
132.Pp 132.Pp
133Agent forwarding should be enabled with caution. 133Agent forwarding should be enabled with caution.
134Users with the ability to bypass file permissions on the remote host 134Users with the ability to bypass file permissions on the remote host
135(for the agent's Unix-domain socket) 135(for the agent's
136can access the local agent through the forwarded connection. 136.Ux Ns -domain
137socket) can access the local agent through the forwarded connection.
137An attacker cannot obtain key material from the agent, 138An attacker cannot obtain key material from the agent,
138however they can perform operations on the keys that enable them to 139however they can perform operations on the keys that enable them to
139authenticate using the identities loaded into the agent. 140authenticate using the identities loaded into the agent.
@@ -284,13 +285,11 @@ will wait for all remote port forwards to be successfully established
284before placing itself in the background. 285before placing itself in the background.
285.It Fl g 286.It Fl g
286Allows remote hosts to connect to local forwarded ports. 287Allows remote hosts to connect to local forwarded ports.
287.It Fl I Ar smartcard_device 288.It Fl I Ar pkcs11
288Specify the device 289Specify the PKCS#11 shared library
289.Nm 290.Nm
290should use to communicate with a smartcard used for storing the user's 291should use to communicate with a PKCS#11 token providing the user's
291private RSA key. 292private RSA key.
292This option is only available if support for smartcard devices
293is compiled in (default is no support).
294.It Fl i Ar identity_file 293.It Fl i Ar identity_file
295Selects a file from which the identity (private key) for 294Selects a file from which the identity (private key) for
296RSA or DSA authentication is read. 295RSA or DSA authentication is read.
@@ -307,6 +306,11 @@ It is possible to have multiple
307.Fl i 306.Fl i
308options (and multiple identities specified in 307options (and multiple identities specified in
309configuration files). 308configuration files).
309.Nm
310will also try to load certificate information from the filename obtained
311by appending
312.Pa -cert.pub
313to identity filenames.
310.It Fl K 314.It Fl K
311Enables GSSAPI-based authentication and forwarding (delegation) of GSSAPI 315Enables GSSAPI-based authentication and forwarding (delegation) of GSSAPI
312credentials to the server. 316credentials to the server.
@@ -469,6 +473,7 @@ For full details of the options listed below, and their possible values, see
469.It NumberOfPasswordPrompts 473.It NumberOfPasswordPrompts
470.It PasswordAuthentication 474.It PasswordAuthentication
471.It PermitLocalCommand 475.It PermitLocalCommand
476.It PKCS11Provider
472.It Port 477.It Port
473.It PreferredAuthentications 478.It PreferredAuthentications
474.It Protocol 479.It Protocol
@@ -481,7 +486,6 @@ For full details of the options listed below, and their possible values, see
481.It SendEnv 486.It SendEnv
482.It ServerAliveInterval 487.It ServerAliveInterval
483.It ServerAliveCountMax 488.It ServerAliveCountMax
484.It SmartcardDevice
485.It StrictHostKeyChecking 489.It StrictHostKeyChecking
486.It TCPKeepAlive 490.It TCPKeepAlive
487.It Tunnel 491.It Tunnel
@@ -593,6 +597,19 @@ Multiple
593.Fl v 597.Fl v
594options increase the verbosity. 598options increase the verbosity.
595The maximum is 3. 599The maximum is 3.
600.It Fl W Ar host : Ns Ar port
601Requests that standard input and output on the client be forwarded to
602.Ar host
603on
604.Ar port
605over the secure channel.
606Implies
607.Fl N ,
608.Fl T ,
609.Cm ExitOnForwardFailure
610and
611.Cm ClearAllForwardings
612and works with Protocol version 2 only.
596.It Fl w Xo 613.It Fl w Xo
597.Ar local_tun Ns Op : Ns Ar remote_tun 614.Ar local_tun Ns Op : Ns Ar remote_tun
598.Xc 615.Xc
@@ -666,20 +683,18 @@ exits with the exit status of the remote command or with 255
666if an error occurred. 683if an error occurred.
667.Sh AUTHENTICATION 684.Sh AUTHENTICATION
668The OpenSSH SSH client supports SSH protocols 1 and 2. 685The OpenSSH SSH client supports SSH protocols 1 and 2.
669Protocol 2 is the default, with 686The default is to use protocol 2 only,
670.Nm 687though this can be changed via the
671falling back to protocol 1 if it detects protocol 2 is unsupported.
672These settings may be altered using the
673.Cm Protocol 688.Cm Protocol
674option in 689option in
675.Xr ssh_config 5 , 690.Xr ssh_config 5
676or enforced using the 691or the
677.Fl 1 692.Fl 1
678and 693and
679.Fl 2 694.Fl 2
680options (see above). 695options (see above).
681Both protocols support similar authentication methods, 696Both protocols support similar authentication methods,
682but protocol 2 is preferred since 697but protocol 2 is the default since
683it provides additional mechanisms for confidentiality 698it provides additional mechanisms for confidentiality
684(the traffic is encrypted using AES, 3DES, Blowfish, CAST128, or Arcfour) 699(the traffic is encrypted using AES, 3DES, Blowfish, CAST128, or Arcfour)
685and integrity (hmac-md5, hmac-sha1, umac-64, hmac-ripemd160). 700and integrity (hmac-md5, hmac-sha1, umac-64, hmac-ripemd160).
@@ -788,8 +803,20 @@ file, and has one key
788per line, though the lines can be very long. 803per line, though the lines can be very long.
789After this, the user can log in without giving the password. 804After this, the user can log in without giving the password.
790.Pp 805.Pp
791The most convenient way to use public key authentication may be with an 806A variation on public key authentication
792authentication agent. 807is available in the form of certificate authentication:
808instead of a set of public/private keys,
809signed certificates are used.
810This has the advantage that a single trusted certification authority
811can be used in place of many public/private keys.
812See the
813.Sx CERTIFICATES
814section of
815.Xr ssh-keygen 1
816for more information.
817.Pp
818The most convenient way to use public key or certificate authentication
819may be with an authentication agent.
793See 820See
794.Xr ssh-agent 1 821.Xr ssh-agent 1
795for more information. 822for more information.