summaryrefslogtreecommitdiff
path: root/ssh.1
diff options
context:
space:
mode:
Diffstat (limited to 'ssh.1')
-rw-r--r--ssh.157
1 files changed, 36 insertions, 21 deletions
diff --git a/ssh.1 b/ssh.1
index 2ab1697f9..b4078525b 100644
--- a/ssh.1
+++ b/ssh.1
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: ssh.1,v 1.384 2017/09/21 19:16:53 markus Exp $ 36.\" $OpenBSD: ssh.1,v 1.391 2018/02/23 07:38:09 jmc Exp $
37.Dd $Mdocdate: September 21 2017 $ 37.Dd $Mdocdate: February 23 2018 $
38.Dt SSH 1 38.Dt SSH 1
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -42,8 +42,8 @@
42.Nd OpenSSH SSH client (remote login program) 42.Nd OpenSSH SSH client (remote login program)
43.Sh SYNOPSIS 43.Sh SYNOPSIS
44.Nm ssh 44.Nm ssh
45.Bk -words
46.Op Fl 46AaCfGgKkMNnqsTtVvXxYy 45.Op Fl 46AaCfGgKkMNnqsTtVvXxYy
46.Op Fl B Ar bind_interface
47.Op Fl b Ar bind_address 47.Op Fl b Ar bind_address
48.Op Fl c Ar cipher_spec 48.Op Fl c Ar cipher_spec
49.Op Fl D Oo Ar bind_address : Oc Ns Ar port 49.Op Fl D Oo Ar bind_address : Oc Ns Ar port
@@ -52,7 +52,7 @@
52.Op Fl F Ar configfile 52.Op Fl F Ar configfile
53.Op Fl I Ar pkcs11 53.Op Fl I Ar pkcs11
54.Op Fl i Ar identity_file 54.Op Fl i Ar identity_file
55.Op Fl J Oo Ar user Ns @ Oc Ns Ar host Ns Op : Ns Ar port 55.Op Fl J Ar destination
56.Op Fl L Ar address 56.Op Fl L Ar address
57.Op Fl l Ar login_name 57.Op Fl l Ar login_name
58.Op Fl m Ar mac_spec 58.Op Fl m Ar mac_spec
@@ -64,9 +64,8 @@
64.Op Fl S Ar ctl_path 64.Op Fl S Ar ctl_path
65.Op Fl W Ar host : Ns Ar port 65.Op Fl W Ar host : Ns Ar port
66.Op Fl w Ar local_tun Ns Op : Ns Ar remote_tun 66.Op Fl w Ar local_tun Ns Op : Ns Ar remote_tun
67.Oo Ar user Ns @ Oc Ns Ar hostname 67.Ar destination
68.Op Ar command 68.Op Ar command
69.Ek
70.Sh DESCRIPTION 69.Sh DESCRIPTION
71.Nm 70.Nm
72(SSH client) is a program for logging into a remote machine and for 71(SSH client) is a program for logging into a remote machine and for
@@ -79,15 +78,20 @@ sockets can also be forwarded over the secure channel.
79.Pp 78.Pp
80.Nm 79.Nm
81connects and logs into the specified 80connects and logs into the specified
82.Ar hostname 81.Ar destination ,
83(with optional 82which may be specified as either
84.Ar user 83.Sm off
85name). 84.Oo user @ Oc hostname
85.Sm on
86or a URI of the form
87.Sm off
88.No ssh:// Oo user @ Oc hostname Op : port .
89.Sm on
86The user must prove 90The user must prove
87his/her identity to the remote machine using one of several methods 91his/her identity to the remote machine using one of several methods
88(see below). 92(see below).
89.Pp 93.Pp
90If 94If a
91.Ar command 95.Ar command
92is specified, 96is specified,
93it is executed on the remote host instead of a login shell. 97it is executed on the remote host instead of a login shell.
@@ -121,6 +125,12 @@ authenticate using the identities loaded into the agent.
121.It Fl a 125.It Fl a
122Disables forwarding of the authentication agent connection. 126Disables forwarding of the authentication agent connection.
123.Pp 127.Pp
128.It Fl B Ar bind_interface
129Bind to the address of
130.Ar bind_interface
131before attempting to connect to the destination host.
132This is only useful on systems with more than one address.
133.Pp
124.It Fl b Ar bind_address 134.It Fl b Ar bind_address
125Use 135Use
126.Ar bind_address 136.Ar bind_address
@@ -287,17 +297,11 @@ by appending
287.Pa -cert.pub 297.Pa -cert.pub
288to identity filenames. 298to identity filenames.
289.Pp 299.Pp
290.It Fl J Xo 300.It Fl J Ar destination
291.Sm off
292.Op Ar user No @
293.Ar host
294.Op : Ar port
295.Sm on
296.Xc
297Connect to the target host by first making a 301Connect to the target host by first making a
298.Nm 302.Nm
299connection to the jump 303connection to the jump host described by
300.Ar host 304.Ar destination
301and then establishing a TCP forwarding to the ultimate destination from 305and then establishing a TCP forwarding to the ultimate destination from
302there. 306there.
303Multiple jump hops may be specified separated by comma characters. 307Multiple jump hops may be specified separated by comma characters.
@@ -1393,6 +1397,17 @@ This is set to the name of the tty (path to the device) associated
1393with the current shell or command. 1397with the current shell or command.
1394If the current session has no tty, 1398If the current session has no tty,
1395this variable is not set. 1399this variable is not set.
1400.It Ev SSH_TUNNEL
1401Optionally set by
1402.Xr sshd 8
1403to contain the interface names assigned if tunnel forwarding was
1404requested by the client.
1405.It Ev SSH_USER_AUTH
1406Optionally set by
1407.Xr sshd 8 ,
1408this variable may contain a pathname to a file that lists the authentication
1409methods successfully used when the session was established, including any
1410public keys that were used.
1396.It Ev TZ 1411.It Ev TZ
1397This variable is set to indicate the present time zone if it 1412This variable is set to indicate the present time zone if it
1398was set when the daemon was started (i.e. the daemon passes the value 1413was set when the daemon was started (i.e. the daemon passes the value
@@ -1474,7 +1489,7 @@ accessible by others (read/write/execute).
1474will simply ignore a private key file if it is accessible by others. 1489will simply ignore a private key file if it is accessible by others.
1475It is possible to specify a passphrase when 1490It is possible to specify a passphrase when
1476generating the key which will be used to encrypt the 1491generating the key which will be used to encrypt the
1477sensitive part of this file using 3DES. 1492sensitive part of this file using AES-128.
1478.Pp 1493.Pp
1479.It Pa ~/.ssh/id_dsa.pub 1494.It Pa ~/.ssh/id_dsa.pub
1480.It Pa ~/.ssh/id_ecdsa.pub 1495.It Pa ~/.ssh/id_ecdsa.pub