diff options
Diffstat (limited to 'ssh_config.0')
-rw-r--r-- | ssh_config.0 | 33 |
1 files changed, 24 insertions, 9 deletions
diff --git a/ssh_config.0 b/ssh_config.0 index 4ca9a5ff8..ade8e6562 100644 --- a/ssh_config.0 +++ b/ssh_config.0 | |||
@@ -201,7 +201,9 @@ DESCRIPTION | |||
201 | preference. Multiple ciphers must be comma-separated. If the | 201 | preference. Multiple ciphers must be comma-separated. If the |
202 | specified value begins with a M-bM-^@M-^X+M-bM-^@M-^Y character, then the specified | 202 | specified value begins with a M-bM-^@M-^X+M-bM-^@M-^Y character, then the specified |
203 | ciphers will be appended to the default set instead of replacing | 203 | ciphers will be appended to the default set instead of replacing |
204 | them. | 204 | them. If the specified value begins with a M-bM-^@M-^X-M-bM-^@M-^Y character, then |
205 | the specified ciphers (including wildcards) will be removed from | ||
206 | the default set instead of replacing them. | ||
205 | 207 | ||
206 | The supported ciphers are: | 208 | The supported ciphers are: |
207 | 209 | ||
@@ -448,7 +450,10 @@ DESCRIPTION | |||
448 | authentication as a comma-separated pattern list. Alternately if | 450 | authentication as a comma-separated pattern list. Alternately if |
449 | the specified value begins with a M-bM-^@M-^X+M-bM-^@M-^Y character, then the | 451 | the specified value begins with a M-bM-^@M-^X+M-bM-^@M-^Y character, then the |
450 | specified key types will be appended to the default set instead | 452 | specified key types will be appended to the default set instead |
451 | of replacing them. The default for this option is: | 453 | of replacing them. If the specified value begins with a M-bM-^@M-^X-M-bM-^@M-^Y |
454 | character, then the specified key types (including wildcards) | ||
455 | will be removed from the default set instead of replacing them. | ||
456 | The default for this option is: | ||
452 | 457 | ||
453 | ecdsa-sha2-nistp256-cert-v01@openssh.com, | 458 | ecdsa-sha2-nistp256-cert-v01@openssh.com, |
454 | ecdsa-sha2-nistp384-cert-v01@openssh.com, | 459 | ecdsa-sha2-nistp384-cert-v01@openssh.com, |
@@ -464,8 +469,10 @@ DESCRIPTION | |||
464 | Specifies the host key algorithms that the client wants to use in | 469 | Specifies the host key algorithms that the client wants to use in |
465 | order of preference. Alternately if the specified value begins | 470 | order of preference. Alternately if the specified value begins |
466 | with a M-bM-^@M-^X+M-bM-^@M-^Y character, then the specified key types will be | 471 | with a M-bM-^@M-^X+M-bM-^@M-^Y character, then the specified key types will be |
467 | appended to the default set instead of replacing them. The | 472 | appended to the default set instead of replacing them. If the |
468 | default for this option is: | 473 | specified value begins with a M-bM-^@M-^X-M-bM-^@M-^Y character, then the specified |
474 | key types (including wildcards) will be removed from the default | ||
475 | set instead of replacing them. The default for this option is: | ||
469 | 476 | ||
470 | ecdsa-sha2-nistp256-cert-v01@openssh.com, | 477 | ecdsa-sha2-nistp256-cert-v01@openssh.com, |
471 | ecdsa-sha2-nistp384-cert-v01@openssh.com, | 478 | ecdsa-sha2-nistp384-cert-v01@openssh.com, |
@@ -591,7 +598,9 @@ DESCRIPTION | |||
591 | algorithms must be comma-separated. Alternately if the specified | 598 | algorithms must be comma-separated. Alternately if the specified |
592 | value begins with a M-bM-^@M-^X+M-bM-^@M-^Y character, then the specified methods | 599 | value begins with a M-bM-^@M-^X+M-bM-^@M-^Y character, then the specified methods |
593 | will be appended to the default set instead of replacing them. | 600 | will be appended to the default set instead of replacing them. |
594 | The default is: | 601 | If the specified value begins with a M-bM-^@M-^X-M-bM-^@M-^Y character, then the |
602 | specified methods (including wildcards) will be removed from the | ||
603 | default set instead of replacing them. The default is: | ||
595 | 604 | ||
596 | curve25519-sha256,curve25519-sha256@libssh.org, | 605 | curve25519-sha256,curve25519-sha256@libssh.org, |
597 | ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521, | 606 | ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521, |
@@ -644,7 +653,10 @@ DESCRIPTION | |||
644 | integrity protection. Multiple algorithms must be comma- | 653 | integrity protection. Multiple algorithms must be comma- |
645 | separated. If the specified value begins with a M-bM-^@M-^X+M-bM-^@M-^Y character, | 654 | separated. If the specified value begins with a M-bM-^@M-^X+M-bM-^@M-^Y character, |
646 | then the specified algorithms will be appended to the default set | 655 | then the specified algorithms will be appended to the default set |
647 | instead of replacing them. | 656 | instead of replacing them. If the specified value begins with a |
657 | M-bM-^@M-^X-M-bM-^@M-^Y character, then the specified algorithms (including | ||
658 | wildcards) will be removed from the default set instead of | ||
659 | replacing them. | ||
648 | 660 | ||
649 | The algorithms that contain "-etm" calculate the MAC after | 661 | The algorithms that contain "-etm" calculate the MAC after |
650 | encryption (encrypt-then-mac). These are considered safer and | 662 | encryption (encrypt-then-mac). These are considered safer and |
@@ -667,7 +679,7 @@ DESCRIPTION | |||
667 | machine on each of the machines and the user will get many | 679 | machine on each of the machines and the user will get many |
668 | warnings about changed host keys. However, this option disables | 680 | warnings about changed host keys. However, this option disables |
669 | host authentication for localhost. The argument to this keyword | 681 | host authentication for localhost. The argument to this keyword |
670 | must be yes or no. (the default). | 682 | must be yes or no (the default). |
671 | 683 | ||
672 | NumberOfPasswordPrompts | 684 | NumberOfPasswordPrompts |
673 | Specifies the number of password prompts before giving up. The | 685 | Specifies the number of password prompts before giving up. The |
@@ -753,7 +765,10 @@ DESCRIPTION | |||
753 | authentication as a comma-separated pattern list. Alternately if | 765 | authentication as a comma-separated pattern list. Alternately if |
754 | the specified value begins with a M-bM-^@M-^X+M-bM-^@M-^Y character, then the key | 766 | the specified value begins with a M-bM-^@M-^X+M-bM-^@M-^Y character, then the key |
755 | types after it will be appended to the default instead of | 767 | types after it will be appended to the default instead of |
756 | replacing it. The default for this option is: | 768 | replacing it. If the specified value begins with a M-bM-^@M-^X-M-bM-^@M-^Y |
769 | character, then the specified key types (including wildcards) | ||
770 | will be removed from the default set instead of replacing them. | ||
771 | The default for this option is: | ||
757 | 772 | ||
758 | ecdsa-sha2-nistp256-cert-v01@openssh.com, | 773 | ecdsa-sha2-nistp256-cert-v01@openssh.com, |
759 | ecdsa-sha2-nistp384-cert-v01@openssh.com, | 774 | ecdsa-sha2-nistp384-cert-v01@openssh.com, |
@@ -1074,4 +1089,4 @@ AUTHORS | |||
1074 | created OpenSSH. Markus Friedl contributed the support for SSH protocol | 1089 | created OpenSSH. Markus Friedl contributed the support for SSH protocol |
1075 | versions 1.5 and 2.0. | 1090 | versions 1.5 and 2.0. |
1076 | 1091 | ||
1077 | OpenBSD 6.0 October 15, 2016 OpenBSD 6.0 | 1092 | OpenBSD 6.0 February 27, 2017 OpenBSD 6.0 |