summaryrefslogtreecommitdiff
path: root/ssh_config.0
diff options
context:
space:
mode:
Diffstat (limited to 'ssh_config.0')
-rw-r--r--ssh_config.059
1 files changed, 28 insertions, 31 deletions
diff --git a/ssh_config.0 b/ssh_config.0
index 692e5f6d5..316b2e1ef 100644
--- a/ssh_config.0
+++ b/ssh_config.0
@@ -659,18 +659,22 @@ DESCRIPTION
659 LocalForward 659 LocalForward
660 Specifies that a TCP port on the local machine be forwarded over 660 Specifies that a TCP port on the local machine be forwarded over
661 the secure channel to the specified host and port from the remote 661 the secure channel to the specified host and port from the remote
662 machine. The first argument must be [bind_address:]port and the 662 machine. The first argument specifies the listener and may be
663 second argument must be host:hostport. IPv6 addresses can be 663 [bind_address:]port or a Unix domain socket path. The second
664 specified by enclosing addresses in square brackets. Multiple 664 argument is the destination and may be host:hostport or a Unix
665 forwardings may be specified, and additional forwardings can be 665 domain socket path if the remote host supports it.
666 given on the command line. Only the superuser can forward 666
667 privileged ports. By default, the local port is bound in 667 IPv6 addresses can be specified by enclosing addresses in square
668 accordance with the GatewayPorts setting. However, an explicit 668 brackets. Multiple forwardings may be specified, and additional
669 bind_address may be used to bind the connection to a specific 669 forwardings can be given on the command line. Only the superuser
670 address. The bind_address of localhost indicates that the 670 can forward privileged ports. By default, the local port is
671 listening port be bound for local use only, while an empty 671 bound in accordance with the GatewayPorts setting. However, an
672 explicit bind_address may be used to bind the connection to a
673 specific address. The bind_address of localhost indicates that
674 the listening port be bound for local use only, while an empty
672 address or M-bM-^@M-^X*M-bM-^@M-^Y indicates that the port should be available from 675 address or M-bM-^@M-^X*M-bM-^@M-^Y indicates that the port should be available from
673 all interfaces. 676 all interfaces. Unix domain socket paths accept the tokens
677 described in the TOKENS section.
674 678
675 LogLevel 679 LogLevel
676 Gives the verbosity level that is used when logging messages from 680 Gives the verbosity level that is used when logging messages from
@@ -846,16 +850,19 @@ DESCRIPTION
846 specified host and port from the local machine, or may act as a 850 specified host and port from the local machine, or may act as a
847 SOCKS 4/5 proxy that allows a remote client to connect to 851 SOCKS 4/5 proxy that allows a remote client to connect to
848 arbitrary destinations from the local machine. The first 852 arbitrary destinations from the local machine. The first
849 argument must be [bind_address:]port If forwarding to a specific 853 argument is the listening specification and may be
850 destination then the second argument must be host:hostport, 854 [bind_address:]port or, if the remote host supports it, a Unix
851 otherwise if no destination argument is specified then the remote 855 domain socket path. If forwarding to a specific destination then
852 forwarding will be established as a SOCKS proxy. 856 the second argument must be host:hostport or a Unix domain socket
857 path, otherwise if no destination argument is specified then the
858 remote forwarding will be established as a SOCKS proxy.
853 859
854 IPv6 addresses can be specified by enclosing addresses in square 860 IPv6 addresses can be specified by enclosing addresses in square
855 brackets. Multiple forwardings may be specified, and additional 861 brackets. Multiple forwardings may be specified, and additional
856 forwardings can be given on the command line. Privileged ports 862 forwardings can be given on the command line. Privileged ports
857 can be forwarded only when logging in as root on the remote 863 can be forwarded only when logging in as root on the remote
858 machine. 864 machine. Unix domain socket paths accept the tokens described in
865 the TOKENS section.
859 866
860 If the port argument is 0, the listen port will be dynamically 867 If the port argument is 0, the listen port will be dynamically
861 allocated on the server and reported to the client at run time. 868 allocated on the server and reported to the client at run time.
@@ -1124,26 +1131,16 @@ TOKENS
1124 tunnel forwarding was requested, or "NONE" otherwise. 1131 tunnel forwarding was requested, or "NONE" otherwise.
1125 %u The local username. 1132 %u The local username.
1126 1133
1127 Match exec accepts the tokens %%, %h, %i, %L, %l, %n, %p, %r, and %u. 1134 CertificateFile, ControlPath, IdentityAgent, IdentityFile, LocalForward,
1128 1135 Match exec, RemoteCommand, and RemoteForward accept the tokens %%, %C,
1129 CertificateFile accepts the tokens %%, %d, %h, %i, %l, %r, and %u. 1136 %d, %h, %i, %L, %l, %n, %p, %r, and %u.
1130
1131 ControlPath accepts the tokens %%, %C, %h, %i, %L, %l, %n, %p, %r, and
1132 %u.
1133 1137
1134 Hostname accepts the tokens %% and %h. 1138 Hostname accepts the tokens %% and %h.
1135 1139
1136 IdentityAgent and IdentityFile accept the tokens %%, %d, %h, %i, %l, %r, 1140 LocalCommand accepts all tokens.
1137 and %u.
1138
1139 LocalCommand accepts the tokens %%, %C, %d, %h, %i, %l, %n, %p, %r, %T,
1140 and %u.
1141 1141
1142 ProxyCommand accepts the tokens %%, %h, %n, %p, and %r. 1142 ProxyCommand accepts the tokens %%, %h, %n, %p, and %r.
1143 1143
1144 RemoteCommand accepts the tokens %%, %C, %d, %h, %i, %l, %n, %p, %r, and
1145 %u.
1146
1147FILES 1144FILES
1148 ~/.ssh/config 1145 ~/.ssh/config
1149 This is the per-user configuration file. The format of this file 1146 This is the per-user configuration file. The format of this file
@@ -1167,4 +1164,4 @@ AUTHORS
1167 created OpenSSH. Markus Friedl contributed the support for SSH protocol 1164 created OpenSSH. Markus Friedl contributed the support for SSH protocol
1168 versions 1.5 and 2.0. 1165 versions 1.5 and 2.0.
1169 1166
1170OpenBSD 6.6 February 7, 2020 OpenBSD 6.6 1167OpenBSD 6.7 April 11, 2020 OpenBSD 6.7