diff options
Diffstat (limited to 'ssh_config.0')
-rw-r--r-- | ssh_config.0 | 110 |
1 files changed, 51 insertions, 59 deletions
diff --git a/ssh_config.0 b/ssh_config.0 index a8687ffc2..74e516594 100644 --- a/ssh_config.0 +++ b/ssh_config.0 | |||
@@ -39,16 +39,16 @@ DESCRIPTION | |||
39 | 39 | ||
40 | Host Restricts the following declarations (up to the next Host key- | 40 | Host Restricts the following declarations (up to the next Host key- |
41 | word) to be only for those hosts that match one of the patterns | 41 | word) to be only for those hosts that match one of the patterns |
42 | given after the keyword. M-bM-^@M-^X*M-bM-^@M-^Y and M-bM-^@M-^X?M-bM-^@M-^Y can be used as wildcards in | 42 | given after the keyword. M-bM-^@M-^X*M-bM-^@M-^Y and M-bM-^@M-^XM-bM-^@M-^Y? can be used as wildcards |
43 | the patterns. A single M-bM-^@M-^X*M-bM-^@M-^Y as a pattern can be used to provide | 43 | in the patterns. A single M-bM-^@M-^X*M-bM-^@M-^Y as a pattern can be used to pro- |
44 | global defaults for all hosts. The host is the hostname argument | 44 | vide global defaults for all hosts. The host is the hostname |
45 | given on the command line (i.e., the name is not converted to a | 45 | argument given on the command line (i.e., the name is not con- |
46 | canonicalized host name before matching). | 46 | verted to a canonicalized host name before matching). |
47 | 47 | ||
48 | AddressFamily | 48 | AFSTokenPassing |
49 | Specifies which address family to use when connecting. Valid | 49 | Specifies whether to pass AFS tokens to remote host. The argu- |
50 | arguments are M-bM-^@M-^\anyM-bM-^@M-^], M-bM-^@M-^\inetM-bM-^@M-^] (Use IPv4 only) or M-bM-^@M-^\inet6M-bM-^@M-^] (Use IPv6 | 50 | ment to this keyword must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. This option applies |
51 | only.) | 51 | to protocol version 1 only. |
52 | 52 | ||
53 | BatchMode | 53 | BatchMode |
54 | If set to M-bM-^@M-^\yesM-bM-^@M-^], passphrase/password querying will be disabled. | 54 | If set to M-bM-^@M-^\yesM-bM-^@M-^], passphrase/password querying will be disabled. |
@@ -112,28 +112,15 @@ DESCRIPTION | |||
112 | exiting. The argument must be an integer. This may be useful in | 112 | exiting. The argument must be an integer. This may be useful in |
113 | scripts if the connection sometimes fails. The default is 1. | 113 | scripts if the connection sometimes fails. The default is 1. |
114 | 114 | ||
115 | ConnectTimeout | ||
116 | Specifies the timeout (in seconds) used when connecting to the | ||
117 | ssh server, instead of using the default system TCP timeout. | ||
118 | This value is used only when the target is down or really | ||
119 | unreachable, not when it refuses the connection. | ||
120 | |||
121 | DynamicForward | 115 | DynamicForward |
122 | Specifies that a TCP/IP port on the local machine be forwarded | 116 | Specifies that a TCP/IP port on the local machine be forwarded |
123 | over the secure channel, and the application protocol is then | 117 | over the secure channel, and the application protocol is then |
124 | used to determine where to connect to from the remote machine. | 118 | used to determine where to connect to from the remote machine. |
125 | The argument must be a port number. Currently the SOCKS4 and | 119 | The argument must be a port number. Currently the SOCKS4 proto- |
126 | SOCKS5 protocols are supported, and ssh will act as a SOCKS | 120 | col is supported, and ssh will act as a SOCKS4 server. Multiple |
127 | server. Multiple forwardings may be specified, and additional | 121 | forwardings may be specified, and additional forwardings can be |
128 | forwardings can be given on the command line. Only the superuser | 122 | given on the command line. Only the superuser can forward privi- |
129 | can forward privileged ports. | 123 | leged ports. |
130 | |||
131 | EnableSSHKeysign | ||
132 | Setting this option to M-bM-^@M-^\yesM-bM-^@M-^] in the global client configuration | ||
133 | file /etc/ssh/ssh_config enables the use of the helper program | ||
134 | ssh-keysign(8) during HostbasedAuthentication. The argument must | ||
135 | be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The default is M-bM-^@M-^\noM-bM-^@M-^]. See ssh-keysign(8) for | ||
136 | more information. | ||
137 | 124 | ||
138 | EscapeChar | 125 | EscapeChar |
139 | Sets the escape character (default: M-bM-^@M-^X~M-bM-^@M-^Y). The escape character | 126 | Sets the escape character (default: M-bM-^@M-^X~M-bM-^@M-^Y). The escape character |
@@ -179,16 +166,6 @@ DESCRIPTION | |||
179 | Specifies a file to use for the global host key database instead | 166 | Specifies a file to use for the global host key database instead |
180 | of /etc/ssh/ssh_known_hosts. | 167 | of /etc/ssh/ssh_known_hosts. |
181 | 168 | ||
182 | GSSAPIAuthentication | ||
183 | Specifies whether authentication based on GSSAPI may be used, | ||
184 | either using the result of a successful key exchange, or using | ||
185 | GSSAPI user authentication. The default is M-bM-^@M-^\yesM-bM-^@M-^]. Note that | ||
186 | this option applies to protocol version 2 only. | ||
187 | |||
188 | GSSAPIDelegateCredentials | ||
189 | Forward (delegate) credentials to the server. The default is | ||
190 | M-bM-^@M-^\noM-bM-^@M-^]. Note that this option applies to protocol version 2 only. | ||
191 | |||
192 | HostbasedAuthentication | 169 | HostbasedAuthentication |
193 | Specifies whether to try rhosts based authentication with public | 170 | Specifies whether to try rhosts based authentication with public |
194 | key authentication. The argument must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The | 171 | key authentication. The argument must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The |
@@ -215,14 +192,14 @@ DESCRIPTION | |||
215 | 192 | ||
216 | IdentityFile | 193 | IdentityFile |
217 | Specifies a file from which the userM-bM-^@M-^Ys RSA or DSA authentication | 194 | Specifies a file from which the userM-bM-^@M-^Ys RSA or DSA authentication |
218 | identity is read. The default is $HOME/.ssh/identity for proto- | 195 | identity is read. The default is $HOME/.ssh/identity for protocol |
219 | col version 1, and $HOME/.ssh/id_rsa and $HOME/.ssh/id_dsa for | 196 | version 1, and $HOME/.ssh/id_rsa and $HOME/.ssh/id_dsa for proto- |
220 | protocol version 2. Additionally, any identities represented by | 197 | col version 2. Additionally, any identities represented by the |
221 | the authentication agent will be used for authentication. The | 198 | authentication agent will be used for authentication. The file |
222 | file name may use the tilde syntax to refer to a userM-bM-^@M-^Ys home | 199 | name may use the tilde syntax to refer to a userM-bM-^@M-^Ys home direc- |
223 | directory. It is possible to have multiple identity files speci- | 200 | tory. It is possible to have multiple identity files specified |
224 | fied in configuration files; all these identities will be tried | 201 | in configuration files; all these identities will be tried in |
225 | in sequence. | 202 | sequence. |
226 | 203 | ||
227 | KeepAlive | 204 | KeepAlive |
228 | Specifies whether the system should send TCP keepalive messages | 205 | Specifies whether the system should send TCP keepalive messages |
@@ -237,6 +214,15 @@ DESCRIPTION | |||
237 | 214 | ||
238 | To disable keepalives, the value should be set to M-bM-^@M-^\noM-bM-^@M-^]. | 215 | To disable keepalives, the value should be set to M-bM-^@M-^\noM-bM-^@M-^]. |
239 | 216 | ||
217 | KerberosAuthentication | ||
218 | Specifies whether Kerberos authentication will be used. The | ||
219 | argument to this keyword must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. | ||
220 | |||
221 | KerberosTgtPassing | ||
222 | Specifies whether a Kerberos TGT will be forwarded to the server. | ||
223 | This will only work if the Kerberos server is actually an AFS | ||
224 | kaserver. The argument to this keyword must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. | ||
225 | |||
240 | LocalForward | 226 | LocalForward |
241 | Specifies that a TCP/IP port on the local machine be forwarded | 227 | Specifies that a TCP/IP port on the local machine be forwarded |
242 | over the secure channel to the specified host and port from the | 228 | over the secure channel to the specified host and port from the |
@@ -281,9 +267,9 @@ DESCRIPTION | |||
281 | 267 | ||
282 | PreferredAuthentications | 268 | PreferredAuthentications |
283 | Specifies the order in which the client should try protocol 2 | 269 | Specifies the order in which the client should try protocol 2 |
284 | authentication methods. This allows a client to prefer one | 270 | authentication methods. This allows a client to prefer one method |
285 | method (e.g. keyboard-interactive) over another method (e.g. | 271 | (e.g. keyboard-interactive) over another method (e.g. password) |
286 | password) The default for this option is: | 272 | The default for this option is: |
287 | M-bM-^@M-^\hostbased,publickey,keyboard-interactive,passwordM-bM-^@M-^]. | 273 | M-bM-^@M-^\hostbased,publickey,keyboard-interactive,passwordM-bM-^@M-^]. |
288 | 274 | ||
289 | Protocol | 275 | Protocol |
@@ -321,6 +307,16 @@ DESCRIPTION | |||
321 | specified, and additional forwardings can be given on the command | 307 | specified, and additional forwardings can be given on the command |
322 | line. Only the superuser can forward privileged ports. | 308 | line. Only the superuser can forward privileged ports. |
323 | 309 | ||
310 | RhostsAuthentication | ||
311 | Specifies whether to try rhosts based authentication. Note that | ||
312 | this declaration only affects the client side and has no effect | ||
313 | whatsoever on security. Most servers do not permit RhostsAuthen- | ||
314 | tication because it is not secure (see RhostsRSAAuthentication). | ||
315 | The argument to this keyword must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The default | ||
316 | is M-bM-^@M-^\noM-bM-^@M-^]. This option applies to protocol version 1 only and | ||
317 | requires ssh to be setuid root and UsePrivilegedPort to be set to | ||
318 | M-bM-^@M-^\yesM-bM-^@M-^]. | ||
319 | |||
324 | RhostsRSAAuthentication | 320 | RhostsRSAAuthentication |
325 | Specifies whether to try rhosts based authentication with RSA | 321 | Specifies whether to try rhosts based authentication with RSA |
326 | host authentication. The argument must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The | 322 | host authentication. The argument must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The |
@@ -335,9 +331,9 @@ DESCRIPTION | |||
335 | applies to protocol version 1 only. | 331 | applies to protocol version 1 only. |
336 | 332 | ||
337 | SmartcardDevice | 333 | SmartcardDevice |
338 | Specifies which smartcard device to use. The argument to this | 334 | Specifies which smartcard device to use. The argument to this |
339 | keyword is the device ssh should use to communicate with a smart- | 335 | keyword is the device ssh should use to communicate with a smart- |
340 | card used for storing the userM-bM-^@M-^Ys private RSA key. By default, no | 336 | card used for storing the userM-bM-^@M-^Ys private RSA key. By default, no |
341 | device is specified and smartcard support is not activated. | 337 | device is specified and smartcard support is not activated. |
342 | 338 | ||
343 | StrictHostKeyChecking | 339 | StrictHostKeyChecking |
@@ -360,7 +356,8 @@ DESCRIPTION | |||
360 | Specifies whether to use a privileged port for outgoing connec- | 356 | Specifies whether to use a privileged port for outgoing connec- |
361 | tions. The argument must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The default is M-bM-^@M-^\noM-bM-^@M-^]. | 357 | tions. The argument must be M-bM-^@M-^\yesM-bM-^@M-^] or M-bM-^@M-^\noM-bM-^@M-^]. The default is M-bM-^@M-^\noM-bM-^@M-^]. |
362 | If set to M-bM-^@M-^\yesM-bM-^@M-^] ssh must be setuid root. Note that this option | 358 | If set to M-bM-^@M-^\yesM-bM-^@M-^] ssh must be setuid root. Note that this option |
363 | must be set to M-bM-^@M-^\yesM-bM-^@M-^] for RhostsRSAAuthentication with older | 359 | must be set to M-bM-^@M-^\yesM-bM-^@M-^] if RhostsAuthentication and |
360 | RhostsRSAAuthentication authentications are needed with older | ||
364 | servers. | 361 | servers. |
365 | 362 | ||
366 | User Specifies the user to log in as. This can be useful when a dif- | 363 | User Specifies the user to log in as. This can be useful when a dif- |
@@ -372,11 +369,6 @@ DESCRIPTION | |||
372 | Specifies a file to use for the user host key database instead of | 369 | Specifies a file to use for the user host key database instead of |
373 | $HOME/.ssh/known_hosts. | 370 | $HOME/.ssh/known_hosts. |
374 | 371 | ||
375 | VerifyHostKeyDNS | ||
376 | Specifies whether to verify the remote key using DNS and SSHFP | ||
377 | resource records. The default is M-bM-^@M-^\noM-bM-^@M-^]. Note that this option | ||
378 | applies to protocol version 2 only. | ||
379 | |||
380 | XAuthLocation | 372 | XAuthLocation |
381 | Specifies the full pathname of the xauth(1) program. The default | 373 | Specifies the full pathname of the xauth(1) program. The default |
382 | is /usr/X11R6/bin/xauth. | 374 | is /usr/X11R6/bin/xauth. |
@@ -395,9 +387,6 @@ FILES | |||
395 | file, and for those users who do not have a configuration file. | 387 | file, and for those users who do not have a configuration file. |
396 | This file must be world-readable. | 388 | This file must be world-readable. |
397 | 389 | ||
398 | SEE ALSO | ||
399 | ssh(1) | ||
400 | |||
401 | AUTHORS | 390 | AUTHORS |
402 | OpenSSH is a derivative of the original and free ssh 1.2.12 release by | 391 | OpenSSH is a derivative of the original and free ssh 1.2.12 release by |
403 | Tatu Ylonen. Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo | 392 | Tatu Ylonen. Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo |
@@ -405,4 +394,7 @@ AUTHORS | |||
405 | ated OpenSSH. Markus Friedl contributed the support for SSH protocol | 394 | ated OpenSSH. Markus Friedl contributed the support for SSH protocol |
406 | versions 1.5 and 2.0. | 395 | versions 1.5 and 2.0. |
407 | 396 | ||
397 | SEE ALSO | ||
398 | ssh(1) | ||
399 | |||
408 | BSD September 25, 1999 BSD | 400 | BSD September 25, 1999 BSD |