summaryrefslogtreecommitdiff
path: root/ssh_config.0
diff options
context:
space:
mode:
Diffstat (limited to 'ssh_config.0')
-rw-r--r--ssh_config.045
1 files changed, 37 insertions, 8 deletions
diff --git a/ssh_config.0 b/ssh_config.0
index 4be1d7f3f..d1a6ab364 100644
--- a/ssh_config.0
+++ b/ssh_config.0
@@ -82,8 +82,11 @@ DESCRIPTION
82 82
83 Ciphers 83 Ciphers
84 Specifies the ciphers allowed for protocol version 2 in order of 84 Specifies the ciphers allowed for protocol version 2 in order of
85 preference. Multiple ciphers must be comma-separated. The de- 85 preference. Multiple ciphers must be comma-separated. The sup-
86 fault is 86 ported ciphers are ``3des-cbc'', ``aes128-cbc'', ``aes192-cbc'',
87 ``aes256-cbc'', ``aes128-ctr'', ``aes192-ctr'', ``aes256-ctr'',
88 ``arcfour'', ``blowfish-cbc'', and ``cast128-cbc''. The default
89 is
87 90
88 ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour, 91 ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,
89 aes192-cbc,aes256-cbc'' 92 aes192-cbc,aes256-cbc''
@@ -118,6 +121,22 @@ DESCRIPTION
118 This value is used only when the target is down or really un- 121 This value is used only when the target is down or really un-
119 reachable, not when it refuses the connection. 122 reachable, not when it refuses the connection.
120 123
124 ControlMaster
125 Enables the sharing of multiple sessions over a single network
126 connection. When set to ``yes'' ssh will listen for connections
127 on a control socket specified using the ControlPath argument.
128 Additional sessions can connect to this socket using the same
129 ControlPath with ControlMaster set to ``no'' (the default).
130 These sessions will reuse the master instance's network connec-
131 tion rather than initiating new ones. Setting this to ``ask''
132 will cause ssh to listen for control connections, but require
133 confirmation using the SSH_ASKPASS program before they are ac-
134 cepted (see ssh-add(1) for details).
135
136 ControlPath
137 Specify the path to the control socket used for connection shar-
138 ing. See ControlMaster above.
139
121 DynamicForward 140 DynamicForward
122 Specifies that a TCP/IP port on the local machine be forwarded 141 Specifies that a TCP/IP port on the local machine be forwarded
123 over the secure channel, and the application protocol is then 142 over the secure channel, and the application protocol is then
@@ -169,7 +188,7 @@ DESCRIPTION
169 ForwardX11Trusted option is also enabled. 188 ForwardX11Trusted option is also enabled.
170 189
171 ForwardX11Trusted 190 ForwardX11Trusted
172 If the this option is set to ``yes'' then remote X11 clients will 191 If this option is set to ``yes'' then remote X11 clients will
173 have full access to the original X11 display. If this option is 192 have full access to the original X11 display. If this option is
174 set to ``no'' then remote X11 clients will be considered untrust- 193 set to ``no'' then remote X11 clients will be considered untrust-
175 ed and prevented from stealing or tampering with data belonging 194 ed and prevented from stealing or tampering with data belonging
@@ -344,6 +363,17 @@ DESCRIPTION
344 tion agent is running. The default is ``yes''. Note that this 363 tion agent is running. The default is ``yes''. Note that this
345 option applies to protocol version 1 only. 364 option applies to protocol version 1 only.
346 365
366 SendEnv
367 Specifies what variables from the local environ(7) should be sent
368 to the server. Note that environment passing is only supported
369 for protocol 2, the server must also support it, and the server
370 must be configured to accept these environment variables. Refer
371 to AcceptEnv in sshd_config(5) for how to configure the server.
372 Variables are specified by name, which may contain the wildcard
373 characters `*' and `?'. Multiple environment variables may be
374 separated by whitespace or spread across multiple SendEnv direc-
375 tives. The default is not to send any environment variables.
376
347 ServerAliveInterval 377 ServerAliveInterval
348 Sets a timeout interval in seconds after which if no data has 378 Sets a timeout interval in seconds after which if no data has
349 been received from the server, ssh will send a message through 379 been received from the server, ssh will send a message through
@@ -441,10 +471,9 @@ DESCRIPTION
441FILES 471FILES
442 $HOME/.ssh/config 472 $HOME/.ssh/config
443 This is the per-user configuration file. The format of this file 473 This is the per-user configuration file. The format of this file
444 is described above. This file is used by the ssh client. This 474 is described above. This file is used by the ssh client. Be-
445 file does not usually contain any sensitive information, but the 475 cause of the potential for abuse, this file must have strict per-
446 recommended permissions are read/write for the user, and not ac- 476 missions: read/write for the user, and not accessible by others.
447 cessible by others.
448 477
449 /etc/ssh/ssh_config 478 /etc/ssh/ssh_config
450 Systemwide configuration file. This file provides defaults for 479 Systemwide configuration file. This file provides defaults for
@@ -462,4 +491,4 @@ AUTHORS
462 ated OpenSSH. Markus Friedl contributed the support for SSH protocol 491 ated OpenSSH. Markus Friedl contributed the support for SSH protocol
463 versions 1.5 and 2.0. 492 versions 1.5 and 2.0.
464 493
465OpenBSD 3.5 September 25, 1999 8 494OpenBSD 3.6 September 25, 1999 8