diff options
Diffstat (limited to 'ssh_config.0')
-rw-r--r-- | ssh_config.0 | 45 |
1 files changed, 37 insertions, 8 deletions
diff --git a/ssh_config.0 b/ssh_config.0 index 4be1d7f3f..d1a6ab364 100644 --- a/ssh_config.0 +++ b/ssh_config.0 | |||
@@ -82,8 +82,11 @@ DESCRIPTION | |||
82 | 82 | ||
83 | Ciphers | 83 | Ciphers |
84 | Specifies the ciphers allowed for protocol version 2 in order of | 84 | Specifies the ciphers allowed for protocol version 2 in order of |
85 | preference. Multiple ciphers must be comma-separated. The de- | 85 | preference. Multiple ciphers must be comma-separated. The sup- |
86 | fault is | 86 | ported ciphers are ``3des-cbc'', ``aes128-cbc'', ``aes192-cbc'', |
87 | ``aes256-cbc'', ``aes128-ctr'', ``aes192-ctr'', ``aes256-ctr'', | ||
88 | ``arcfour'', ``blowfish-cbc'', and ``cast128-cbc''. The default | ||
89 | is | ||
87 | 90 | ||
88 | ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour, | 91 | ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour, |
89 | aes192-cbc,aes256-cbc'' | 92 | aes192-cbc,aes256-cbc'' |
@@ -118,6 +121,22 @@ DESCRIPTION | |||
118 | This value is used only when the target is down or really un- | 121 | This value is used only when the target is down or really un- |
119 | reachable, not when it refuses the connection. | 122 | reachable, not when it refuses the connection. |
120 | 123 | ||
124 | ControlMaster | ||
125 | Enables the sharing of multiple sessions over a single network | ||
126 | connection. When set to ``yes'' ssh will listen for connections | ||
127 | on a control socket specified using the ControlPath argument. | ||
128 | Additional sessions can connect to this socket using the same | ||
129 | ControlPath with ControlMaster set to ``no'' (the default). | ||
130 | These sessions will reuse the master instance's network connec- | ||
131 | tion rather than initiating new ones. Setting this to ``ask'' | ||
132 | will cause ssh to listen for control connections, but require | ||
133 | confirmation using the SSH_ASKPASS program before they are ac- | ||
134 | cepted (see ssh-add(1) for details). | ||
135 | |||
136 | ControlPath | ||
137 | Specify the path to the control socket used for connection shar- | ||
138 | ing. See ControlMaster above. | ||
139 | |||
121 | DynamicForward | 140 | DynamicForward |
122 | Specifies that a TCP/IP port on the local machine be forwarded | 141 | Specifies that a TCP/IP port on the local machine be forwarded |
123 | over the secure channel, and the application protocol is then | 142 | over the secure channel, and the application protocol is then |
@@ -169,7 +188,7 @@ DESCRIPTION | |||
169 | ForwardX11Trusted option is also enabled. | 188 | ForwardX11Trusted option is also enabled. |
170 | 189 | ||
171 | ForwardX11Trusted | 190 | ForwardX11Trusted |
172 | If the this option is set to ``yes'' then remote X11 clients will | 191 | If this option is set to ``yes'' then remote X11 clients will |
173 | have full access to the original X11 display. If this option is | 192 | have full access to the original X11 display. If this option is |
174 | set to ``no'' then remote X11 clients will be considered untrust- | 193 | set to ``no'' then remote X11 clients will be considered untrust- |
175 | ed and prevented from stealing or tampering with data belonging | 194 | ed and prevented from stealing or tampering with data belonging |
@@ -344,6 +363,17 @@ DESCRIPTION | |||
344 | tion agent is running. The default is ``yes''. Note that this | 363 | tion agent is running. The default is ``yes''. Note that this |
345 | option applies to protocol version 1 only. | 364 | option applies to protocol version 1 only. |
346 | 365 | ||
366 | SendEnv | ||
367 | Specifies what variables from the local environ(7) should be sent | ||
368 | to the server. Note that environment passing is only supported | ||
369 | for protocol 2, the server must also support it, and the server | ||
370 | must be configured to accept these environment variables. Refer | ||
371 | to AcceptEnv in sshd_config(5) for how to configure the server. | ||
372 | Variables are specified by name, which may contain the wildcard | ||
373 | characters `*' and `?'. Multiple environment variables may be | ||
374 | separated by whitespace or spread across multiple SendEnv direc- | ||
375 | tives. The default is not to send any environment variables. | ||
376 | |||
347 | ServerAliveInterval | 377 | ServerAliveInterval |
348 | Sets a timeout interval in seconds after which if no data has | 378 | Sets a timeout interval in seconds after which if no data has |
349 | been received from the server, ssh will send a message through | 379 | been received from the server, ssh will send a message through |
@@ -441,10 +471,9 @@ DESCRIPTION | |||
441 | FILES | 471 | FILES |
442 | $HOME/.ssh/config | 472 | $HOME/.ssh/config |
443 | This is the per-user configuration file. The format of this file | 473 | This is the per-user configuration file. The format of this file |
444 | is described above. This file is used by the ssh client. This | 474 | is described above. This file is used by the ssh client. Be- |
445 | file does not usually contain any sensitive information, but the | 475 | cause of the potential for abuse, this file must have strict per- |
446 | recommended permissions are read/write for the user, and not ac- | 476 | missions: read/write for the user, and not accessible by others. |
447 | cessible by others. | ||
448 | 477 | ||
449 | /etc/ssh/ssh_config | 478 | /etc/ssh/ssh_config |
450 | Systemwide configuration file. This file provides defaults for | 479 | Systemwide configuration file. This file provides defaults for |
@@ -462,4 +491,4 @@ AUTHORS | |||
462 | ated OpenSSH. Markus Friedl contributed the support for SSH protocol | 491 | ated OpenSSH. Markus Friedl contributed the support for SSH protocol |
463 | versions 1.5 and 2.0. | 492 | versions 1.5 and 2.0. |
464 | 493 | ||
465 | OpenBSD 3.5 September 25, 1999 8 | 494 | OpenBSD 3.6 September 25, 1999 8 |