summaryrefslogtreecommitdiff
path: root/ssh_config.5
diff options
context:
space:
mode:
Diffstat (limited to 'ssh_config.5')
-rw-r--r--ssh_config.572
1 files changed, 62 insertions, 10 deletions
diff --git a/ssh_config.5 b/ssh_config.5
index 9a103f22b..aaa435a9d 100644
--- a/ssh_config.5
+++ b/ssh_config.5
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: ssh_config.5,v 1.211 2015/06/02 09:10:40 djm Exp $ 36.\" $OpenBSD: ssh_config.5,v 1.214 2015/07/30 00:01:34 djm Exp $
37.Dd $Mdocdate: June 2 2015 $ 37.Dd $Mdocdate: July 30 2015 $
38.Dt SSH_CONFIG 5 38.Dt SSH_CONFIG 5
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -393,6 +393,11 @@ The default is
393Specifies the ciphers allowed for protocol version 2 393Specifies the ciphers allowed for protocol version 2
394in order of preference. 394in order of preference.
395Multiple ciphers must be comma-separated. 395Multiple ciphers must be comma-separated.
396If the specified value begins with a
397.Sq +
398character, then the specified ciphers will be appended to the default set
399instead of replacing them.
400.Pp
396The supported ciphers are: 401The supported ciphers are:
397.Pp 402.Pp
398.Bl -item -compact -offset indent 403.Bl -item -compact -offset indent
@@ -839,9 +844,21 @@ is similar to
839.It Cm HostbasedKeyTypes 844.It Cm HostbasedKeyTypes
840Specifies the key types that will be used for hostbased authentication 845Specifies the key types that will be used for hostbased authentication
841as a comma-separated pattern list. 846as a comma-separated pattern list.
842The default 847Alternately if the specified value begins with a
843.Dq * 848.Sq +
844will allow all key types. 849character, then the specified key types will be appended to the default set
850instead of replacing them.
851The default for this option is:
852.Bd -literal -offset 3n
853ecdsa-sha2-nistp256-cert-v01@openssh.com,
854ecdsa-sha2-nistp384-cert-v01@openssh.com,
855ecdsa-sha2-nistp521-cert-v01@openssh.com,
856ssh-ed25519-cert-v01@openssh.com,
857ssh-rsa-cert-v01@openssh.com,
858ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
859ssh-ed25519,ssh-rsa
860.Ed
861.Pp
845The 862The
846.Fl Q 863.Fl Q
847option of 864option of
@@ -850,16 +867,19 @@ may be used to list supported key types.
850.It Cm HostKeyAlgorithms 867.It Cm HostKeyAlgorithms
851Specifies the protocol version 2 host key algorithms 868Specifies the protocol version 2 host key algorithms
852that the client wants to use in order of preference. 869that the client wants to use in order of preference.
870Alternately if the specified value begins with a
871.Sq +
872character, then the specified key types will be appended to the default set
873instead of replacing them.
853The default for this option is: 874The default for this option is:
854.Bd -literal -offset 3n 875.Bd -literal -offset 3n
855ecdsa-sha2-nistp256-cert-v01@openssh.com, 876ecdsa-sha2-nistp256-cert-v01@openssh.com,
856ecdsa-sha2-nistp384-cert-v01@openssh.com, 877ecdsa-sha2-nistp384-cert-v01@openssh.com,
857ecdsa-sha2-nistp521-cert-v01@openssh.com, 878ecdsa-sha2-nistp521-cert-v01@openssh.com,
858ssh-ed25519-cert-v01@openssh.com, 879ssh-ed25519-cert-v01@openssh.com,
859ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com, 880ssh-rsa-cert-v01@openssh.com,
860ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,
861ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521, 881ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
862ssh-ed25519,ssh-rsa,ssh-dss 882ssh-ed25519,ssh-rsa
863.Ed 883.Ed
864.Pp 884.Pp
865If hostkeys are known for the destination host then this default is modified 885If hostkeys are known for the destination host then this default is modified
@@ -1032,14 +1052,17 @@ and
1032.It Cm KexAlgorithms 1052.It Cm KexAlgorithms
1033Specifies the available KEX (Key Exchange) algorithms. 1053Specifies the available KEX (Key Exchange) algorithms.
1034Multiple algorithms must be comma-separated. 1054Multiple algorithms must be comma-separated.
1055Alternately if the specified value begins with a
1056.Sq +
1057character, then the specified methods will be appended to the default set
1058instead of replacing them.
1035The default is: 1059The default is:
1036.Bd -literal -offset indent 1060.Bd -literal -offset indent
1037curve25519-sha256@libssh.org, 1061curve25519-sha256@libssh.org,
1038ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521, 1062ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,
1039diffie-hellman-group-exchange-sha256, 1063diffie-hellman-group-exchange-sha256,
1040diffie-hellman-group-exchange-sha1, 1064diffie-hellman-group-exchange-sha1,
1041diffie-hellman-group14-sha1, 1065diffie-hellman-group14-sha1
1042diffie-hellman-group1-sha1
1043.Ed 1066.Ed
1044.Pp 1067.Pp
1045The list of available key exchange algorithms may also be obtained using the 1068The list of available key exchange algorithms may also be obtained using the
@@ -1121,10 +1144,16 @@ in order of preference.
1121The MAC algorithm is used in protocol version 2 1144The MAC algorithm is used in protocol version 2
1122for data integrity protection. 1145for data integrity protection.
1123Multiple algorithms must be comma-separated. 1146Multiple algorithms must be comma-separated.
1147If the specified value begins with a
1148.Sq +
1149character, then the specified algorithms will be appended to the default set
1150instead of replacing them.
1151.Pp
1124The algorithms that contain 1152The algorithms that contain
1125.Dq -etm 1153.Dq -etm
1126calculate the MAC after encryption (encrypt-then-mac). 1154calculate the MAC after encryption (encrypt-then-mac).
1127These are considered safer and their use recommended. 1155These are considered safer and their use recommended.
1156.Pp
1128The default is: 1157The default is:
1129.Bd -literal -offset indent 1158.Bd -literal -offset indent
1130umac-64-etm@openssh.com,umac-128-etm@openssh.com, 1159umac-64-etm@openssh.com,umac-128-etm@openssh.com,
@@ -1265,6 +1294,29 @@ will pass a connected file descriptor back to
1265instead of continuing to execute and pass data. 1294instead of continuing to execute and pass data.
1266The default is 1295The default is
1267.Dq no . 1296.Dq no .
1297.It Cm PubkeyAcceptedKeyTypes
1298Specifies the key types that will be used for public key authentication
1299as a comma-separated pattern list.
1300Alternately if the specified value begins with a
1301.Sq +
1302character, then the key types after it will be appended to the default
1303instead of replacing it.
1304The default for this option is:
1305.Bd -literal -offset 3n
1306ecdsa-sha2-nistp256-cert-v01@openssh.com,
1307ecdsa-sha2-nistp384-cert-v01@openssh.com,
1308ecdsa-sha2-nistp521-cert-v01@openssh.com,
1309ssh-ed25519-cert-v01@openssh.com,
1310ssh-rsa-cert-v01@openssh.com,
1311ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
1312ssh-ed25519,ssh-rsa
1313.Ed
1314.Pp
1315The
1316.Fl Q
1317option of
1318.Xr ssh 1
1319may be used to list supported key types.
1268.It Cm PubkeyAuthentication 1320.It Cm PubkeyAuthentication
1269Specifies whether to try public key authentication. 1321Specifies whether to try public key authentication.
1270The argument to this keyword must be 1322The argument to this keyword must be