diff options
Diffstat (limited to 'ssh_config.5')
-rw-r--r-- | ssh_config.5 | 23 |
1 files changed, 5 insertions, 18 deletions
diff --git a/ssh_config.5 b/ssh_config.5 index c8ccfecb4..fcd538066 100644 --- a/ssh_config.5 +++ b/ssh_config.5 | |||
@@ -33,8 +33,8 @@ | |||
33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
35 | .\" | 35 | .\" |
36 | .\" $OpenBSD: ssh_config.5,v 1.225 2016/02/16 05:11:04 djm Exp $ | 36 | .\" $OpenBSD: ssh_config.5,v 1.226 2016/02/17 07:38:19 jmc Exp $ |
37 | .Dd $Mdocdate: February 16 2016 $ | 37 | .Dd $Mdocdate: February 17 2016 $ |
38 | .Dt SSH_CONFIG 5 | 38 | .Dt SSH_CONFIG 5 |
39 | .Os | 39 | .Os |
40 | .Sh NAME | 40 | .Sh NAME |
@@ -824,12 +824,10 @@ The default is | |||
824 | Specifies whether user authentication based on GSSAPI is allowed. | 824 | Specifies whether user authentication based on GSSAPI is allowed. |
825 | The default is | 825 | The default is |
826 | .Dq no . | 826 | .Dq no . |
827 | Note that this option applies to protocol version 2 only. | ||
828 | .It Cm GSSAPIDelegateCredentials | 827 | .It Cm GSSAPIDelegateCredentials |
829 | Forward (delegate) credentials to the server. | 828 | Forward (delegate) credentials to the server. |
830 | The default is | 829 | The default is |
831 | .Dq no . | 830 | .Dq no . |
832 | Note that this option applies to protocol version 2 only. | ||
833 | .It Cm HashKnownHosts | 831 | .It Cm HashKnownHosts |
834 | Indicates that | 832 | Indicates that |
835 | .Xr ssh 1 | 833 | .Xr ssh 1 |
@@ -856,9 +854,6 @@ or | |||
856 | .Dq no . | 854 | .Dq no . |
857 | The default is | 855 | The default is |
858 | .Dq no . | 856 | .Dq no . |
859 | This option applies to protocol version 2 only and | ||
860 | is similar to | ||
861 | .Cm RhostsRSAAuthentication . | ||
862 | .It Cm HostbasedKeyTypes | 857 | .It Cm HostbasedKeyTypes |
863 | Specifies the key types that will be used for hostbased authentication | 858 | Specifies the key types that will be used for hostbased authentication |
864 | as a comma-separated pattern list. | 859 | as a comma-separated pattern list. |
@@ -883,7 +878,7 @@ option of | |||
883 | .Xr ssh 1 | 878 | .Xr ssh 1 |
884 | may be used to list supported key types. | 879 | may be used to list supported key types. |
885 | .It Cm HostKeyAlgorithms | 880 | .It Cm HostKeyAlgorithms |
886 | Specifies the protocol version 2 host key algorithms | 881 | Specifies the host key algorithms |
887 | that the client wants to use in order of preference. | 882 | that the client wants to use in order of preference. |
888 | Alternately if the specified value begins with a | 883 | Alternately if the specified value begins with a |
889 | .Sq + | 884 | .Sq + |
@@ -1170,8 +1165,7 @@ DEBUG2 and DEBUG3 each specify higher levels of verbose output. | |||
1170 | .It Cm MACs | 1165 | .It Cm MACs |
1171 | Specifies the MAC (message authentication code) algorithms | 1166 | Specifies the MAC (message authentication code) algorithms |
1172 | in order of preference. | 1167 | in order of preference. |
1173 | The MAC algorithm is used in protocol version 2 | 1168 | The MAC algorithm is used for data integrity protection. |
1174 | for data integrity protection. | ||
1175 | Multiple algorithms must be comma-separated. | 1169 | Multiple algorithms must be comma-separated. |
1176 | If the specified value begins with a | 1170 | If the specified value begins with a |
1177 | .Sq + | 1171 | .Sq + |
@@ -1243,8 +1237,7 @@ private RSA key. | |||
1243 | Specifies the port number to connect on the remote host. | 1237 | Specifies the port number to connect on the remote host. |
1244 | The default is 22. | 1238 | The default is 22. |
1245 | .It Cm PreferredAuthentications | 1239 | .It Cm PreferredAuthentications |
1246 | Specifies the order in which the client should try protocol 2 | 1240 | Specifies the order in which the client should try authentication methods. |
1247 | authentication methods. | ||
1248 | This allows a client to prefer one method (e.g.\& | 1241 | This allows a client to prefer one method (e.g.\& |
1249 | .Cm keyboard-interactive ) | 1242 | .Cm keyboard-interactive ) |
1250 | over another method (e.g.\& | 1243 | over another method (e.g.\& |
@@ -1353,7 +1346,6 @@ or | |||
1353 | .Dq no . | 1346 | .Dq no . |
1354 | The default is | 1347 | The default is |
1355 | .Dq yes . | 1348 | .Dq yes . |
1356 | This option applies to protocol version 2 only. | ||
1357 | .It Cm RekeyLimit | 1349 | .It Cm RekeyLimit |
1358 | Specifies the maximum amount of data that may be transmitted before the | 1350 | Specifies the maximum amount of data that may be transmitted before the |
1359 | session key is renegotiated, optionally followed a maximum amount of | 1351 | session key is renegotiated, optionally followed a maximum amount of |
@@ -1379,7 +1371,6 @@ is | |||
1379 | .Dq default none , | 1371 | .Dq default none , |
1380 | which means that rekeying is performed after the cipher's default amount | 1372 | which means that rekeying is performed after the cipher's default amount |
1381 | of data has been sent or received and no time based rekeying is done. | 1373 | of data has been sent or received and no time based rekeying is done. |
1382 | This option applies to protocol version 2 only. | ||
1383 | .It Cm RemoteForward | 1374 | .It Cm RemoteForward |
1384 | Specifies that a TCP port on the remote machine be forwarded over | 1375 | Specifies that a TCP port on the remote machine be forwarded over |
1385 | the secure channel to the specified host and port from the local machine. | 1376 | the secure channel to the specified host and port from the local machine. |
@@ -1472,7 +1463,6 @@ Note that this option applies to protocol version 1 only. | |||
1472 | Specifies what variables from the local | 1463 | Specifies what variables from the local |
1473 | .Xr environ 7 | 1464 | .Xr environ 7 |
1474 | should be sent to the server. | 1465 | should be sent to the server. |
1475 | Note that environment passing is only supported for protocol 2. | ||
1476 | The server must also support it, and the server must be configured to | 1466 | The server must also support it, and the server must be configured to |
1477 | accept these environment variables. | 1467 | accept these environment variables. |
1478 | Note that the | 1468 | Note that the |
@@ -1520,7 +1510,6 @@ If, for example, | |||
1520 | .Cm ServerAliveCountMax | 1510 | .Cm ServerAliveCountMax |
1521 | is left at the default, if the server becomes unresponsive, | 1511 | is left at the default, if the server becomes unresponsive, |
1522 | ssh will disconnect after approximately 45 seconds. | 1512 | ssh will disconnect after approximately 45 seconds. |
1523 | This option applies to protocol version 2 only. | ||
1524 | .It Cm ServerAliveInterval | 1513 | .It Cm ServerAliveInterval |
1525 | Sets a timeout interval in seconds after which if no data has been received | 1514 | Sets a timeout interval in seconds after which if no data has been received |
1526 | from the server, | 1515 | from the server, |
@@ -1529,7 +1518,6 @@ will send a message through the encrypted | |||
1529 | channel to request a response from the server. | 1518 | channel to request a response from the server. |
1530 | The default | 1519 | The default |
1531 | is 0, indicating that these messages will not be sent to the server. | 1520 | is 0, indicating that these messages will not be sent to the server. |
1532 | This option applies to protocol version 2 only. | ||
1533 | .It Cm StreamLocalBindMask | 1521 | .It Cm StreamLocalBindMask |
1534 | Sets the octal file creation mode mask | 1522 | Sets the octal file creation mode mask |
1535 | .Pq umask | 1523 | .Pq umask |
@@ -1726,7 +1714,6 @@ or | |||
1726 | .Dq ask . | 1714 | .Dq ask . |
1727 | The default is | 1715 | The default is |
1728 | .Dq no . | 1716 | .Dq no . |
1729 | Note that this option applies to protocol version 2 only. | ||
1730 | .Pp | 1717 | .Pp |
1731 | See also VERIFYING HOST KEYS in | 1718 | See also VERIFYING HOST KEYS in |
1732 | .Xr ssh 1 . | 1719 | .Xr ssh 1 . |