summaryrefslogtreecommitdiff
path: root/ssh_config.5
diff options
context:
space:
mode:
Diffstat (limited to 'ssh_config.5')
-rw-r--r--ssh_config.552
1 files changed, 42 insertions, 10 deletions
diff --git a/ssh_config.5 b/ssh_config.5
index eab8dd01c..71705cabd 100644
--- a/ssh_config.5
+++ b/ssh_config.5
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: ssh_config.5,v 1.256 2017/09/21 19:16:53 markus Exp $ 36.\" $OpenBSD: ssh_config.5,v 1.268 2018/02/23 07:38:09 jmc Exp $
37.Dd $Mdocdate: September 21 2017 $ 37.Dd $Mdocdate: February 23 2018 $
38.Dt SSH_CONFIG 5 38.Dt SSH_CONFIG 5
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -262,6 +262,13 @@ Note that this option does not work if
262.Cm UsePrivilegedPort 262.Cm UsePrivilegedPort
263is set to 263is set to
264.Cm yes . 264.Cm yes .
265.It Cm BindInterface
266Use the address of the specified interface on the local machine as the
267source address of the connection.
268Note that this option does not work if
269.Cm UsePrivilegedPort
270is set to
271.Cm yes .
265.It Cm CanonicalDomains 272.It Cm CanonicalDomains
266When 273When
267.Cm CanonicalizeHostname 274.Cm CanonicalizeHostname
@@ -1015,7 +1022,10 @@ The default is:
1015curve25519-sha256,curve25519-sha256@libssh.org, 1022curve25519-sha256,curve25519-sha256@libssh.org,
1016ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521, 1023ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,
1017diffie-hellman-group-exchange-sha256, 1024diffie-hellman-group-exchange-sha256,
1025diffie-hellman-group16-sha512,
1026diffie-hellman-group18-sha512,
1018diffie-hellman-group-exchange-sha1, 1027diffie-hellman-group-exchange-sha1,
1028diffie-hellman-group14-sha256,
1019diffie-hellman-group14-sha1 1029diffie-hellman-group14-sha1
1020.Ed 1030.Ed
1021.Pp 1031.Pp
@@ -1107,10 +1117,7 @@ hmac-sha2-256,hmac-sha2-512,hmac-sha1
1107The list of available MAC algorithms may also be obtained using 1117The list of available MAC algorithms may also be obtained using
1108.Qq ssh -Q mac . 1118.Qq ssh -Q mac .
1109.It Cm NoHostAuthenticationForLocalhost 1119.It Cm NoHostAuthenticationForLocalhost
1110This option can be used if the home directory is shared across machines. 1120Disable host authentication for localhost (loopback addresses).
1111In this case localhost will refer to a different machine on each of
1112the machines and the user will get many warnings about changed host keys.
1113However, this option disables host authentication for localhost.
1114The argument to this keyword must be 1121The argument to this keyword must be
1115.Cm yes 1122.Cm yes
1116or 1123or
@@ -1198,13 +1205,14 @@ For example, the following directive would connect via an HTTP proxy at
1198ProxyCommand /usr/bin/nc -X connect -x 192.0.2.0:8080 %h %p 1205ProxyCommand /usr/bin/nc -X connect -x 192.0.2.0:8080 %h %p
1199.Ed 1206.Ed
1200.It Cm ProxyJump 1207.It Cm ProxyJump
1201Specifies one or more jump proxies as 1208Specifies one or more jump proxies as either
1202.Xo 1209.Xo
1203.Sm off 1210.Sm off
1204.Op Ar user No @ 1211.Op Ar user No @
1205.Ar host 1212.Ar host
1206.Op : Ns Ar port 1213.Op : Ns Ar port
1207.Sm on 1214.Sm on
1215or an ssh URI
1208.Xc . 1216.Xc .
1209Multiple proxies may be separated by comma characters and will be visited 1217Multiple proxies may be separated by comma characters and will be visited
1210sequentially. 1218sequentially.
@@ -1457,7 +1465,7 @@ If this flag is set to
1457will never automatically add host keys to the 1465will never automatically add host keys to the
1458.Pa ~/.ssh/known_hosts 1466.Pa ~/.ssh/known_hosts
1459file, and refuses to connect to hosts whose host key has changed. 1467file, and refuses to connect to hosts whose host key has changed.
1460This provides maximum protection against trojan horse attacks, 1468This provides maximum protection against man-in-the-middle (MITM) attacks,
1461though it can be annoying when the 1469though it can be annoying when the
1462.Pa /etc/ssh/ssh_known_hosts 1470.Pa /etc/ssh/ssh_known_hosts
1463file is poorly maintained or when connections to new hosts are 1471file is poorly maintained or when connections to new hosts are
@@ -1509,6 +1517,9 @@ This is important in scripts, and many users want it too.
1509.Pp 1517.Pp
1510To disable TCP keepalive messages, the value should be set to 1518To disable TCP keepalive messages, the value should be set to
1511.Cm no . 1519.Cm no .
1520See also
1521.Cm ServerAliveInterval
1522for protocol-level keepalives.
1512.It Cm Tunnel 1523.It Cm Tunnel
1513Request 1524Request
1514.Xr tun 4 1525.Xr tun 4
@@ -1674,6 +1685,18 @@ pool,
1674the following entry (in authorized_keys) could be used: 1685the following entry (in authorized_keys) could be used:
1675.Pp 1686.Pp
1676.Dl from=\&"!*.dialup.example.com,*.example.com\&" 1687.Dl from=\&"!*.dialup.example.com,*.example.com\&"
1688.Pp
1689Note that a negated match will never produce a positive result by itself.
1690For example, attempting to match
1691.Qq host3
1692against the following pattern-list will fail:
1693.Pp
1694.Dl from=\&"!host1,!host2\&"
1695.Pp
1696The solution here is to include a term that will yield a positive match,
1697such as a wildcard:
1698.Pp
1699.Dl from=\&"!host1,!host2,*\&"
1677.Sh TOKENS 1700.Sh TOKENS
1678Arguments to some keywords can make use of tokens, 1701Arguments to some keywords can make use of tokens,
1679which are expanded at runtime: 1702which are expanded at runtime:
@@ -1683,7 +1706,7 @@ which are expanded at runtime:
1683A literal 1706A literal
1684.Sq % . 1707.Sq % .
1685.It \&%C 1708.It \&%C
1686Shorthand for %l%h%p%r. 1709Hash of %l%h%p%r.
1687.It %d 1710.It %d
1688Local user's home directory. 1711Local user's home directory.
1689.It %h 1712.It %h
@@ -1700,6 +1723,15 @@ The original remote hostname, as given on the command line.
1700The remote port. 1723The remote port.
1701.It %r 1724.It %r
1702The remote username. 1725The remote username.
1726.It \&%T
1727The local
1728.Xr tun 4
1729or
1730.Xr tap 4
1731network interface assigned if
1732tunnel forwarding was requested, or
1733.Qq NONE
1734otherwise.
1703.It %u 1735.It %u
1704The local username. 1736The local username.
1705.El 1737.El
@@ -1722,7 +1754,7 @@ and
1722accept the tokens %%, %d, %h, %l, %r, and %u. 1754accept the tokens %%, %d, %h, %l, %r, and %u.
1723.Pp 1755.Pp
1724.Cm LocalCommand 1756.Cm LocalCommand
1725accepts the tokens %%, %C, %d, %h, %l, %n, %p, %r, and %u. 1757accepts the tokens %%, %C, %d, %h, %l, %n, %p, %r, %T, and %u.
1726.Pp 1758.Pp
1727.Cm ProxyCommand 1759.Cm ProxyCommand
1728accepts the tokens %%, %h, %p, and %r. 1760accepts the tokens %%, %h, %p, and %r.