diff options
Diffstat (limited to 'ssh_config.5')
-rw-r--r-- | ssh_config.5 | 126 |
1 files changed, 92 insertions, 34 deletions
diff --git a/ssh_config.5 b/ssh_config.5 index 22e637265..da3c1771a 100644 --- a/ssh_config.5 +++ b/ssh_config.5 | |||
@@ -33,8 +33,8 @@ | |||
33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
35 | .\" | 35 | .\" |
36 | .\" $OpenBSD: ssh_config.5,v 1.185 2014/02/23 20:11:36 djm Exp $ | 36 | .\" $OpenBSD: ssh_config.5,v 1.191 2014/07/15 15:54:14 millert Exp $ |
37 | .Dd $Mdocdate: February 23 2014 $ | 37 | .Dd $Mdocdate: July 15 2014 $ |
38 | .Dt SSH_CONFIG 5 | 38 | .Dt SSH_CONFIG 5 |
39 | .Os | 39 | .Os |
40 | .Sh NAME | 40 | .Sh NAME |
@@ -362,30 +362,47 @@ in order of preference. | |||
362 | Multiple ciphers must be comma-separated. | 362 | Multiple ciphers must be comma-separated. |
363 | The supported ciphers are: | 363 | The supported ciphers are: |
364 | .Pp | 364 | .Pp |
365 | .Dq 3des-cbc , | 365 | .Bl -item -compact -offset indent |
366 | .Dq aes128-cbc , | 366 | .It |
367 | .Dq aes192-cbc , | 367 | 3des-cbc |
368 | .Dq aes256-cbc , | 368 | .It |
369 | .Dq aes128-ctr , | 369 | aes128-cbc |
370 | .Dq aes192-ctr , | 370 | .It |
371 | .Dq aes256-ctr , | 371 | aes192-cbc |
372 | .Dq aes128-gcm@openssh.com , | 372 | .It |
373 | .Dq aes256-gcm@openssh.com , | 373 | aes256-cbc |
374 | .Dq arcfour128 , | 374 | .It |
375 | .Dq arcfour256 , | 375 | aes128-ctr |
376 | .Dq arcfour , | 376 | .It |
377 | .Dq blowfish-cbc , | 377 | aes192-ctr |
378 | .Dq cast128-cbc , | 378 | .It |
379 | and | 379 | aes256-ctr |
380 | .Dq chacha20-poly1305@openssh.com . | 380 | .It |
381 | aes128-gcm@openssh.com | ||
382 | .It | ||
383 | aes256-gcm@openssh.com | ||
384 | .It | ||
385 | arcfour | ||
386 | .It | ||
387 | arcfour128 | ||
388 | .It | ||
389 | arcfour256 | ||
390 | .It | ||
391 | blowfish-cbc | ||
392 | .It | ||
393 | cast128-cbc | ||
394 | .It | ||
395 | chacha20-poly1305@openssh.com | ||
396 | .El | ||
381 | .Pp | 397 | .Pp |
382 | The default is: | 398 | The default is: |
383 | .Bd -literal -offset 3n | 399 | .Bd -literal -offset indent |
384 | aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128, | 400 | aes128-ctr,aes192-ctr,aes256-ctr, |
385 | aes128-gcm@openssh.com,aes256-gcm@openssh.com, | 401 | aes128-gcm@openssh.com,aes256-gcm@openssh.com, |
386 | chacha20-poly1305@openssh.com, | 402 | chacha20-poly1305@openssh.com, |
387 | aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc, | 403 | arcfour256,arcfour128, |
388 | aes256-cbc,arcfour | 404 | aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc, |
405 | aes192-cbc,aes256-cbc,arcfour | ||
389 | .Ed | 406 | .Ed |
390 | .Pp | 407 | .Pp |
391 | The list of available ciphers may also be obtained using the | 408 | The list of available ciphers may also be obtained using the |
@@ -502,14 +519,16 @@ specified on the command line, | |||
502 | .Ql %p | 519 | .Ql %p |
503 | the destination port, | 520 | the destination port, |
504 | .Ql %r | 521 | .Ql %r |
505 | by the remote login username, and | 522 | by the remote login username, |
506 | .Ql %u | 523 | .Ql %u |
507 | by the username of the user running | 524 | by the username of the user running |
508 | .Xr ssh 1 . | 525 | .Xr ssh 1 , and |
526 | .Ql \&%C | ||
527 | by a hash of the concatenation: %l%h%p%r. | ||
509 | It is recommended that any | 528 | It is recommended that any |
510 | .Cm ControlPath | 529 | .Cm ControlPath |
511 | used for opportunistic connection sharing include | 530 | used for opportunistic connection sharing include |
512 | at least %h, %p, and %r. | 531 | at least %h, %p, and %r (or alternatively %C). |
513 | This ensures that shared connections are uniquely identified. | 532 | This ensures that shared connections are uniquely identified. |
514 | .It Cm ControlPersist | 533 | .It Cm ControlPersist |
515 | When used in conjunction with | 534 | When used in conjunction with |
@@ -802,6 +821,12 @@ If the hostname contains the character sequence | |||
802 | .Ql %h , | 821 | .Ql %h , |
803 | then this will be replaced with the host name specified on the command line | 822 | then this will be replaced with the host name specified on the command line |
804 | (this is useful for manipulating unqualified names). | 823 | (this is useful for manipulating unqualified names). |
824 | The character sequence | ||
825 | .Ql %% | ||
826 | will be replaced by a single | ||
827 | .Ql % | ||
828 | character, which may be used when specifying IPv6 link-local addresses. | ||
829 | .Pp | ||
805 | The default is the name given on the command line. | 830 | The default is the name given on the command line. |
806 | Numeric IP addresses are also permitted (both on the command line and in | 831 | Numeric IP addresses are also permitted (both on the command line and in |
807 | .Cm HostName | 832 | .Cm HostName |
@@ -949,8 +974,8 @@ The default is: | |||
949 | curve25519-sha256@libssh.org, | 974 | curve25519-sha256@libssh.org, |
950 | ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521, | 975 | ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521, |
951 | diffie-hellman-group-exchange-sha256, | 976 | diffie-hellman-group-exchange-sha256, |
952 | diffie-hellman-group-exchange-sha1, | ||
953 | diffie-hellman-group14-sha1, | 977 | diffie-hellman-group14-sha1, |
978 | diffie-hellman-group-exchange-sha1, | ||
954 | diffie-hellman-group1-sha1 | 979 | diffie-hellman-group1-sha1 |
955 | .Ed | 980 | .Ed |
956 | .It Cm LocalCommand | 981 | .It Cm LocalCommand |
@@ -972,7 +997,9 @@ The following escape character substitutions will be performed: | |||
972 | .Ql %r | 997 | .Ql %r |
973 | (remote user name) or | 998 | (remote user name) or |
974 | .Ql %u | 999 | .Ql %u |
975 | (local user name). | 1000 | (local user name) or |
1001 | .Ql \&%C | ||
1002 | by a hash of the concatenation: %l%h%p%r. | ||
976 | .Pp | 1003 | .Pp |
977 | The command is run synchronously and does not have access to the | 1004 | The command is run synchronously and does not have access to the |
978 | session of the | 1005 | session of the |
@@ -1030,13 +1057,14 @@ calculate the MAC after encryption (encrypt-then-mac). | |||
1030 | These are considered safer and their use recommended. | 1057 | These are considered safer and their use recommended. |
1031 | The default is: | 1058 | The default is: |
1032 | .Bd -literal -offset indent | 1059 | .Bd -literal -offset indent |
1033 | hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com, | ||
1034 | umac-64-etm@openssh.com,umac-128-etm@openssh.com, | 1060 | umac-64-etm@openssh.com,umac-128-etm@openssh.com, |
1035 | hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com, | 1061 | hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com, |
1036 | hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com, | 1062 | umac-64@openssh.com,umac-128@openssh.com, |
1037 | hmac-md5-96-etm@openssh.com, | 1063 | hmac-sha2-256,hmac-sha2-512, |
1038 | hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com, | 1064 | hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com, |
1039 | hmac-sha2-256,hmac-sha2-512,hmac-ripemd160, | 1065 | hmac-ripemd160-etm@openssh.com, |
1066 | hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com, | ||
1067 | hmac-md5,hmac-sha1,hmac-ripemd160, | ||
1040 | hmac-sha1-96,hmac-md5-96 | 1068 | hmac-sha1-96,hmac-md5-96 |
1041 | .Ed | 1069 | .Ed |
1042 | .It Cm NoHostAuthenticationForLocalhost | 1070 | .It Cm NoHostAuthenticationForLocalhost |
@@ -1114,8 +1142,11 @@ The default is | |||
1114 | .It Cm ProxyCommand | 1142 | .It Cm ProxyCommand |
1115 | Specifies the command to use to connect to the server. | 1143 | Specifies the command to use to connect to the server. |
1116 | The command | 1144 | The command |
1117 | string extends to the end of the line, and is executed with | 1145 | string extends to the end of the line, and is executed |
1118 | the user's shell. | 1146 | using the user's shell |
1147 | .Ql exec | ||
1148 | directive to avoid a lingering shell process. | ||
1149 | .Pp | ||
1119 | In the command string, any occurrence of | 1150 | In the command string, any occurrence of |
1120 | .Ql %h | 1151 | .Ql %h |
1121 | will be substituted by the host name to | 1152 | will be substituted by the host name to |
@@ -1338,6 +1369,33 @@ This option applies to protocol version 2 only. | |||
1338 | and | 1369 | and |
1339 | .Cm SetupTimeOut | 1370 | .Cm SetupTimeOut |
1340 | are Debian-specific compatibility aliases for this option. | 1371 | are Debian-specific compatibility aliases for this option. |
1372 | .It Cm StreamLocalBindMask | ||
1373 | Sets the octal file creation mode mask | ||
1374 | .Pq umask | ||
1375 | used when creating a Unix-domain socket file for local or remote | ||
1376 | port forwarding. | ||
1377 | This option is only used for port forwarding to a Unix-domain socket file. | ||
1378 | .Pp | ||
1379 | The default value is 0177, which creates a Unix-domain socket file that is | ||
1380 | readable and writable only by the owner. | ||
1381 | Note that not all operating systems honor the file mode on Unix-domain | ||
1382 | socket files. | ||
1383 | .It Cm StreamLocalBindUnlink | ||
1384 | Specifies whether to remove an existing Unix-domain socket file for local | ||
1385 | or remote port forwarding before creating a new one. | ||
1386 | If the socket file already exists and | ||
1387 | .Cm StreamLocalBindUnlink | ||
1388 | is not enabled, | ||
1389 | .Nm ssh | ||
1390 | will be unable to forward the port to the Unix-domain socket file. | ||
1391 | This option is only used for port forwarding to a Unix-domain socket file. | ||
1392 | .Pp | ||
1393 | The argument must be | ||
1394 | .Dq yes | ||
1395 | or | ||
1396 | .Dq no . | ||
1397 | The default is | ||
1398 | .Dq no . | ||
1341 | .It Cm StrictHostKeyChecking | 1399 | .It Cm StrictHostKeyChecking |
1342 | If this flag is set to | 1400 | If this flag is set to |
1343 | .Dq yes , | 1401 | .Dq yes , |