summaryrefslogtreecommitdiff
path: root/ssh_config.5
diff options
context:
space:
mode:
Diffstat (limited to 'ssh_config.5')
-rw-r--r--ssh_config.5145
1 files changed, 109 insertions, 36 deletions
diff --git a/ssh_config.5 b/ssh_config.5
index 81b9b740f..51765c99e 100644
--- a/ssh_config.5
+++ b/ssh_config.5
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: ssh_config.5,v 1.215 2015/08/14 15:32:41 jmc Exp $ 36.\" $OpenBSD: ssh_config.5,v 1.228 2016/02/20 23:01:46 sobrado Exp $
37.Dd $Mdocdate: August 14 2015 $ 37.Dd $Mdocdate: February 20 2016 $
38.Dt SSH_CONFIG 5 38.Dt SSH_CONFIG 5
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -155,7 +155,7 @@ or
155keyword) to be used only when the conditions following the 155keyword) to be used only when the conditions following the
156.Cm Match 156.Cm Match
157keyword are satisfied. 157keyword are satisfied.
158Match conditions are specified using one or more critera 158Match conditions are specified using one or more criteria
159or the single token 159or the single token
160.Cm all 160.Cm all
161which always matches. 161which always matches.
@@ -237,6 +237,39 @@ keyword matches against the name of the local user running
237(this keyword may be useful in system-wide 237(this keyword may be useful in system-wide
238.Nm 238.Nm
239files). 239files).
240.It Cm AddKeysToAgent
241Specifies whether keys should be automatically added to a running
242.Xr ssh-agent 1 .
243If this option is set to
244.Dq yes
245and a key is loaded from a file, the key and its passphrase are added to
246the agent with the default lifetime, as if by
247.Xr ssh-add 1 .
248If this option is set to
249.Dq ask ,
250.Nm ssh
251will require confirmation using the
252.Ev SSH_ASKPASS
253program before adding a key (see
254.Xr ssh-add 1
255for details).
256If this option is set to
257.Dq confirm ,
258each use of the key must be confirmed, as if the
259.Fl c
260option was specified to
261.Xr ssh-add 1 .
262If this option is set to
263.Dq no ,
264no keys are added to the agent.
265The argument must be
266.Dq yes ,
267.Dq confirm ,
268.Dq ask ,
269or
270.Dq no .
271The default is
272.Dq no .
240.It Cm AddressFamily 273.It Cm AddressFamily
241Specifies which address family to use when connecting. 274Specifies which address family to use when connecting.
242Valid arguments are 275Valid arguments are
@@ -245,6 +278,8 @@ Valid arguments are
245(use IPv4 only), or 278(use IPv4 only), or
246.Dq inet6 279.Dq inet6
247(use IPv6 only). 280(use IPv6 only).
281The default is
282.Dq any .
248.It Cm BatchMode 283.It Cm BatchMode
249If set to 284If set to
250.Dq yes , 285.Dq yes ,
@@ -345,6 +380,41 @@ to be canonicalized to names in the
345or 380or
346.Dq *.c.example.com 381.Dq *.c.example.com
347domains. 382domains.
383.It Cm CertificateFile
384Specifies a file from which the user's certificate is read.
385A corresponding private key must be provided separately in order
386to use this certificate either
387from an
388.Cm IdentityFile
389directive or
390.Fl i
391flag to
392.Xr ssh 1 ,
393via
394.Xr ssh-agent 1 ,
395or via a
396.Cm PKCS11Provider .
397.Pp
398The file name may use the tilde
399syntax to refer to a user's home directory or one of the following
400escape characters:
401.Ql %d
402(local user's home directory),
403.Ql %u
404(local user name),
405.Ql %l
406(local host name),
407.Ql %h
408(remote host name) or
409.Ql %r
410(remote user name).
411.Pp
412It is possible to have multiple certificate files specified in
413configuration files; these certificates will be tried in sequence.
414Multiple
415.Cm CertificateFile
416directives will add to the list of certificates used for
417authentication.
348.It Cm ChallengeResponseAuthentication 418.It Cm ChallengeResponseAuthentication
349Specifies whether to use challenge-response authentication. 419Specifies whether to use challenge-response authentication.
350The argument to this keyword must be 420The argument to this keyword must be
@@ -438,9 +508,7 @@ The default is:
438chacha20-poly1305@openssh.com, 508chacha20-poly1305@openssh.com,
439aes128-ctr,aes192-ctr,aes256-ctr, 509aes128-ctr,aes192-ctr,aes256-ctr,
440aes128-gcm@openssh.com,aes256-gcm@openssh.com, 510aes128-gcm@openssh.com,aes256-gcm@openssh.com,
441arcfour256,arcfour128, 511aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc
442aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,
443aes192-cbc,aes256-cbc,arcfour
444.Ed 512.Ed
445.Pp 513.Pp
446The list of available ciphers may also be obtained using the 514The list of available ciphers may also be obtained using the
@@ -558,8 +626,11 @@ the destination port,
558.Ql %r 626.Ql %r
559by the remote login username, 627by the remote login username,
560.Ql %u 628.Ql %u
561by the username of the user running 629by the username and
562.Xr ssh 1 , and 630.Ql %i
631by the numeric user ID (uid) of the user running
632.Xr ssh 1 ,
633and
563.Ql \&%C 634.Ql \&%C
564by a hash of the concatenation: %l%h%p%r. 635by a hash of the concatenation: %l%h%p%r.
565It is recommended that any 636It is recommended that any
@@ -659,7 +730,14 @@ data).
659Specifies whether 730Specifies whether
660.Xr ssh 1 731.Xr ssh 1
661should terminate the connection if it cannot set up all requested 732should terminate the connection if it cannot set up all requested
662dynamic, tunnel, local, and remote port forwardings. 733dynamic, tunnel, local, and remote port forwardings, (e.g.\&
734if either end is unable to bind and listen on a specified port).
735Note that
736.Cm ExitOnForwardFailure
737does not apply to connections made over port forwardings and will not,
738for example, cause
739.Xr ssh 1
740to exit if TCP connections to the ultimate forwarding destination fail.
663The argument must be 741The argument must be
664.Dq yes 742.Dq yes
665or 743or
@@ -769,13 +847,11 @@ The default is
769Specifies whether user authentication based on GSSAPI is allowed. 847Specifies whether user authentication based on GSSAPI is allowed.
770The default is 848The default is
771.Dq no . 849.Dq no .
772Note that this option applies to protocol version 2 only.
773.It Cm GSSAPIKeyExchange 850.It Cm GSSAPIKeyExchange
774Specifies whether key exchange based on GSSAPI may be used. When using 851Specifies whether key exchange based on GSSAPI may be used. When using
775GSSAPI key exchange the server need not have a host key. 852GSSAPI key exchange the server need not have a host key.
776The default is 853The default is
777.Dq no . 854.Dq no .
778Note that this option applies to protocol version 2 only.
779.It Cm GSSAPIClientIdentity 855.It Cm GSSAPIClientIdentity
780If set, specifies the GSSAPI client identity that ssh should use when 856If set, specifies the GSSAPI client identity that ssh should use when
781connecting to the server. The default is unset, which means that the default 857connecting to the server. The default is unset, which means that the default
@@ -789,7 +865,6 @@ hostname.
789Forward (delegate) credentials to the server. 865Forward (delegate) credentials to the server.
790The default is 866The default is
791.Dq no . 867.Dq no .
792Note that this option applies to protocol version 2 connections using GSSAPI.
793.It Cm GSSAPIRenewalForcesRekey 868.It Cm GSSAPIRenewalForcesRekey
794If set to 869If set to
795.Dq yes 870.Dq yes
@@ -808,7 +883,6 @@ the hostname entered on the
808command line will be passed untouched to the GSSAPI library. 883command line will be passed untouched to the GSSAPI library.
809The default is 884The default is
810.Dq no . 885.Dq no .
811This option only applies to protocol version 2 connections using GSSAPI.
812.It Cm HashKnownHosts 886.It Cm HashKnownHosts
813Indicates that 887Indicates that
814.Xr ssh 1 888.Xr ssh 1
@@ -838,9 +912,6 @@ or
838.Dq no . 912.Dq no .
839The default is 913The default is
840.Dq no . 914.Dq no .
841This option applies to protocol version 2 only and
842is similar to
843.Cm RhostsRSAAuthentication .
844.It Cm HostbasedKeyTypes 915.It Cm HostbasedKeyTypes
845Specifies the key types that will be used for hostbased authentication 916Specifies the key types that will be used for hostbased authentication
846as a comma-separated pattern list. 917as a comma-separated pattern list.
@@ -865,7 +936,7 @@ option of
865.Xr ssh 1 936.Xr ssh 1
866may be used to list supported key types. 937may be used to list supported key types.
867.It Cm HostKeyAlgorithms 938.It Cm HostKeyAlgorithms
868Specifies the protocol version 2 host key algorithms 939Specifies the host key algorithms
869that the client wants to use in order of preference. 940that the client wants to use in order of preference.
870Alternately if the specified value begins with a 941Alternately if the specified value begins with a
871.Sq + 942.Sq +
@@ -917,9 +988,13 @@ specifications).
917.It Cm IdentitiesOnly 988.It Cm IdentitiesOnly
918Specifies that 989Specifies that
919.Xr ssh 1 990.Xr ssh 1
920should only use the authentication identity files configured in the 991should only use the authentication identity and certificate files explicitly
992configured in the
921.Nm 993.Nm
922files, 994files
995or passed on the
996.Xr ssh 1
997command-line,
923even if 998even if
924.Xr ssh-agent 1 999.Xr ssh-agent 1
925or a 1000or a
@@ -949,6 +1024,8 @@ Additionally, any identities represented by the authentication agent
949will be used for authentication unless 1024will be used for authentication unless
950.Cm IdentitiesOnly 1025.Cm IdentitiesOnly
951is set. 1026is set.
1027If no certificates have been explicitly specified by
1028.Cm CertificateFile ,
952.Xr ssh 1 1029.Xr ssh 1
953will try to load certificate information from the filename obtained by 1030will try to load certificate information from the filename obtained by
954appending 1031appending
@@ -982,6 +1059,11 @@ differs from that of other configuration directives).
982may be used in conjunction with 1059may be used in conjunction with
983.Cm IdentitiesOnly 1060.Cm IdentitiesOnly
984to select which identities in an agent are offered during authentication. 1061to select which identities in an agent are offered during authentication.
1062.Cm IdentityFile
1063may also be used in conjunction with
1064.Cm CertificateFile
1065in order to provide any certificate also needed for authentication with
1066the identity.
985.It Cm IgnoreUnknown 1067.It Cm IgnoreUnknown
986Specifies a pattern-list of unknown options to be ignored if they are 1068Specifies a pattern-list of unknown options to be ignored if they are
987encountered in configuration parsing. 1069encountered in configuration parsing.
@@ -1141,8 +1223,7 @@ DEBUG2 and DEBUG3 each specify higher levels of verbose output.
1141.It Cm MACs 1223.It Cm MACs
1142Specifies the MAC (message authentication code) algorithms 1224Specifies the MAC (message authentication code) algorithms
1143in order of preference. 1225in order of preference.
1144The MAC algorithm is used in protocol version 2 1226The MAC algorithm is used for data integrity protection.
1145for data integrity protection.
1146Multiple algorithms must be comma-separated. 1227Multiple algorithms must be comma-separated.
1147If the specified value begins with a 1228If the specified value begins with a
1148.Sq + 1229.Sq +
@@ -1158,13 +1239,9 @@ The default is:
1158.Bd -literal -offset indent 1239.Bd -literal -offset indent
1159umac-64-etm@openssh.com,umac-128-etm@openssh.com, 1240umac-64-etm@openssh.com,umac-128-etm@openssh.com,
1160hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com, 1241hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,
1242hmac-sha1-etm@openssh.com,
1161umac-64@openssh.com,umac-128@openssh.com, 1243umac-64@openssh.com,umac-128@openssh.com,
1162hmac-sha2-256,hmac-sha2-512, 1244hmac-sha2-256,hmac-sha2-512,hmac-sha1
1163hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,
1164hmac-ripemd160-etm@openssh.com,
1165hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,
1166hmac-md5,hmac-sha1,hmac-ripemd160,
1167hmac-sha1-96,hmac-md5-96
1168.Ed 1245.Ed
1169.Pp 1246.Pp
1170The list of available MAC algorithms may also be obtained using the 1247The list of available MAC algorithms may also be obtained using the
@@ -1218,8 +1295,7 @@ private RSA key.
1218Specifies the port number to connect on the remote host. 1295Specifies the port number to connect on the remote host.
1219The default is 22. 1296The default is 22.
1220.It Cm PreferredAuthentications 1297.It Cm PreferredAuthentications
1221Specifies the order in which the client should try protocol 2 1298Specifies the order in which the client should try authentication methods.
1222authentication methods.
1223This allows a client to prefer one method (e.g.\& 1299This allows a client to prefer one method (e.g.\&
1224.Cm keyboard-interactive ) 1300.Cm keyboard-interactive )
1225over another method (e.g.\& 1301over another method (e.g.\&
@@ -1245,6 +1321,9 @@ will try version 2 and fall back to version 1
1245if version 2 is not available. 1321if version 2 is not available.
1246The default is 1322The default is
1247.Sq 2 . 1323.Sq 2 .
1324Protocol 1 suffers from a number of cryptographic weaknesses and should
1325not be used.
1326It is only offered to support legacy devices.
1248.It Cm ProxyCommand 1327.It Cm ProxyCommand
1249Specifies the command to use to connect to the server. 1328Specifies the command to use to connect to the server.
1250The command 1329The command
@@ -1325,7 +1404,6 @@ or
1325.Dq no . 1404.Dq no .
1326The default is 1405The default is
1327.Dq yes . 1406.Dq yes .
1328This option applies to protocol version 2 only.
1329.It Cm RekeyLimit 1407.It Cm RekeyLimit
1330Specifies the maximum amount of data that may be transmitted before the 1408Specifies the maximum amount of data that may be transmitted before the
1331session key is renegotiated, optionally followed a maximum amount of 1409session key is renegotiated, optionally followed a maximum amount of
@@ -1351,7 +1429,6 @@ is
1351.Dq default none , 1429.Dq default none ,
1352which means that rekeying is performed after the cipher's default amount 1430which means that rekeying is performed after the cipher's default amount
1353of data has been sent or received and no time based rekeying is done. 1431of data has been sent or received and no time based rekeying is done.
1354This option applies to protocol version 2 only.
1355.It Cm RemoteForward 1432.It Cm RemoteForward
1356Specifies that a TCP port on the remote machine be forwarded over 1433Specifies that a TCP port on the remote machine be forwarded over
1357the secure channel to the specified host and port from the local machine. 1434the secure channel to the specified host and port from the local machine.
@@ -1444,7 +1521,6 @@ Note that this option applies to protocol version 1 only.
1444Specifies what variables from the local 1521Specifies what variables from the local
1445.Xr environ 7 1522.Xr environ 7
1446should be sent to the server. 1523should be sent to the server.
1447Note that environment passing is only supported for protocol 2.
1448The server must also support it, and the server must be configured to 1524The server must also support it, and the server must be configured to
1449accept these environment variables. 1525accept these environment variables.
1450Note that the 1526Note that the
@@ -1492,7 +1568,6 @@ If, for example,
1492.Cm ServerAliveCountMax 1568.Cm ServerAliveCountMax
1493is left at the default, if the server becomes unresponsive, 1569is left at the default, if the server becomes unresponsive,
1494ssh will disconnect after approximately 45 seconds. 1570ssh will disconnect after approximately 45 seconds.
1495This option applies to protocol version 2 only.
1496.It Cm ServerAliveInterval 1571.It Cm ServerAliveInterval
1497Sets a timeout interval in seconds after which if no data has been received 1572Sets a timeout interval in seconds after which if no data has been received
1498from the server, 1573from the server,
@@ -1504,7 +1579,6 @@ is 0, indicating that these messages will not be sent to the server,
1504or 300 if the 1579or 300 if the
1505.Cm BatchMode 1580.Cm BatchMode
1506option is set. 1581option is set.
1507This option applies to protocol version 2 only.
1508.Cm ProtocolKeepAlives 1582.Cm ProtocolKeepAlives
1509and 1583and
1510.Cm SetupTimeOut 1584.Cm SetupTimeOut
@@ -1646,7 +1720,7 @@ Enabling this option allows learning alternate hostkeys for a server
1646and supports graceful key rotation by allowing a server to send replacement 1720and supports graceful key rotation by allowing a server to send replacement
1647public keys before old ones are removed. 1721public keys before old ones are removed.
1648Additional hostkeys are only accepted if the key used to authenticate the 1722Additional hostkeys are only accepted if the key used to authenticate the
1649host was already trusted or explicity accepted by the user. 1723host was already trusted or explicitly accepted by the user.
1650If 1724If
1651.Cm UpdateHostKeys 1725.Cm UpdateHostKeys
1652is set to 1726is set to
@@ -1711,7 +1785,6 @@ or
1711.Dq ask . 1785.Dq ask .
1712The default is 1786The default is
1713.Dq no . 1787.Dq no .
1714Note that this option applies to protocol version 2 only.
1715.Pp 1788.Pp
1716See also VERIFYING HOST KEYS in 1789See also VERIFYING HOST KEYS in
1717.Xr ssh 1 . 1790.Xr ssh 1 .