summaryrefslogtreecommitdiff
path: root/ssh_config.5
diff options
context:
space:
mode:
Diffstat (limited to 'ssh_config.5')
-rw-r--r--ssh_config.548
1 files changed, 26 insertions, 22 deletions
diff --git a/ssh_config.5 b/ssh_config.5
index 710c068c5..44208b431 100644
--- a/ssh_config.5
+++ b/ssh_config.5
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: ssh_config.5,v 1.6 2003/02/06 09:27:29 markus Exp $ 37.\" $OpenBSD: ssh_config.5,v 1.7 2003/03/28 10:11:43 jmc Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSH_CONFIG 5 39.Dt SSH_CONFIG 5
40.Os 40.Os
@@ -176,8 +176,8 @@ is only supported in the
176client for interoperability with legacy protocol 1 implementations 176client for interoperability with legacy protocol 1 implementations
177that do not support the 177that do not support the
178.Ar 3des 178.Ar 3des
179cipher. Its use is strongly discouraged due to cryptographic 179cipher.
180weaknesses. 180Its use is strongly discouraged due to cryptographic weaknesses.
181The default is 181The default is
182.Dq 3des . 182.Dq 3des .
183.It Cm Ciphers 183.It Cm Ciphers
@@ -193,7 +193,8 @@ The default is
193.It Cm ClearAllForwardings 193.It Cm ClearAllForwardings
194Specifies that all local, remote and dynamic port forwardings 194Specifies that all local, remote and dynamic port forwardings
195specified in the configuration files or on the command line be 195specified in the configuration files or on the command line be
196cleared. This option is primarily useful when used from the 196cleared.
197This option is primarily useful when used from the
197.Nm ssh 198.Nm ssh
198command line to clear port forwardings set in 199command line to clear port forwardings set in
199configuration files, and is automatically set by 200configuration files, and is automatically set by
@@ -230,13 +231,14 @@ The default is 1.
230Specifies that a TCP/IP port on the local machine be forwarded 231Specifies that a TCP/IP port on the local machine be forwarded
231over the secure channel, and the application 232over the secure channel, and the application
232protocol is then used to determine where to connect to from the 233protocol is then used to determine where to connect to from the
233remote machine. The argument must be a port number. 234remote machine.
235The argument must be a port number.
234Currently the SOCKS4 protocol is supported, and 236Currently the SOCKS4 protocol is supported, and
235.Nm ssh 237.Nm ssh
236will act as a SOCKS4 server. 238will act as a SOCKS4 server.
237Multiple forwardings may be specified, and 239Multiple forwardings may be specified, and
238additional forwardings can be given on the command line. Only 240additional forwardings can be given on the command line.
239the superuser can forward privileged ports. 241Only the superuser can forward privileged ports.
240.It Cm EscapeChar 242.It Cm EscapeChar
241Sets the escape character (default: 243Sets the escape character (default:
242.Ql ~ ) . 244.Ql ~ ) .
@@ -259,10 +261,11 @@ or
259The default is 261The default is
260.Dq no . 262.Dq no .
261.Pp 263.Pp
262Agent forwarding should be enabled with caution. Users with the 264Agent forwarding should be enabled with caution.
263ability to bypass file permissions on the remote host (for the agent's 265Users with the ability to bypass file permissions on the remote host
264Unix-domain socket) can access the local agent through the forwarded 266(for the agent's Unix-domain socket)
265connection. An attacker cannot obtain key material from the agent, 267can access the local agent through the forwarded connection.
268An attacker cannot obtain key material from the agent,
266however they can perform operations on the keys that enable them to 269however they can perform operations on the keys that enable them to
267authenticate using the identities loaded into the agent. 270authenticate using the identities loaded into the agent.
268.It Cm ForwardX11 271.It Cm ForwardX11
@@ -277,18 +280,18 @@ or
277The default is 280The default is
278.Dq no . 281.Dq no .
279.Pp 282.Pp
280X11 forwarding should be enabled with caution. Users with the ability 283X11 forwarding should be enabled with caution.
281to bypass file permissions on the remote host (for the user's X 284Users with the ability to bypass file permissions on the remote host
282authorization database) can access the local X11 display through the 285(for the user's X authorization database)
283forwarded connection. An attacker may then be able to perform 286can access the local X11 display through the forwarded connection.
284activities such as keystroke monitoring. 287An attacker may then be able to perform activities such as keystroke monitoring.
285.It Cm GatewayPorts 288.It Cm GatewayPorts
286Specifies whether remote hosts are allowed to connect to local 289Specifies whether remote hosts are allowed to connect to local
287forwarded ports. 290forwarded ports.
288By default, 291By default,
289.Nm ssh 292.Nm ssh
290binds local port forwardings to the loopback address. This 293binds local port forwardings to the loopback address.
291prevents other remote hosts from connecting to forwarded ports. 294This prevents other remote hosts from connecting to forwarded ports.
292.Cm GatewayPorts 295.Cm GatewayPorts
293can be used to specify that 296can be used to specify that
294.Nm ssh 297.Nm ssh
@@ -395,8 +398,9 @@ Gives the verbosity level that is used when logging messages from
395.Nm ssh . 398.Nm ssh .
396The possible values are: 399The possible values are:
397QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3. 400QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3.
398The default is INFO. DEBUG and DEBUG1 are equivalent. DEBUG2 401The default is INFO.
399and DEBUG3 each specify higher levels of verbose output. 402DEBUG and DEBUG1 are equivalent.
403DEBUG2 and DEBUG3 each specify higher levels of verbose output.
400.It Cm MACs 404.It Cm MACs
401Specifies the MAC (message authentication code) algorithms 405Specifies the MAC (message authentication code) algorithms
402in order of preference. 406in order of preference.
@@ -474,8 +478,8 @@ somewhere.
474Host key management will be done using the 478Host key management will be done using the
475HostName of the host being connected (defaulting to the name typed by 479HostName of the host being connected (defaulting to the name typed by
476the user). 480the user).
477Setting the command to 481Setting the command to
478.Dq none 482.Dq none
479disables this option entirely. 483disables this option entirely.
480Note that 484Note that
481.Cm CheckHostIP 485.Cm CheckHostIP