summaryrefslogtreecommitdiff
path: root/ssh_config.5
diff options
context:
space:
mode:
Diffstat (limited to 'ssh_config.5')
-rw-r--r--ssh_config.575
1 files changed, 69 insertions, 6 deletions
diff --git a/ssh_config.5 b/ssh_config.5
index 0fd3ea5f8..a8767b493 100644
--- a/ssh_config.5
+++ b/ssh_config.5
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: ssh_config.5,v 1.29 2004/03/05 10:53:58 markus Exp $ 37.\" $OpenBSD: ssh_config.5,v 1.38 2004/06/26 09:11:14 jmc Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSH_CONFIG 5 39.Dt SSH_CONFIG 5
40.Os 40.Os
@@ -192,6 +192,18 @@ The default is
192Specifies the ciphers allowed for protocol version 2 192Specifies the ciphers allowed for protocol version 2
193in order of preference. 193in order of preference.
194Multiple ciphers must be comma-separated. 194Multiple ciphers must be comma-separated.
195The supported ciphers are
196.Dq 3des-cbc ,
197.Dq aes128-cbc ,
198.Dq aes192-cbc ,
199.Dq aes256-cbc ,
200.Dq aes128-ctr ,
201.Dq aes192-ctr ,
202.Dq aes256-ctr ,
203.Dq arcfour ,
204.Dq blowfish-cbc ,
205and
206.Dq cast128-cbc .
195The default is 207The default is
196.Bd -literal 208.Bd -literal
197 ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour, 209 ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,
@@ -239,6 +251,37 @@ Specifies the timeout (in seconds) used when connecting to the ssh
239server, instead of using the default system TCP timeout. 251server, instead of using the default system TCP timeout.
240This value is used only when the target is down or really unreachable, 252This value is used only when the target is down or really unreachable,
241not when it refuses the connection. 253not when it refuses the connection.
254.It Cm ControlMaster
255Enables the sharing of multiple sessions over a single network connection.
256When set to
257.Dq yes
258.Nm ssh
259will listen for connections on a control socket specified using the
260.Cm ControlPath
261argument.
262Additional sessions can connect to this socket using the same
263.Cm ControlPath
264with
265.Cm ControlMaster
266set to
267.Dq no
268(the default).
269These sessions will reuse the master instance's network connection rather
270than initiating new ones.
271Setting this to
272.Dq ask
273will cause
274.Nm ssh
275to listen for control connections, but require confirmation using the
276.Ev SSH_ASKPASS
277program before they are accepted (see
278.Xr ssh-add 1
279for details).
280.It Cm ControlPath
281Specify the path to the control socket used for connection sharing.
282See
283.Cm ControlMaster
284above.
242.It Cm DynamicForward 285.It Cm DynamicForward
243Specifies that a TCP/IP port on the local machine be forwarded 286Specifies that a TCP/IP port on the local machine be forwarded
244over the secure channel, and the application 287over the secure channel, and the application
@@ -320,7 +363,7 @@ if the
320.Cm ForwardX11Trusted 363.Cm ForwardX11Trusted
321option is also enabled. 364option is also enabled.
322.It Cm ForwardX11Trusted 365.It Cm ForwardX11Trusted
323If the this option is set to 366If this option is set to
324.Dq yes 367.Dq yes
325then remote X11 clients will have full access to the original X11 display. 368then remote X11 clients will have full access to the original X11 display.
326If this option is set to 369If this option is set to
@@ -418,7 +461,7 @@ identities will be tried in sequence.
418Specifies that 461Specifies that
419.Nm ssh 462.Nm ssh
420should only use the authentication identity files configured in the 463should only use the authentication identity files configured in the
421.Nm 464.Nm
422files, 465files,
423even if the 466even if the
424.Nm ssh-agent 467.Nm ssh-agent
@@ -578,6 +621,27 @@ running.
578The default is 621The default is
579.Dq yes . 622.Dq yes .
580Note that this option applies to protocol version 1 only. 623Note that this option applies to protocol version 1 only.
624.It Cm SendEnv
625Specifies what variables from the local
626.Xr environ 7
627should be sent to the server.
628Note that environment passing is only supported for protocol 2, the
629server must also support it, and the server must be configured to
630accept these environment variables.
631Refer to
632.Cm AcceptEnv
633in
634.Xr sshd_config 5
635for how to configure the server.
636Variables are specified by name, which may contain the wildcard characters
637.Ql \&*
638and
639.Ql \&? .
640Multiple environment variables may be separated by whitespace or spread
641across multiple
642.Cm SendEnv
643directives.
644The default is not to send any environment variables.
581.It Cm ServerAliveInterval 645.It Cm ServerAliveInterval
582Sets a timeout interval in seconds after which if no data has been received 646Sets a timeout interval in seconds after which if no data has been received
583from the server, 647from the server,
@@ -767,9 +831,8 @@ The format of this file is described above.
767This file is used by the 831This file is used by the
768.Nm ssh 832.Nm ssh
769client. 833client.
770This file does not usually contain any sensitive information, 834Because of the potential for abuse, this file must have strict permissions:
771but the recommended permissions are read/write for the user, and not 835read/write for the user, and not accessible by others.
772accessible by others.
773.It Pa /etc/ssh/ssh_config 836.It Pa /etc/ssh/ssh_config
774Systemwide configuration file. 837Systemwide configuration file.
775This file provides defaults for those 838This file provides defaults for those