summaryrefslogtreecommitdiff
path: root/sshd.8
diff options
context:
space:
mode:
Diffstat (limited to 'sshd.8')
-rw-r--r--sshd.855
1 files changed, 44 insertions, 11 deletions
diff --git a/sshd.8 b/sshd.8
index 213b5fc43..6c521f23e 100644
--- a/sshd.8
+++ b/sshd.8
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: sshd.8,v 1.280 2015/07/03 03:49:45 djm Exp $ 36.\" $OpenBSD: sshd.8,v 1.284 2016/02/17 07:38:19 jmc Exp $
37.Dd $Mdocdate: July 3 2015 $ 37.Dd $Mdocdate: February 17 2016 $
38.Dt SSHD 8 38.Dt SSHD 8
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -275,14 +275,12 @@ though this can be changed via the
275.Cm Protocol 275.Cm Protocol
276option in 276option in
277.Xr sshd_config 5 . 277.Xr sshd_config 5 .
278Protocol 2 supports DSA, ECDSA, Ed25519 and RSA keys; 278Protocol 1 should not be used
279protocol 1 only supports RSA keys. 279and is only offered to support legacy devices.
280For both protocols,
281each host has a host-specific key,
282normally 2048 bits,
283used to identify the host.
284.Pp 280.Pp
285Forward security for protocol 1 is provided through 281Each host has a host-specific key,
282used to identify the host.
283Partial forward security for protocol 1 is provided through
286an additional server key, 284an additional server key,
287normally 1024 bits, 285normally 1024 bits,
288generated when the server starts. 286generated when the server starts.
@@ -470,7 +468,7 @@ does not exist either, xauth is used to add the cookie.
470.Cm AuthorizedKeysFile 468.Cm AuthorizedKeysFile
471specifies the files containing public keys for 469specifies the files containing public keys for
472public key authentication; 470public key authentication;
473if none is specified, the default is 471if this option is not specified, the default is
474.Pa ~/.ssh/authorized_keys 472.Pa ~/.ssh/authorized_keys
475and 473and
476.Pa ~/.ssh/authorized_keys2 . 474.Pa ~/.ssh/authorized_keys2 .
@@ -522,6 +520,10 @@ No spaces are permitted, except within double quotes.
522The following option specifications are supported (note 520The following option specifications are supported (note
523that option keywords are case-insensitive): 521that option keywords are case-insensitive):
524.Bl -tag -width Ds 522.Bl -tag -width Ds
523.It Cm agent-forwarding
524Enable authentication agent forwarding previously disabled by the
525.Cm restrict
526option.
525.It Cm cert-authority 527.It Cm cert-authority
526Specifies that the listed key is a certification authority (CA) that is 528Specifies that the listed key is a certification authority (CA) that is
527trusted to validate signed certificates for user authentication. 529trusted to validate signed certificates for user authentication.
@@ -616,6 +618,9 @@ they must be literal domains or addresses.
616A port specification of 618A port specification of
617.Cm * 619.Cm *
618matches any port. 620matches any port.
621.It Cm port-forwarding
622Enable port forwarding previously disabled by the
623.Cm restrict
619.It Cm principals="principals" 624.It Cm principals="principals"
620On a 625On a
621.Cm cert-authority 626.Cm cert-authority
@@ -627,12 +632,33 @@ This option is ignored for keys that are not marked as trusted certificate
627signers using the 632signers using the
628.Cm cert-authority 633.Cm cert-authority
629option. 634option.
635.It Cm pty
636Permits tty allocation previously disabled by the
637.Cm restrict
638option.
639.It Cm restrict
640Enable all restrictions, i.e. disable port, agent and X11 forwarding,
641as well as disabling PTY allocation
642and execution of
643.Pa ~/.ssh/rc .
644If any future restriction capabilities are added to authorized_keys files
645they will be included in this set.
630.It Cm tunnel="n" 646.It Cm tunnel="n"
631Force a 647Force a
632.Xr tun 4 648.Xr tun 4
633device on the server. 649device on the server.
634Without this option, the next available device will be used if 650Without this option, the next available device will be used if
635the client requests a tunnel. 651the client requests a tunnel.
652.It Cm user-rc
653Enables execution of
654.Pa ~/.ssh/rc
655previously disabled by the
656.Cm restrict
657option.
658.It Cm X11-forwarding
659Permits X11 forwarding previously disabled by the
660.Cm restrict
661option.
636.El 662.El
637.Pp 663.Pp
638An example authorized_keys file: 664An example authorized_keys file:
@@ -647,6 +673,10 @@ permitopen="192.0.2.1:80",permitopen="192.0.2.2:25" ssh-dss
647AAAAB5...21S== 673AAAAB5...21S==
648tunnel="0",command="sh /etc/netstart tun0" ssh-rsa AAAA...== 674tunnel="0",command="sh /etc/netstart tun0" ssh-rsa AAAA...==
649jane@example.net 675jane@example.net
676restrict,command="uptime" ssh-rsa AAAA1C8...32Tv==
677user@example.net
678restrict,pty,command="nethack" ssh-rsa AAAA1f8...IrrC5==
679user@example.net
650.Ed 680.Ed
651.Sh SSH_KNOWN_HOSTS FILE FORMAT 681.Sh SSH_KNOWN_HOSTS FILE FORMAT
652The 682The
@@ -856,9 +886,12 @@ This file is for host-based authentication (see
856It should only be writable by root. 886It should only be writable by root.
857.Pp 887.Pp
858.It Pa /etc/moduli 888.It Pa /etc/moduli
859Contains Diffie-Hellman groups used for the "Diffie-Hellman Group Exchange". 889Contains Diffie-Hellman groups used for the "Diffie-Hellman Group Exchange"
890key exchange method.
860The file format is described in 891The file format is described in
861.Xr moduli 5 . 892.Xr moduli 5 .
893If no usable groups are found in this file then fixed internal groups will
894be used.
862.Pp 895.Pp
863.It Pa /etc/motd 896.It Pa /etc/motd
864See 897See