summaryrefslogtreecommitdiff
path: root/sshd.8
diff options
context:
space:
mode:
Diffstat (limited to 'sshd.8')
-rw-r--r--sshd.818
1 files changed, 9 insertions, 9 deletions
diff --git a/sshd.8 b/sshd.8
index 78f4ea10f..003f29124 100644
--- a/sshd.8
+++ b/sshd.8
@@ -9,7 +9,7 @@
9.\" 9.\"
10.\" Created: Sat Apr 22 21:55:14 1995 ylo 10.\" Created: Sat Apr 22 21:55:14 1995 ylo
11.\" 11.\"
12.\" $Id: sshd.8,v 1.21 2000/05/07 02:03:20 damien Exp $ 12.\" $Id: sshd.8,v 1.22 2000/05/09 01:03:03 damien Exp $
13.\" 13.\"
14.Dd September 25, 1999 14.Dd September 25, 1999
15.Dt SSHD 8 15.Dt SSHD 8
@@ -115,7 +115,7 @@ Blowfish, 3DES or CAST128 in CBC mode or Arcfour.
115The client selects the encryption algorithm 115The client selects the encryption algorithm
116to use from those offered by the server. 116to use from those offered by the server.
117Additionally, session integrity is provided 117Additionally, session integrity is provided
118through a crytographic message authentication code 118through a cryptographic message authentication code
119(hmac-sha1 or hmac-md5). 119(hmac-sha1 or hmac-md5).
120.Pp 120.Pp
121Protocol version 2 provides a public key based 121Protocol version 2 provides a public key based
@@ -277,7 +277,7 @@ By default login is allowed regardless of the user name.
277Specifies the ciphers allowed for protocol version 2. 277Specifies the ciphers allowed for protocol version 2.
278Multiple ciphers must be comma-separated. 278Multiple ciphers must be comma-separated.
279The default is 279The default is
280.Dq blowfish-cbc,3des-cbc,arcfour,cast128-cbc . 280.Dq 3des-cbc,blowfish-cbc,arcfour,cast128-cbc .
281.It Cm CheckMail 281.It Cm CheckMail
282Specifies whether 282Specifies whether
283.Nm 283.Nm
@@ -327,14 +327,14 @@ Specifies the file containing the private DSA host key (default
327used by SSH protocol 2.0. 327used by SSH protocol 2.0.
328Note that 328Note that
329.Nm 329.Nm
330disables protcol 2.0 if this file is group/world-accessible. 330disables protocol 2.0 if this file is group/world-accessible.
331.It Cm HostKey 331.It Cm HostKey
332Specifies the file containing the private RSA host key (default 332Specifies the file containing the private RSA host key (default
333.Pa /etc/ssh_host_key ) 333.Pa /etc/ssh_host_key )
334used by SSH protocols 1.3 and 1.5. 334used by SSH protocols 1.3 and 1.5.
335Note that 335Note that
336.Nm 336.Nm
337disables protcols 1.3 and 1.5 if this file is group/world-accessible. 337disables protocols 1.3 and 1.5 if this file is group/world-accessible.
338.It Cm IgnoreRhosts 338.It Cm IgnoreRhosts
339Specifies that 339Specifies that
340.Pa .rhosts 340.Pa .rhosts
@@ -364,7 +364,7 @@ of the machines will be properly noticed.
364However, this means that 364However, this means that
365connections will die if the route is down temporarily, and some people 365connections will die if the route is down temporarily, and some people
366find it annoying. 366find it annoying.
367On the other hand, if keepalives are not send, 367On the other hand, if keepalives are not sent,
368sessions may hang indefinitely on the server, leaving 368sessions may hang indefinitely on the server, leaving
369.Dq ghost 369.Dq ghost
370users and consuming server resources. 370users and consuming server resources.
@@ -620,7 +620,7 @@ The
620.Pa $HOME/.ssh/authorized_keys 620.Pa $HOME/.ssh/authorized_keys
621file lists the RSA keys that are 621file lists the RSA keys that are
622permitted for RSA authentication in SSH protocols 1.3 and 1.5 622permitted for RSA authentication in SSH protocols 1.3 and 1.5
623Similarily, the 623Similarly, the
624.Pa $HOME/.ssh/authorized_keys2 624.Pa $HOME/.ssh/authorized_keys2
625file lists the DSA keys that are 625file lists the DSA keys that are
626permitted for DSA authentication in SSH protocol 2.0. 626permitted for DSA authentication in SSH protocol 2.0.
@@ -679,8 +679,8 @@ A quote may be included in the command by quoting it with a backslash.
679This option might be useful 679This option might be useful
680to restrict certain RSA keys to perform just a specific operation. 680to restrict certain RSA keys to perform just a specific operation.
681An example might be a key that permits remote backups but nothing else. 681An example might be a key that permits remote backups but nothing else.
682Notice that the client may specify TCP/IP and/or X11 682Note that the client may specify TCP/IP and/or X11
683forwardings unless they are explicitly prohibited. 683forwarding unless they are explicitly prohibited.
684.It Cm environment="NAME=value" 684.It Cm environment="NAME=value"
685Specifies that the string is to be added to the environment when 685Specifies that the string is to be added to the environment when
686logging in using this key. 686logging in using this key.