summaryrefslogtreecommitdiff
path: root/sshd.8
diff options
context:
space:
mode:
Diffstat (limited to 'sshd.8')
-rw-r--r--sshd.855
1 files changed, 44 insertions, 11 deletions
diff --git a/sshd.8 b/sshd.8
index 17b917c06..4e7556736 100644
--- a/sshd.8
+++ b/sshd.8
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: sshd.8,v 1.280 2015/07/03 03:49:45 djm Exp $ 36.\" $OpenBSD: sshd.8,v 1.284 2016/02/17 07:38:19 jmc Exp $
37.Dd $Mdocdate: July 3 2015 $ 37.Dd $Mdocdate: February 17 2016 $
38.Dt SSHD 8 38.Dt SSHD 8
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -278,14 +278,12 @@ though this can be changed via the
278.Cm Protocol 278.Cm Protocol
279option in 279option in
280.Xr sshd_config 5 . 280.Xr sshd_config 5 .
281Protocol 2 supports DSA, ECDSA, Ed25519 and RSA keys; 281Protocol 1 should not be used
282protocol 1 only supports RSA keys. 282and is only offered to support legacy devices.
283For both protocols,
284each host has a host-specific key,
285normally 2048 bits,
286used to identify the host.
287.Pp 283.Pp
288Forward security for protocol 1 is provided through 284Each host has a host-specific key,
285used to identify the host.
286Partial forward security for protocol 1 is provided through
289an additional server key, 287an additional server key,
290normally 1024 bits, 288normally 1024 bits,
291generated when the server starts. 289generated when the server starts.
@@ -473,7 +471,7 @@ does not exist either, xauth is used to add the cookie.
473.Cm AuthorizedKeysFile 471.Cm AuthorizedKeysFile
474specifies the files containing public keys for 472specifies the files containing public keys for
475public key authentication; 473public key authentication;
476if none is specified, the default is 474if this option is not specified, the default is
477.Pa ~/.ssh/authorized_keys 475.Pa ~/.ssh/authorized_keys
478and 476and
479.Pa ~/.ssh/authorized_keys2 . 477.Pa ~/.ssh/authorized_keys2 .
@@ -525,6 +523,10 @@ No spaces are permitted, except within double quotes.
525The following option specifications are supported (note 523The following option specifications are supported (note
526that option keywords are case-insensitive): 524that option keywords are case-insensitive):
527.Bl -tag -width Ds 525.Bl -tag -width Ds
526.It Cm agent-forwarding
527Enable authentication agent forwarding previously disabled by the
528.Cm restrict
529option.
528.It Cm cert-authority 530.It Cm cert-authority
529Specifies that the listed key is a certification authority (CA) that is 531Specifies that the listed key is a certification authority (CA) that is
530trusted to validate signed certificates for user authentication. 532trusted to validate signed certificates for user authentication.
@@ -619,6 +621,9 @@ they must be literal domains or addresses.
619A port specification of 621A port specification of
620.Cm * 622.Cm *
621matches any port. 623matches any port.
624.It Cm port-forwarding
625Enable port forwarding previously disabled by the
626.Cm restrict
622.It Cm principals="principals" 627.It Cm principals="principals"
623On a 628On a
624.Cm cert-authority 629.Cm cert-authority
@@ -630,12 +635,33 @@ This option is ignored for keys that are not marked as trusted certificate
630signers using the 635signers using the
631.Cm cert-authority 636.Cm cert-authority
632option. 637option.
638.It Cm pty
639Permits tty allocation previously disabled by the
640.Cm restrict
641option.
642.It Cm restrict
643Enable all restrictions, i.e. disable port, agent and X11 forwarding,
644as well as disabling PTY allocation
645and execution of
646.Pa ~/.ssh/rc .
647If any future restriction capabilities are added to authorized_keys files
648they will be included in this set.
633.It Cm tunnel="n" 649.It Cm tunnel="n"
634Force a 650Force a
635.Xr tun 4 651.Xr tun 4
636device on the server. 652device on the server.
637Without this option, the next available device will be used if 653Without this option, the next available device will be used if
638the client requests a tunnel. 654the client requests a tunnel.
655.It Cm user-rc
656Enables execution of
657.Pa ~/.ssh/rc
658previously disabled by the
659.Cm restrict
660option.
661.It Cm X11-forwarding
662Permits X11 forwarding previously disabled by the
663.Cm restrict
664option.
639.El 665.El
640.Pp 666.Pp
641An example authorized_keys file: 667An example authorized_keys file:
@@ -650,6 +676,10 @@ permitopen="192.0.2.1:80",permitopen="192.0.2.2:25" ssh-dss
650AAAAB5...21S== 676AAAAB5...21S==
651tunnel="0",command="sh /etc/netstart tun0" ssh-rsa AAAA...== 677tunnel="0",command="sh /etc/netstart tun0" ssh-rsa AAAA...==
652jane@example.net 678jane@example.net
679restrict,command="uptime" ssh-rsa AAAA1C8...32Tv==
680user@example.net
681restrict,pty,command="nethack" ssh-rsa AAAA1f8...IrrC5==
682user@example.net
653.Ed 683.Ed
654.Sh SSH_KNOWN_HOSTS FILE FORMAT 684.Sh SSH_KNOWN_HOSTS FILE FORMAT
655The 685The
@@ -865,9 +895,12 @@ This file is for host-based authentication (see
865It should only be writable by root. 895It should only be writable by root.
866.Pp 896.Pp
867.It Pa /etc/ssh/moduli 897.It Pa /etc/ssh/moduli
868Contains Diffie-Hellman groups used for the "Diffie-Hellman Group Exchange". 898Contains Diffie-Hellman groups used for the "Diffie-Hellman Group Exchange"
899key exchange method.
869The file format is described in 900The file format is described in
870.Xr moduli 5 . 901.Xr moduli 5 .
902If no usable groups are found in this file then fixed internal groups will
903be used.
871.Pp 904.Pp
872.It Pa /etc/motd 905.It Pa /etc/motd
873See 906See