diff options
Diffstat (limited to 'sshd_config.0')
-rw-r--r-- | sshd_config.0 | 18 |
1 files changed, 12 insertions, 6 deletions
diff --git a/sshd_config.0 b/sshd_config.0 index d821a84b6..d2c5454e1 100644 --- a/sshd_config.0 +++ b/sshd_config.0 | |||
@@ -92,7 +92,7 @@ DESCRIPTION | |||
92 | aes192-ctr,aes256-ctr'' | 92 | aes192-ctr,aes256-ctr'' |
93 | 93 | ||
94 | ClientAliveCountMax | 94 | ClientAliveCountMax |
95 | Sets the number of client alive messages (see above) which may be | 95 | Sets the number of client alive messages (see below) which may be |
96 | sent without sshd receiving any messages back from the client. | 96 | sent without sshd receiving any messages back from the client. |
97 | If this threshold is reached while client alive messages are be- | 97 | If this threshold is reached while client alive messages are be- |
98 | ing sent, sshd will disconnect the client, terminating the ses- | 98 | ing sent, sshd will disconnect the client, terminating the ses- |
@@ -104,9 +104,10 @@ DESCRIPTION | |||
104 | able when the client or server depend on knowing when a connec- | 104 | able when the client or server depend on knowing when a connec- |
105 | tion has become inactive. | 105 | tion has become inactive. |
106 | 106 | ||
107 | The default value is 3. If ClientAliveInterval (above) is set to | 107 | The default value is 3. If ClientAliveInterval (see below) is |
108 | 15, and ClientAliveCountMax is left at the default, unresponsive | 108 | set to 15, and ClientAliveCountMax is left at the default, unre- |
109 | ssh clients will be disconnected after approximately 45 seconds. | 109 | sponsive ssh clients will be disconnected after approximately 45 |
110 | seconds. | ||
110 | 111 | ||
111 | ClientAliveInterval | 112 | ClientAliveInterval |
112 | Sets a timeout interval in seconds after which if no data has | 113 | Sets a timeout interval in seconds after which if no data has |
@@ -198,7 +199,7 @@ DESCRIPTION | |||
198 | 199 | ||
199 | KerberosGetAFSToken | 200 | KerberosGetAFSToken |
200 | If AFS is active and the user has a Kerberos 5 TGT, attempt to | 201 | If AFS is active and the user has a Kerberos 5 TGT, attempt to |
201 | aquire an AFS token before accessing the user's home directory. | 202 | acquire an AFS token before accessing the user's home directory. |
202 | Default is ``no''. | 203 | Default is ``no''. |
203 | 204 | ||
204 | KerberosOrLocalPasswd | 205 | KerberosOrLocalPasswd |
@@ -295,6 +296,11 @@ DESCRIPTION | |||
295 | 296 | ||
296 | If this option is set to ``no'' root is not allowed to log in. | 297 | If this option is set to ``no'' root is not allowed to log in. |
297 | 298 | ||
299 | PermitTunnel | ||
300 | Specifies whether tun(4) device forwarding is allowed. The argu- | ||
301 | ment must be ``yes'', ``point-to-point'', ``ethernet'' or ``no''. | ||
302 | The default is ``no''. | ||
303 | |||
298 | PermitUserEnvironment | 304 | PermitUserEnvironment |
299 | Specifies whether ~/.ssh/environment and environment= options in | 305 | Specifies whether ~/.ssh/environment and environment= options in |
300 | ~/.ssh/authorized_keys are processed by sshd. The default is | 306 | ~/.ssh/authorized_keys are processed by sshd. The default is |
@@ -501,4 +507,4 @@ AUTHORS | |||
501 | versions 1.5 and 2.0. Niels Provos and Markus Friedl contributed support | 507 | versions 1.5 and 2.0. Niels Provos and Markus Friedl contributed support |
502 | for privilege separation. | 508 | for privilege separation. |
503 | 509 | ||
504 | OpenBSD 3.8 September 25, 1999 8 | 510 | OpenBSD 3.9 September 25, 1999 8 |