diff options
Diffstat (limited to 'sshd_config.5')
-rw-r--r-- | sshd_config.5 | 53 |
1 files changed, 51 insertions, 2 deletions
diff --git a/sshd_config.5 b/sshd_config.5 index 6e3c69d05..55e8d8503 100644 --- a/sshd_config.5 +++ b/sshd_config.5 | |||
@@ -34,8 +34,8 @@ | |||
34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
36 | .\" | 36 | .\" |
37 | .\" $OpenBSD: sshd_config.5,v 1.120 2010/03/04 23:17:25 djm Exp $ | 37 | .\" $OpenBSD: sshd_config.5,v 1.125 2010/06/30 07:28:34 jmc Exp $ |
38 | .Dd $Mdocdate: March 4 2010 $ | 38 | .Dd $Mdocdate: June 30 2010 $ |
39 | .Dt SSHD_CONFIG 5 | 39 | .Dt SSHD_CONFIG 5 |
40 | .Os | 40 | .Os |
41 | .Sh NAME | 41 | .Sh NAME |
@@ -155,6 +155,10 @@ for more information on patterns. | |||
155 | .It Cm AuthorizedKeysFile | 155 | .It Cm AuthorizedKeysFile |
156 | Specifies the file that contains the public keys that can be used | 156 | Specifies the file that contains the public keys that can be used |
157 | for user authentication. | 157 | for user authentication. |
158 | The format is described in the | ||
159 | .Sx AUTHORIZED_KEYS FILE FORMAT | ||
160 | section of | ||
161 | .Xr sshd 8 . | ||
158 | .Cm AuthorizedKeysFile | 162 | .Cm AuthorizedKeysFile |
159 | may contain tokens of the form %T which are substituted during connection | 163 | may contain tokens of the form %T which are substituted during connection |
160 | setup. | 164 | setup. |
@@ -167,6 +171,47 @@ is taken to be an absolute path or one relative to the user's home | |||
167 | directory. | 171 | directory. |
168 | The default is | 172 | The default is |
169 | .Dq .ssh/authorized_keys . | 173 | .Dq .ssh/authorized_keys . |
174 | .It Cm AuthorizedPrincipalsFile | ||
175 | Specifies a file that lists principal names that are accepted for | ||
176 | certificate authentication. | ||
177 | When using certificates signed by a key listed in | ||
178 | .Cm TrustedUserCAKeys , | ||
179 | this file lists names, one of which must appear in the certificate for it | ||
180 | to be accepted for authentication. | ||
181 | Names are listed one per line preceded by key options (as described | ||
182 | in | ||
183 | .Sx AUTHORIZED_KEYS FILE FORMAT | ||
184 | in | ||
185 | .Xr sshd 8 ) . | ||
186 | Empty lines and comments starting with | ||
187 | .Ql # | ||
188 | are ignored. | ||
189 | .Pp | ||
190 | .Cm AuthorizedPrincipalsFile | ||
191 | may contain tokens of the form %T which are substituted during connection | ||
192 | setup. | ||
193 | The following tokens are defined: %% is replaced by a literal '%', | ||
194 | %h is replaced by the home directory of the user being authenticated, and | ||
195 | %u is replaced by the username of that user. | ||
196 | After expansion, | ||
197 | .Cm AuthorizedPrincipalsFile | ||
198 | is taken to be an absolute path or one relative to the user's home | ||
199 | directory. | ||
200 | .Pp | ||
201 | The default is not to use a principals file \(en in this case, the username | ||
202 | of the user must appear in a certificate's principals list for it to be | ||
203 | accepted. | ||
204 | Note that | ||
205 | .Cm AuthorizedPrincipalsFile | ||
206 | is only used when authentication proceeds using a CA listed in | ||
207 | .Cm TrustedUserCAKeys | ||
208 | and is not consulted for certification authorities trusted via | ||
209 | .Pa ~/.ssh/authorized_keys , | ||
210 | though the | ||
211 | .Cm principals= | ||
212 | key option offers a similar facility (see | ||
213 | .Xr sshd 8 | ||
214 | for details). | ||
170 | .It Cm Banner | 215 | .It Cm Banner |
171 | The contents of the specified file are sent to the remote user before | 216 | The contents of the specified file are sent to the remote user before |
172 | authentication is allowed. | 217 | authentication is allowed. |
@@ -636,12 +681,15 @@ keyword. | |||
636 | Available keywords are | 681 | Available keywords are |
637 | .Cm AllowAgentForwarding , | 682 | .Cm AllowAgentForwarding , |
638 | .Cm AllowTcpForwarding , | 683 | .Cm AllowTcpForwarding , |
684 | .Cm AuthorizedKeysFile , | ||
685 | .Cm AuthorizedPrincipalsFile , | ||
639 | .Cm Banner , | 686 | .Cm Banner , |
640 | .Cm ChrootDirectory , | 687 | .Cm ChrootDirectory , |
641 | .Cm ForceCommand , | 688 | .Cm ForceCommand , |
642 | .Cm GatewayPorts , | 689 | .Cm GatewayPorts , |
643 | .Cm GSSAPIAuthentication , | 690 | .Cm GSSAPIAuthentication , |
644 | .Cm HostbasedAuthentication , | 691 | .Cm HostbasedAuthentication , |
692 | .Cm HostbasedUsesNameFromPacketOnly , | ||
645 | .Cm KbdInteractiveAuthentication , | 693 | .Cm KbdInteractiveAuthentication , |
646 | .Cm KerberosAuthentication , | 694 | .Cm KerberosAuthentication , |
647 | .Cm MaxAuthTries , | 695 | .Cm MaxAuthTries , |
@@ -650,6 +698,7 @@ Available keywords are | |||
650 | .Cm PermitEmptyPasswords , | 698 | .Cm PermitEmptyPasswords , |
651 | .Cm PermitOpen , | 699 | .Cm PermitOpen , |
652 | .Cm PermitRootLogin , | 700 | .Cm PermitRootLogin , |
701 | .Cm PermitTunnel , | ||
653 | .Cm PubkeyAuthentication , | 702 | .Cm PubkeyAuthentication , |
654 | .Cm RhostsRSAAuthentication , | 703 | .Cm RhostsRSAAuthentication , |
655 | .Cm RSAAuthentication , | 704 | .Cm RSAAuthentication , |