summaryrefslogtreecommitdiff
path: root/sshd_config.5
diff options
context:
space:
mode:
Diffstat (limited to 'sshd_config.5')
-rw-r--r--sshd_config.528
1 files changed, 20 insertions, 8 deletions
diff --git a/sshd_config.5 b/sshd_config.5
index 2387b51b8..79f2d611f 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: sshd_config.5,v 1.220 2016/02/17 08:57:34 djm Exp $ 36.\" $OpenBSD: sshd_config.5,v 1.227 2016/07/19 12:59:16 jmc Exp $
37.Dd $Mdocdate: February 17 2016 $ 37.Dd $Mdocdate: July 19 2016 $
38.Dt SSHD_CONFIG 5 38.Dt SSHD_CONFIG 5
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -198,6 +198,8 @@ By default, login is allowed for all users.
198If the pattern takes the form USER@HOST then USER and HOST 198If the pattern takes the form USER@HOST then USER and HOST
199are separately checked, restricting logins to particular 199are separately checked, restricting logins to particular
200users from particular hosts. 200users from particular hosts.
201HOST criteria may additionally contain addresses to match in CIDR
202address/masklen format.
201The allow/deny directives are processed in the following order: 203The allow/deny directives are processed in the following order:
202.Cm DenyUsers , 204.Cm DenyUsers ,
203.Cm AllowUsers , 205.Cm AllowUsers ,
@@ -212,9 +214,12 @@ for more information on patterns.
212Specifies the authentication methods that must be successfully completed 214Specifies the authentication methods that must be successfully completed
213for a user to be granted access. 215for a user to be granted access.
214This option must be followed by one or more comma-separated lists of 216This option must be followed by one or more comma-separated lists of
215authentication method names. 217authentication method names, or by the single string
216Successful authentication requires completion of every method in at least 218.Dq any
217one of these lists. 219to indicate the default behaviour of accepting any single authentication
220method.
221if the default is overridden, then successful authentication requires
222completion of every method in at least one of these lists.
218.Pp 223.Pp
219For example, an argument of 224For example, an argument of
220.Dq publickey,password publickey,keyboard-interactive 225.Dq publickey,password publickey,keyboard-interactive
@@ -254,7 +259,9 @@ This option will yield a fatal
254error if enabled if protocol 1 is also enabled. 259error if enabled if protocol 1 is also enabled.
255Note that each authentication method listed should also be explicitly enabled 260Note that each authentication method listed should also be explicitly enabled
256in the configuration. 261in the configuration.
257The default is not to require multiple authentication; successful completion 262The default
263.Dq any
264is not to require multiple authentication; successful completion
258of a single authentication method is sufficient. 265of a single authentication method is sufficient.
259.It Cm AuthorizedKeysCommand 266.It Cm AuthorizedKeysCommand
260Specifies a program to be used to look up the user's public keys. 267Specifies a program to be used to look up the user's public keys.
@@ -589,6 +596,8 @@ By default, login is allowed for all users.
589If the pattern takes the form USER@HOST then USER and HOST 596If the pattern takes the form USER@HOST then USER and HOST
590are separately checked, restricting logins to particular 597are separately checked, restricting logins to particular
591users from particular hosts. 598users from particular hosts.
599HOST criteria may additionally contain addresses to match in CIDR
600address/masklen format.
592The allow/deny directives are processed in the following order: 601The allow/deny directives are processed in the following order:
593.Cm DenyUsers , 602.Cm DenyUsers ,
594.Cm AllowUsers , 603.Cm AllowUsers ,
@@ -773,7 +782,7 @@ to an
773.It Cm HostKeyAgent 782.It Cm HostKeyAgent
774Identifies the UNIX-domain socket used to communicate 783Identifies the UNIX-domain socket used to communicate
775with an agent that has access to the private host keys. 784with an agent that has access to the private host keys.
776If 785If the string
777.Dq SSH_AUTH_SOCK 786.Dq SSH_AUTH_SOCK
778is specified, the location of the socket will be read from the 787is specified, the location of the socket will be read from the
779.Ev SSH_AUTH_SOCK 788.Ev SSH_AUTH_SOCK
@@ -1245,6 +1254,9 @@ can be used to remove all restrictions and permit any forwarding requests.
1245An argument of 1254An argument of
1246.Dq none 1255.Dq none
1247can be used to prohibit all forwarding requests. 1256can be used to prohibit all forwarding requests.
1257The wildcard
1258.Dq *
1259can be used for host or port to allow all hosts or ports, respectively.
1248By default all port forwarding requests are permitted. 1260By default all port forwarding requests are permitted.
1249.It Cm PermitRootLogin 1261.It Cm PermitRootLogin
1250Specifies whether root can log in using 1262Specifies whether root can log in using
@@ -1576,7 +1588,7 @@ very same IP address.
1576If this option is set to 1588If this option is set to
1577.Dq no 1589.Dq no
1578(the default) then only addresses and not host names may be used in 1590(the default) then only addresses and not host names may be used in
1579.Pa ~/.ssh/known_hosts 1591.Pa ~/.ssh/authorized_keys
1580.Cm from 1592.Cm from
1581and 1593and
1582.Nm 1594.Nm