summaryrefslogtreecommitdiff
path: root/sshd_config.5
diff options
context:
space:
mode:
Diffstat (limited to 'sshd_config.5')
-rw-r--r--sshd_config.527
1 files changed, 7 insertions, 20 deletions
diff --git a/sshd_config.5 b/sshd_config.5
index 711a02524..ef9190568 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: sshd_config.5,v 1.218 2016/02/16 05:11:04 djm Exp $ 36.\" $OpenBSD: sshd_config.5,v 1.219 2016/02/17 07:38:19 jmc Exp $
37.Dd $Mdocdate: February 16 2016 $ 37.Dd $Mdocdate: February 17 2016 $
38.Dt SSHD_CONFIG 5 38.Dt SSHD_CONFIG 5
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -70,8 +70,7 @@ See
70in 70in
71.Xr ssh_config 5 71.Xr ssh_config 5
72for how to configure the client. 72for how to configure the client.
73Note that environment passing is only supported for protocol 2, and 73The
74that the
75.Ev TERM 74.Ev TERM
76environment variable is always sent whenever the client 75environment variable is always sent whenever the client
77requests a pseudo-terminal as it is required by the protocol. 76requests a pseudo-terminal as it is required by the protocol.
@@ -226,7 +225,7 @@ of
226.Dq publickey,publickey 225.Dq publickey,publickey
227will require successful authentication using two different public keys. 226will require successful authentication using two different public keys.
228.Pp 227.Pp
229This option is only available for SSH protocol 2 and will yield a fatal 228This option will yield a fatal
230error if enabled if protocol 1 is also enabled. 229error if enabled if protocol 1 is also enabled.
231Note that each authentication method listed should also be explicitly enabled 230Note that each authentication method listed should also be explicitly enabled
232in the configuration. 231in the configuration.
@@ -373,7 +372,6 @@ authentication is allowed.
373If the argument is 372If the argument is
374.Dq none 373.Dq none
375then no banner is displayed. 374then no banner is displayed.
376This option is only available for protocol version 2.
377By default, no banner is displayed. 375By default, no banner is displayed.
378.It Cm ChallengeResponseAuthentication 376.It Cm ChallengeResponseAuthentication
379Specifies whether challenge-response authentication is allowed (e.g. via 377Specifies whether challenge-response authentication is allowed (e.g. via
@@ -437,7 +435,7 @@ The default is
437indicating not to 435indicating not to
438.Xr chroot 2 . 436.Xr chroot 2 .
439.It Cm Ciphers 437.It Cm Ciphers
440Specifies the ciphers allowed for protocol version 2. 438Specifies the ciphers allowed.
441Multiple ciphers must be comma-separated. 439Multiple ciphers must be comma-separated.
442If the specified value begins with a 440If the specified value begins with a
443.Sq + 441.Sq +
@@ -518,7 +516,6 @@ If
518.Cm ClientAliveCountMax 516.Cm ClientAliveCountMax
519is left at the default, unresponsive SSH clients 517is left at the default, unresponsive SSH clients
520will be disconnected after approximately 45 seconds. 518will be disconnected after approximately 45 seconds.
521This option applies to protocol version 2 only.
522.It Cm ClientAliveInterval 519.It Cm ClientAliveInterval
523Sets a timeout interval in seconds after which if no data has been received 520Sets a timeout interval in seconds after which if no data has been received
524from the client, 521from the client,
@@ -527,7 +524,6 @@ will send a message through the encrypted
527channel to request a response from the client. 524channel to request a response from the client.
528The default 525The default
529is 0, indicating that these messages will not be sent to the client. 526is 0, indicating that these messages will not be sent to the client.
530This option applies to protocol version 2 only.
531.It Cm Compression 527.It Cm Compression
532Specifies whether compression is allowed, or delayed until 528Specifies whether compression is allowed, or delayed until
533the user has authenticated successfully. 529the user has authenticated successfully.
@@ -627,13 +623,11 @@ The default is
627Specifies whether user authentication based on GSSAPI is allowed. 623Specifies whether user authentication based on GSSAPI is allowed.
628The default is 624The default is
629.Dq no . 625.Dq no .
630Note that this option applies to protocol version 2 only.
631.It Cm GSSAPICleanupCredentials 626.It Cm GSSAPICleanupCredentials
632Specifies whether to automatically destroy the user's credentials cache 627Specifies whether to automatically destroy the user's credentials cache
633on logout. 628on logout.
634The default is 629The default is
635.Dq yes . 630.Dq yes .
636Note that this option applies to protocol version 2 only.
637.It Cm GSSAPIStrictAcceptorCheck 631.It Cm GSSAPIStrictAcceptorCheck
638Determines whether to be strict about the identity of the GSSAPI acceptor 632Determines whether to be strict about the identity of the GSSAPI acceptor
639a client authenticates against. 633a client authenticates against.
@@ -676,9 +670,6 @@ may be used to list supported key types.
676Specifies whether rhosts or /etc/hosts.equiv authentication together 670Specifies whether rhosts or /etc/hosts.equiv authentication together
677with successful public key client host authentication is allowed 671with successful public key client host authentication is allowed
678(host-based authentication). 672(host-based authentication).
679This option is similar to
680.Cm RhostsRSAAuthentication
681and applies to protocol version 2 only.
682The default is 673The default is
683.Dq no . 674.Dq no .
684.It Cm HostbasedUsesNameFromPacketOnly 675.It Cm HostbasedUsesNameFromPacketOnly
@@ -749,7 +740,7 @@ is specified, the location of the socket will be read from the
749.Ev SSH_AUTH_SOCK 740.Ev SSH_AUTH_SOCK
750environment variable. 741environment variable.
751.It Cm HostKeyAlgorithms 742.It Cm HostKeyAlgorithms
752Specifies the protocol version 2 host key algorithms 743Specifies the host key algorithms
753that the server offers. 744that the server offers.
754The default for this option is: 745The default for this option is:
755.Bd -literal -offset 3n 746.Bd -literal -offset 3n
@@ -970,8 +961,7 @@ DEBUG2 and DEBUG3 each specify higher levels of debugging output.
970Logging with a DEBUG level violates the privacy of users and is not recommended. 961Logging with a DEBUG level violates the privacy of users and is not recommended.
971.It Cm MACs 962.It Cm MACs
972Specifies the available MAC (message authentication code) algorithms. 963Specifies the available MAC (message authentication code) algorithms.
973The MAC algorithm is used in protocol version 2 964The MAC algorithm is used for data integrity protection.
974for data integrity protection.
975Multiple algorithms must be comma-separated. 965Multiple algorithms must be comma-separated.
976If the specified value begins with a 966If the specified value begins with a
977.Sq + 967.Sq +
@@ -1380,7 +1370,6 @@ may be used to list supported key types.
1380Specifies whether public key authentication is allowed. 1370Specifies whether public key authentication is allowed.
1381The default is 1371The default is
1382.Dq yes . 1372.Dq yes .
1383Note that this option applies to protocol version 2 only.
1384.It Cm RekeyLimit 1373.It Cm RekeyLimit
1385Specifies the maximum amount of data that may be transmitted before the 1374Specifies the maximum amount of data that may be transmitted before the
1386session key is renegotiated, optionally followed a maximum amount of 1375session key is renegotiated, optionally followed a maximum amount of
@@ -1406,7 +1395,6 @@ is
1406.Dq default none , 1395.Dq default none ,
1407which means that rekeying is performed after the cipher's default amount 1396which means that rekeying is performed after the cipher's default amount
1408of data has been sent or received and no time based rekeying is done. 1397of data has been sent or received and no time based rekeying is done.
1409This option applies to protocol version 2 only.
1410.It Cm RevokedKeys 1398.It Cm RevokedKeys
1411Specifies revoked public keys file, or 1399Specifies revoked public keys file, or
1412.Dq none 1400.Dq none
@@ -1493,7 +1481,6 @@ This may simplify configurations using
1493to force a different filesystem root on clients. 1481to force a different filesystem root on clients.
1494.Pp 1482.Pp
1495By default no subsystems are defined. 1483By default no subsystems are defined.
1496Note that this option applies to protocol version 2 only.
1497.It Cm SyslogFacility 1484.It Cm SyslogFacility
1498Gives the facility code that is used when logging messages from 1485Gives the facility code that is used when logging messages from
1499.Xr sshd 8 . 1486.Xr sshd 8 .