summaryrefslogtreecommitdiff
path: root/sshd_config.5
diff options
context:
space:
mode:
Diffstat (limited to 'sshd_config.5')
-rw-r--r--sshd_config.562
1 files changed, 54 insertions, 8 deletions
diff --git a/sshd_config.5 b/sshd_config.5
index aa7b7c7d4..0944ba076 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: sshd_config.5,v 1.4 2002/06/22 16:45:29 stevesk Exp $ 37.\" $OpenBSD: sshd_config.5,v 1.13 2002/09/16 20:12:11 stevesk Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSHD_CONFIG 5 39.Dt SSHD_CONFIG 5
40.Os 40.Os
@@ -379,7 +379,7 @@ options must precede this option for non port qualified addresses.
379The server disconnects after this time if the user has not 379The server disconnects after this time if the user has not
380successfully logged in. 380successfully logged in.
381If the value is 0, there is no time limit. 381If the value is 0, there is no time limit.
382The default is 600 (seconds). 382The default is 120 seconds.
383.It Cm LogLevel 383.It Cm LogLevel
384Gives the verbosity level that is used when logging messages from 384Gives the verbosity level that is used when logging messages from
385.Nm sshd . 385.Nm sshd .
@@ -465,6 +465,20 @@ for root.
465If this option is set to 465If this option is set to
466.Dq no 466.Dq no
467root is not allowed to login. 467root is not allowed to login.
468.It Cm PermitUserEnvironment
469Specifies whether
470.Pa ~/.ssh/environment
471and
472.Cm environment=
473options in
474.Pa ~/.ssh/authorized_keys
475are processed by
476.Nm sshd .
477The default is
478.Dq no .
479Enabling environment processing may enable users to bypass access
480restrictions in some configurations using mechanisms such as
481.Ev LD_PRELOAD .
468.It Cm PidFile 482.It Cm PidFile
469Specifies the file that contains the process ID of the 483Specifies the file that contains the process ID of the
470.Nm sshd 484.Nm sshd
@@ -499,7 +513,7 @@ The default is
499.It Cm Protocol 513.It Cm Protocol
500Specifies the protocol versions 514Specifies the protocol versions
501.Nm sshd 515.Nm sshd
502should support. 516supports.
503The possible values are 517The possible values are
504.Dq 1 518.Dq 1
505and 519and
@@ -507,6 +521,13 @@ and
507Multiple versions must be comma-separated. 521Multiple versions must be comma-separated.
508The default is 522The default is
509.Dq 2,1 . 523.Dq 2,1 .
524Note that the order of the protocol list does not indicate preference,
525because the client selects among multiple protocol versions offered
526by the server.
527Specifying
528.Dq 2,1
529is identical to
530.Dq 1,2 .
510.It Cm PubkeyAuthentication 531.It Cm PubkeyAuthentication
511Specifies whether public key authentication is allowed. 532Specifies whether public key authentication is allowed.
512The default is 533The default is
@@ -609,10 +630,35 @@ from interfering with real X11 servers.
609The default is 10. 630The default is 10.
610.It Cm X11Forwarding 631.It Cm X11Forwarding
611Specifies whether X11 forwarding is permitted. 632Specifies whether X11 forwarding is permitted.
633The argument must be
634.Dq yes
635or
636.Dq no .
612The default is 637The default is
613.Dq no . 638.Dq no .
614Note that disabling X11 forwarding does not improve security in any 639.Pp
615way, as users can always install their own forwarders. 640When X11 forwarding is enabled, there may be additional exposure to
641the server and to client displays if the
642.Nm sshd
643proxy display is configured to listen on the wildcard address (see
644.Cm X11UseLocalhost
645below), however this is not the default.
646Additionally, the authentication spoofing and authentication data
647verification and substitution occur on the client side.
648The security risk of using X11 forwarding is that the client's X11
649display server may be exposed to attack when the ssh client requests
650forwarding (see the warnings for
651.Cm ForwardX11
652in
653.Xr ssh_config 5 ).
654A system administrator may have a stance in which they want to
655protect clients that may expose themselves to attack by unwittingly
656requesting X11 forwarding, which can warrant a
657.Dq no
658setting.
659.Pp
660Note that disabling X11 forwarding does not prevent users from
661forwarding X11 traffic, as users can always install their own forwarders.
616X11 forwarding is automatically disabled if 662X11 forwarding is automatically disabled if
617.Cm UseLogin 663.Cm UseLogin
618is enabled. 664is enabled.
@@ -627,7 +673,7 @@ hostname part of the
627.Ev DISPLAY 673.Ev DISPLAY
628environment variable to 674environment variable to
629.Dq localhost . 675.Dq localhost .
630This prevents remote hosts from connecting to the fake display. 676This prevents remote hosts from connecting to the proxy display.
631However, some older X11 clients may not function with this 677However, some older X11 clients may not function with this
632configuration. 678configuration.
633.Cm X11UseLocalhost 679.Cm X11UseLocalhost
@@ -642,7 +688,7 @@ or
642The default is 688The default is
643.Dq yes . 689.Dq yes .
644.It Cm XAuthLocation 690.It Cm XAuthLocation
645Specifies the location of the 691Specifies the full pathname of the
646.Xr xauth 1 692.Xr xauth 1
647program. 693program.
648The default is 694The default is
@@ -654,7 +700,7 @@ The default is
654command-line arguments and configuration file options that specify time 700command-line arguments and configuration file options that specify time
655may be expressed using a sequence of the form: 701may be expressed using a sequence of the form:
656.Sm off 702.Sm off
657.Ar time Oo Ar qualifier Oc , 703.Ar time Op Ar qualifier ,
658.Sm on 704.Sm on
659where 705where
660.Ar time 706.Ar time