summaryrefslogtreecommitdiff
path: root/sshd_config.5
diff options
context:
space:
mode:
Diffstat (limited to 'sshd_config.5')
-rw-r--r--sshd_config.545
1 files changed, 39 insertions, 6 deletions
diff --git a/sshd_config.5 b/sshd_config.5
index 6c3ef6947..6e3c69d05 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -34,8 +34,8 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: sshd_config.5,v 1.106 2009/04/21 15:13:17 stevesk Exp $ 37.\" $OpenBSD: sshd_config.5,v 1.120 2010/03/04 23:17:25 djm Exp $
38.Dd $Mdocdate: April 21 2009 $ 38.Dd $Mdocdate: March 4 2010 $
39.Dt SSHD_CONFIG 5 39.Dt SSHD_CONFIG 5
40.Os 40.Os
41.Sh NAME 41.Sh NAME
@@ -182,16 +182,16 @@ PAM or though authentication styles supported in
182The default is 182The default is
183.Dq yes . 183.Dq yes .
184.It Cm ChrootDirectory 184.It Cm ChrootDirectory
185Specifies a path to 185Specifies the pathname of a directory to
186.Xr chroot 2 186.Xr chroot 2
187to after authentication. 187to after authentication.
188This path, and all its components, must be root-owned directories that are 188All components of the pathname must be root-owned directories that are
189not writable by any other user or group. 189not writable by any other user or group.
190After the chroot, 190After the chroot,
191.Xr sshd 8 191.Xr sshd 8
192changes the working directory to the user's home directory. 192changes the working directory to the user's home directory.
193.Pp 193.Pp
194The path may contain the following tokens that are expanded at runtime once 194The pathname may contain the following tokens that are expanded at runtime once
195the connecting user has been authenticated: %% is replaced by a literal '%', 195the connecting user has been authenticated: %% is replaced by a literal '%',
196%h is replaced by the home directory of the user being authenticated, and 196%h is replaced by the home directory of the user being authenticated, and
197%u is replaced by the username of that user. 197%u is replaced by the username of that user.
@@ -439,6 +439,14 @@ uses the name supplied by the client rather than
439attempting to resolve the name from the TCP connection itself. 439attempting to resolve the name from the TCP connection itself.
440The default is 440The default is
441.Dq no . 441.Dq no .
442.It Cm HostCertificate
443Specifies a file containing a public host certificate.
444The certificate's public key must match a private host key already specified
445by
446.Cm HostKey .
447The default behaviour of
448.Xr sshd 8
449is not to load any certificates.
442.It Cm HostKey 450.It Cm HostKey
443Specifies a file containing a private host key 451Specifies a file containing a private host key
444used by SSH. 452used by SSH.
@@ -642,6 +650,7 @@ Available keywords are
642.Cm PermitEmptyPasswords , 650.Cm PermitEmptyPasswords ,
643.Cm PermitOpen , 651.Cm PermitOpen ,
644.Cm PermitRootLogin , 652.Cm PermitRootLogin ,
653.Cm PubkeyAuthentication ,
645.Cm RhostsRSAAuthentication , 654.Cm RhostsRSAAuthentication ,
646.Cm RSAAuthentication , 655.Cm RSAAuthentication ,
647.Cm X11DisplayOffset , 656.Cm X11DisplayOffset ,
@@ -820,7 +829,7 @@ and
820.Sq 2 . 829.Sq 2 .
821Multiple versions must be comma-separated. 830Multiple versions must be comma-separated.
822The default is 831The default is
823.Dq 2,1 . 832.Sq 2 .
824Note that the order of the protocol list does not indicate preference, 833Note that the order of the protocol list does not indicate preference,
825because the client selects among multiple protocol versions offered 834because the client selects among multiple protocol versions offered
826by the server. 835by the server.
@@ -833,6 +842,11 @@ Specifies whether public key authentication is allowed.
833The default is 842The default is
834.Dq yes . 843.Dq yes .
835Note that this option applies to protocol version 2 only. 844Note that this option applies to protocol version 2 only.
845.It Cm RevokedKeys
846Specifies a list of revoked public keys.
847Keys listed in this file will be refused for public key authentication.
848Note that if this file is not readable, then public key authentication will
849be refused for all users.
836.It Cm RhostsRSAAuthentication 850.It Cm RhostsRSAAuthentication
837Specifies whether rhosts or /etc/hosts.equiv authentication together 851Specifies whether rhosts or /etc/hosts.equiv authentication together
838with successful RSA host authentication is allowed. 852with successful RSA host authentication is allowed.
@@ -856,6 +870,9 @@ This is normally desirable because novices sometimes accidentally leave their
856directory or files world-writable. 870directory or files world-writable.
857The default is 871The default is
858.Dq yes . 872.Dq yes .
873Note that this does not apply to
874.Cm ChrootDirectory ,
875whose permissions and ownership are checked unconditionally.
859.It Cm Subsystem 876.It Cm Subsystem
860Configures an external subsystem (e.g. file transfer daemon). 877Configures an external subsystem (e.g. file transfer daemon).
861Arguments should be a subsystem name and a command (with optional arguments) 878Arguments should be a subsystem name and a command (with optional arguments)
@@ -905,6 +922,22 @@ This avoids infinitely hanging sessions.
905.Pp 922.Pp
906To disable TCP keepalive messages, the value should be set to 923To disable TCP keepalive messages, the value should be set to
907.Dq no . 924.Dq no .
925.It Cm TrustedUserCAKeys
926Specifies a file containing public keys of certificate authorities that are
927trusted to sign user certificates for authentication.
928Keys are listed one per line; empty lines and comments starting with
929.Ql #
930are allowed.
931If a certificate is presented for authentication and has its signing CA key
932listed in this file, then it may be used for authentication for any user
933listed in the certificate's principals list.
934Note that certificates that lack a list of principals will not be permitted
935for authentication using
936.Cm TrustedUserCAKeys .
937For more details on certificates, see the
938.Sx CERTIFICATES
939section in
940.Xr ssh-keygen 1 .
908.It Cm UseDNS 941.It Cm UseDNS
909Specifies whether 942Specifies whether
910.Xr sshd 8 943.Xr sshd 8