- jmc@cvs.openbsd.org 2006/02/13 10:16:39

[sshd.8]
     no need to subsection the authorized_keys examples - instead, convert
     this to look like an actual file. also use proto 2 keys, and use IETF
     example addresses;
This commit is contained in:
Damien Miller 2006-03-15 11:32:06 +11:00
parent 31bdc52325
commit 7d2ef02f1c
2 changed files with 16 additions and 11 deletions

View File

@ -89,6 +89,11 @@
[sshd.8] [sshd.8]
sort the list of options permissable w/ authorized_keys; sort the list of options permissable w/ authorized_keys;
ok djm dtucker ok djm dtucker
- jmc@cvs.openbsd.org 2006/02/13 10:16:39
[sshd.8]
no need to subsection the authorized_keys examples - instead, convert
this to look like an actual file. also use proto 2 keys, and use IETF
example addresses;
20060313 20060313
- (dtucker) [configure.ac] Bug #1171: Don't use printf("%lld", longlong) - (dtucker) [configure.ac] Bug #1171: Don't use printf("%lld", longlong)
@ -3990,4 +3995,4 @@
- (djm) Trim deprecated options from INSTALL. Mention UsePAM - (djm) Trim deprecated options from INSTALL. Mention UsePAM
- (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
$Id: ChangeLog,v 1.4164 2006/03/15 00:31:44 djm Exp $ $Id: ChangeLog,v 1.4165 2006/03/15 00:32:06 djm Exp $

20
sshd.8
View File

@ -34,7 +34,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\" .\"
.\" $OpenBSD: sshd.8,v 1.218 2006/02/12 17:57:19 jmc Exp $ .\" $OpenBSD: sshd.8,v 1.219 2006/02/13 10:16:39 jmc Exp $
.Dd September 25, 1999 .Dd September 25, 1999
.Dt SSHD 8 .Dt SSHD 8
.Os .Os
@ -503,16 +503,16 @@ device on the server.
Without this option, the next available device will be used if Without this option, the next available device will be used if
the client requests a tunnel. the client requests a tunnel.
.El .El
.Ss Examples
1024 33 12121...312314325 ylo@foo.bar
.Pp .Pp
from="*.niksula.hut.fi,!pc.niksula.hut.fi" 1024 35 23...2334 ylo@niksula An example authorized_keys file:
.Pp .Bd -literal
command="dump /home",no-pty,no-port-forwarding 1024 33 23...2323 backup.hut.fi # Comments allowed at start of line
.Pp ssh-rsa AAAAB3Nza...LiPk== user@example.net
permitopen="10.2.1.55:80",permitopen="10.2.1.56:25" 1024 33 23...2323 from="*.sales.example.net,!pc.sales.example.net" ssh-rsa AAAAB2...19Q== john@example.net
.Pp command="dump /home",no-pty,no-port-forwarding ssh-dss AAAAC3...51R== example.net
tunnel="0",command="sh /etc/netstart tun0" ssh-rsa AAAA...== reyk@openbsd.org permitopen="192.0.2.1:80",permitopen="192.0.2.2:25" ssh-dss AAAAB5...21S==
tunnel="0",command="sh /etc/netstart tun0" ssh-rsa AAAA...== jane@example.net
.Ed
.Sh SSH_KNOWN_HOSTS FILE FORMAT .Sh SSH_KNOWN_HOSTS FILE FORMAT
The The
.Pa /etc/ssh/ssh_known_hosts .Pa /etc/ssh/ssh_known_hosts