mirror of
https://github.com/PowerShell/openssh-portable.git
synced 2025-07-28 16:24:39 +02:00
upstream commit
since these pages now clearly tell folks to avoid v1, normalise the docs from a v2 perspective (i.e. stop pointing out which bits are v2 only); ok/tweaks djm ok markus Upstream-ID: eb474f8c36fb6a532dc05c282f7965e38dcfa129
This commit is contained in:
parent
c5c3f3279a
commit
a685ae8d1c
14
ssh-keygen.1
14
ssh-keygen.1
@ -1,4 +1,4 @@
|
|||||||
.\" $OpenBSD: ssh-keygen.1,v 1.129 2015/11/13 04:34:15 djm Exp $
|
.\" $OpenBSD: ssh-keygen.1,v 1.130 2016/02/17 07:38:19 jmc Exp $
|
||||||
.\"
|
.\"
|
||||||
.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
|
.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
|
||||||
.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
||||||
@ -35,7 +35,7 @@
|
|||||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.Dd $Mdocdate: November 13 2015 $
|
.Dd $Mdocdate: February 17 2016 $
|
||||||
.Dt SSH-KEYGEN 1
|
.Dt SSH-KEYGEN 1
|
||||||
.Os
|
.Os
|
||||||
.Sh NAME
|
.Sh NAME
|
||||||
@ -141,8 +141,12 @@
|
|||||||
generates, manages and converts authentication keys for
|
generates, manages and converts authentication keys for
|
||||||
.Xr ssh 1 .
|
.Xr ssh 1 .
|
||||||
.Nm
|
.Nm
|
||||||
can create RSA keys for use by SSH protocol version 1 and
|
can create keys for use by SSH protocol versions 1 and 2.
|
||||||
DSA, ECDSA, Ed25519 or RSA keys for use by SSH protocol version 2.
|
Protocol 1 should not be used
|
||||||
|
and is only offered to support legacy devices.
|
||||||
|
It suffers from a number of cryptographic weaknesses
|
||||||
|
and doesn't support many of the advanced features available for protocol 2.
|
||||||
|
.Pp
|
||||||
The type of key to be generated is specified with the
|
The type of key to be generated is specified with the
|
||||||
.Fl t
|
.Fl t
|
||||||
option.
|
option.
|
||||||
@ -474,7 +478,7 @@ At present, no options are valid for host keys.
|
|||||||
.It Fl o
|
.It Fl o
|
||||||
Causes
|
Causes
|
||||||
.Nm
|
.Nm
|
||||||
to save SSH protocol 2 private keys using the new OpenSSH format rather than
|
to save private keys using the new OpenSSH format rather than
|
||||||
the more compatible PEM format.
|
the more compatible PEM format.
|
||||||
The new format has increased resistance to brute-force password cracking
|
The new format has increased resistance to brute-force password cracking
|
||||||
but is not supported by versions of OpenSSH prior to 6.5.
|
but is not supported by versions of OpenSSH prior to 6.5.
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
.\" $OpenBSD: ssh-keysign.8,v 1.14 2013/12/07 11:58:46 naddy Exp $
|
.\" $OpenBSD: ssh-keysign.8,v 1.15 2016/02/17 07:38:19 jmc Exp $
|
||||||
.\"
|
.\"
|
||||||
.\" Copyright (c) 2002 Markus Friedl. All rights reserved.
|
.\" Copyright (c) 2002 Markus Friedl. All rights reserved.
|
||||||
.\"
|
.\"
|
||||||
@ -22,7 +22,7 @@
|
|||||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.Dd $Mdocdate: December 7 2013 $
|
.Dd $Mdocdate: February 17 2016 $
|
||||||
.Dt SSH-KEYSIGN 8
|
.Dt SSH-KEYSIGN 8
|
||||||
.Os
|
.Os
|
||||||
.Sh NAME
|
.Sh NAME
|
||||||
@ -35,7 +35,7 @@
|
|||||||
is used by
|
is used by
|
||||||
.Xr ssh 1
|
.Xr ssh 1
|
||||||
to access the local host keys and generate the digital signature
|
to access the local host keys and generate the digital signature
|
||||||
required during host-based authentication with SSH protocol version 2.
|
required during host-based authentication.
|
||||||
.Pp
|
.Pp
|
||||||
.Nm
|
.Nm
|
||||||
is disabled by default and can only be enabled in the
|
is disabled by default and can only be enabled in the
|
||||||
|
66
ssh.1
66
ssh.1
@ -33,8 +33,8 @@
|
|||||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.\" $OpenBSD: ssh.1,v 1.368 2016/02/16 07:47:54 jmc Exp $
|
.\" $OpenBSD: ssh.1,v 1.369 2016/02/17 07:38:19 jmc Exp $
|
||||||
.Dd $Mdocdate: February 16 2016 $
|
.Dd $Mdocdate: February 17 2016 $
|
||||||
.Dt SSH 1
|
.Dt SSH 1
|
||||||
.Os
|
.Os
|
||||||
.Sh NAME
|
.Sh NAME
|
||||||
@ -402,17 +402,15 @@ in
|
|||||||
for details.
|
for details.
|
||||||
.Pp
|
.Pp
|
||||||
.It Fl m Ar mac_spec
|
.It Fl m Ar mac_spec
|
||||||
Additionally, for protocol version 2 a comma-separated list of MAC
|
A comma-separated list of MAC (message authentication code) algorithms,
|
||||||
(message authentication code) algorithms can
|
specified in order of preference.
|
||||||
be specified in order of preference.
|
|
||||||
See the
|
See the
|
||||||
.Cm MACs
|
.Cm MACs
|
||||||
keyword for more information.
|
keyword for more information.
|
||||||
.Pp
|
.Pp
|
||||||
.It Fl N
|
.It Fl N
|
||||||
Do not execute a remote command.
|
Do not execute a remote command.
|
||||||
This is useful for just forwarding ports
|
This is useful for just forwarding ports.
|
||||||
(protocol version 2 only).
|
|
||||||
.Pp
|
.Pp
|
||||||
.It Fl n
|
.It Fl n
|
||||||
Redirects stdin from
|
Redirects stdin from
|
||||||
@ -664,8 +662,8 @@ for details.
|
|||||||
.Pp
|
.Pp
|
||||||
.It Fl s
|
.It Fl s
|
||||||
May be used to request invocation of a subsystem on the remote system.
|
May be used to request invocation of a subsystem on the remote system.
|
||||||
Subsystems are a feature of the SSH2 protocol which facilitate the use
|
Subsystems facilitate the use of SSH
|
||||||
of SSH as a secure transport for other applications (eg.\&
|
as a secure transport for other applications (e.g.\&
|
||||||
.Xr sftp 1 ) .
|
.Xr sftp 1 ) .
|
||||||
The subsystem is specified as the remote command.
|
The subsystem is specified as the remote command.
|
||||||
.Pp
|
.Pp
|
||||||
@ -710,7 +708,6 @@ Implies
|
|||||||
.Cm ExitOnForwardFailure
|
.Cm ExitOnForwardFailure
|
||||||
and
|
and
|
||||||
.Cm ClearAllForwardings .
|
.Cm ClearAllForwardings .
|
||||||
Works with Protocol version 2 only.
|
|
||||||
.Pp
|
.Pp
|
||||||
.It Fl w Xo
|
.It Fl w Xo
|
||||||
.Ar local_tun Ns Op : Ns Ar remote_tun
|
.Ar local_tun Ns Op : Ns Ar remote_tun
|
||||||
@ -795,8 +792,10 @@ or the
|
|||||||
and
|
and
|
||||||
.Fl 2
|
.Fl 2
|
||||||
options (see above).
|
options (see above).
|
||||||
Protocol 1 should not be used - it suffers from a number of cryptographic
|
Protocol 1 should not be used
|
||||||
weaknesses and is only offered to support legacy devices.
|
and is only offered to support legacy devices.
|
||||||
|
It suffers from a number of cryptographic weaknesses
|
||||||
|
and doesn't support many of the advanced features available for protocol 2.
|
||||||
.Pp
|
.Pp
|
||||||
The methods available for authentication are:
|
The methods available for authentication are:
|
||||||
GSSAPI-based authentication,
|
GSSAPI-based authentication,
|
||||||
@ -805,8 +804,9 @@ public key authentication,
|
|||||||
challenge-response authentication,
|
challenge-response authentication,
|
||||||
and password authentication.
|
and password authentication.
|
||||||
Authentication methods are tried in the order specified above,
|
Authentication methods are tried in the order specified above,
|
||||||
though protocol 2 has a configuration option to change the default order:
|
though
|
||||||
.Cm PreferredAuthentications .
|
.Cm PreferredAuthentications
|
||||||
|
can be used to change the default order.
|
||||||
.Pp
|
.Pp
|
||||||
Host-based authentication works as follows:
|
Host-based authentication works as follows:
|
||||||
If the machine the user logs in from is listed in
|
If the machine the user logs in from is listed in
|
||||||
@ -850,8 +850,6 @@ The server knows the public key, and only the user knows the private key.
|
|||||||
.Nm
|
.Nm
|
||||||
implements public key authentication protocol automatically,
|
implements public key authentication protocol automatically,
|
||||||
using one of the DSA, ECDSA, Ed25519 or RSA algorithms.
|
using one of the DSA, ECDSA, Ed25519 or RSA algorithms.
|
||||||
Protocol 1 is restricted to using only RSA keys,
|
|
||||||
but protocol 2 may use any.
|
|
||||||
The HISTORY section of
|
The HISTORY section of
|
||||||
.Xr ssl 8
|
.Xr ssl 8
|
||||||
contains a brief discussion of the DSA and RSA algorithms.
|
contains a brief discussion of the DSA and RSA algorithms.
|
||||||
@ -873,26 +871,26 @@ This stores the private key in
|
|||||||
.Pa ~/.ssh/identity
|
.Pa ~/.ssh/identity
|
||||||
(protocol 1),
|
(protocol 1),
|
||||||
.Pa ~/.ssh/id_dsa
|
.Pa ~/.ssh/id_dsa
|
||||||
(protocol 2 DSA),
|
(DSA),
|
||||||
.Pa ~/.ssh/id_ecdsa
|
.Pa ~/.ssh/id_ecdsa
|
||||||
(protocol 2 ECDSA),
|
(ECDSA),
|
||||||
.Pa ~/.ssh/id_ed25519
|
.Pa ~/.ssh/id_ed25519
|
||||||
(protocol 2 Ed25519),
|
(Ed25519),
|
||||||
or
|
or
|
||||||
.Pa ~/.ssh/id_rsa
|
.Pa ~/.ssh/id_rsa
|
||||||
(protocol 2 RSA)
|
(RSA)
|
||||||
and stores the public key in
|
and stores the public key in
|
||||||
.Pa ~/.ssh/identity.pub
|
.Pa ~/.ssh/identity.pub
|
||||||
(protocol 1),
|
(protocol 1),
|
||||||
.Pa ~/.ssh/id_dsa.pub
|
.Pa ~/.ssh/id_dsa.pub
|
||||||
(protocol 2 DSA),
|
(DSA),
|
||||||
.Pa ~/.ssh/id_ecdsa.pub
|
.Pa ~/.ssh/id_ecdsa.pub
|
||||||
(protocol 2 ECDSA),
|
(ECDSA),
|
||||||
.Pa ~/.ssh/id_ed25519.pub
|
.Pa ~/.ssh/id_ed25519.pub
|
||||||
(protocol 2 Ed25519),
|
(Ed25519),
|
||||||
or
|
or
|
||||||
.Pa ~/.ssh/id_rsa.pub
|
.Pa ~/.ssh/id_rsa.pub
|
||||||
(protocol 2 RSA)
|
(RSA)
|
||||||
in the user's home directory.
|
in the user's home directory.
|
||||||
The user should then copy the public key
|
The user should then copy the public key
|
||||||
to
|
to
|
||||||
@ -930,8 +928,6 @@ Challenge-response authentication works as follows:
|
|||||||
The server sends an arbitrary
|
The server sends an arbitrary
|
||||||
.Qq challenge
|
.Qq challenge
|
||||||
text, and prompts for a response.
|
text, and prompts for a response.
|
||||||
Protocol 2 allows multiple challenges and responses;
|
|
||||||
protocol 1 is restricted to just one challenge/response.
|
|
||||||
Examples of challenge-response authentication include
|
Examples of challenge-response authentication include
|
||||||
.Bx
|
.Bx
|
||||||
Authentication (see
|
Authentication (see
|
||||||
@ -1030,7 +1026,7 @@ at logout when waiting for forwarded connection / X11 sessions to terminate.
|
|||||||
Display a list of escape characters.
|
Display a list of escape characters.
|
||||||
.It Cm ~B
|
.It Cm ~B
|
||||||
Send a BREAK to the remote system
|
Send a BREAK to the remote system
|
||||||
(only useful for SSH protocol version 2 and if the peer supports it).
|
(only useful if the peer supports it).
|
||||||
.It Cm ~C
|
.It Cm ~C
|
||||||
Open command line.
|
Open command line.
|
||||||
Currently this allows the addition of port forwardings using the
|
Currently this allows the addition of port forwardings using the
|
||||||
@ -1063,7 +1059,7 @@ Basic help is available, using the
|
|||||||
option.
|
option.
|
||||||
.It Cm ~R
|
.It Cm ~R
|
||||||
Request rekeying of the connection
|
Request rekeying of the connection
|
||||||
(only useful for SSH protocol version 2 and if the peer supports it).
|
(only useful if the peer supports it).
|
||||||
.It Cm ~V
|
.It Cm ~V
|
||||||
Decrease the verbosity
|
Decrease the verbosity
|
||||||
.Pq Ic LogLevel
|
.Pq Ic LogLevel
|
||||||
@ -1531,20 +1527,6 @@ The file format and configuration options are described in
|
|||||||
.It Pa /etc/ssh/ssh_host_rsa_key
|
.It Pa /etc/ssh/ssh_host_rsa_key
|
||||||
These files contain the private parts of the host keys
|
These files contain the private parts of the host keys
|
||||||
and are used for host-based authentication.
|
and are used for host-based authentication.
|
||||||
If protocol version 1 is used,
|
|
||||||
.Nm
|
|
||||||
must be setuid root, since the host key is readable only by root.
|
|
||||||
For protocol version 2,
|
|
||||||
.Nm
|
|
||||||
uses
|
|
||||||
.Xr ssh-keysign 8
|
|
||||||
to access the host keys,
|
|
||||||
eliminating the requirement that
|
|
||||||
.Nm
|
|
||||||
be setuid root when host-based authentication is used.
|
|
||||||
By default
|
|
||||||
.Nm
|
|
||||||
is not setuid root.
|
|
||||||
.Pp
|
.Pp
|
||||||
.It Pa /etc/ssh/ssh_known_hosts
|
.It Pa /etc/ssh/ssh_known_hosts
|
||||||
Systemwide list of known host keys.
|
Systemwide list of known host keys.
|
||||||
|
23
ssh_config.5
23
ssh_config.5
@ -33,8 +33,8 @@
|
|||||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.\" $OpenBSD: ssh_config.5,v 1.225 2016/02/16 05:11:04 djm Exp $
|
.\" $OpenBSD: ssh_config.5,v 1.226 2016/02/17 07:38:19 jmc Exp $
|
||||||
.Dd $Mdocdate: February 16 2016 $
|
.Dd $Mdocdate: February 17 2016 $
|
||||||
.Dt SSH_CONFIG 5
|
.Dt SSH_CONFIG 5
|
||||||
.Os
|
.Os
|
||||||
.Sh NAME
|
.Sh NAME
|
||||||
@ -824,12 +824,10 @@ The default is
|
|||||||
Specifies whether user authentication based on GSSAPI is allowed.
|
Specifies whether user authentication based on GSSAPI is allowed.
|
||||||
The default is
|
The default is
|
||||||
.Dq no .
|
.Dq no .
|
||||||
Note that this option applies to protocol version 2 only.
|
|
||||||
.It Cm GSSAPIDelegateCredentials
|
.It Cm GSSAPIDelegateCredentials
|
||||||
Forward (delegate) credentials to the server.
|
Forward (delegate) credentials to the server.
|
||||||
The default is
|
The default is
|
||||||
.Dq no .
|
.Dq no .
|
||||||
Note that this option applies to protocol version 2 only.
|
|
||||||
.It Cm HashKnownHosts
|
.It Cm HashKnownHosts
|
||||||
Indicates that
|
Indicates that
|
||||||
.Xr ssh 1
|
.Xr ssh 1
|
||||||
@ -856,9 +854,6 @@ or
|
|||||||
.Dq no .
|
.Dq no .
|
||||||
The default is
|
The default is
|
||||||
.Dq no .
|
.Dq no .
|
||||||
This option applies to protocol version 2 only and
|
|
||||||
is similar to
|
|
||||||
.Cm RhostsRSAAuthentication .
|
|
||||||
.It Cm HostbasedKeyTypes
|
.It Cm HostbasedKeyTypes
|
||||||
Specifies the key types that will be used for hostbased authentication
|
Specifies the key types that will be used for hostbased authentication
|
||||||
as a comma-separated pattern list.
|
as a comma-separated pattern list.
|
||||||
@ -883,7 +878,7 @@ option of
|
|||||||
.Xr ssh 1
|
.Xr ssh 1
|
||||||
may be used to list supported key types.
|
may be used to list supported key types.
|
||||||
.It Cm HostKeyAlgorithms
|
.It Cm HostKeyAlgorithms
|
||||||
Specifies the protocol version 2 host key algorithms
|
Specifies the host key algorithms
|
||||||
that the client wants to use in order of preference.
|
that the client wants to use in order of preference.
|
||||||
Alternately if the specified value begins with a
|
Alternately if the specified value begins with a
|
||||||
.Sq +
|
.Sq +
|
||||||
@ -1170,8 +1165,7 @@ DEBUG2 and DEBUG3 each specify higher levels of verbose output.
|
|||||||
.It Cm MACs
|
.It Cm MACs
|
||||||
Specifies the MAC (message authentication code) algorithms
|
Specifies the MAC (message authentication code) algorithms
|
||||||
in order of preference.
|
in order of preference.
|
||||||
The MAC algorithm is used in protocol version 2
|
The MAC algorithm is used for data integrity protection.
|
||||||
for data integrity protection.
|
|
||||||
Multiple algorithms must be comma-separated.
|
Multiple algorithms must be comma-separated.
|
||||||
If the specified value begins with a
|
If the specified value begins with a
|
||||||
.Sq +
|
.Sq +
|
||||||
@ -1243,8 +1237,7 @@ private RSA key.
|
|||||||
Specifies the port number to connect on the remote host.
|
Specifies the port number to connect on the remote host.
|
||||||
The default is 22.
|
The default is 22.
|
||||||
.It Cm PreferredAuthentications
|
.It Cm PreferredAuthentications
|
||||||
Specifies the order in which the client should try protocol 2
|
Specifies the order in which the client should try authentication methods.
|
||||||
authentication methods.
|
|
||||||
This allows a client to prefer one method (e.g.\&
|
This allows a client to prefer one method (e.g.\&
|
||||||
.Cm keyboard-interactive )
|
.Cm keyboard-interactive )
|
||||||
over another method (e.g.\&
|
over another method (e.g.\&
|
||||||
@ -1353,7 +1346,6 @@ or
|
|||||||
.Dq no .
|
.Dq no .
|
||||||
The default is
|
The default is
|
||||||
.Dq yes .
|
.Dq yes .
|
||||||
This option applies to protocol version 2 only.
|
|
||||||
.It Cm RekeyLimit
|
.It Cm RekeyLimit
|
||||||
Specifies the maximum amount of data that may be transmitted before the
|
Specifies the maximum amount of data that may be transmitted before the
|
||||||
session key is renegotiated, optionally followed a maximum amount of
|
session key is renegotiated, optionally followed a maximum amount of
|
||||||
@ -1379,7 +1371,6 @@ is
|
|||||||
.Dq default none ,
|
.Dq default none ,
|
||||||
which means that rekeying is performed after the cipher's default amount
|
which means that rekeying is performed after the cipher's default amount
|
||||||
of data has been sent or received and no time based rekeying is done.
|
of data has been sent or received and no time based rekeying is done.
|
||||||
This option applies to protocol version 2 only.
|
|
||||||
.It Cm RemoteForward
|
.It Cm RemoteForward
|
||||||
Specifies that a TCP port on the remote machine be forwarded over
|
Specifies that a TCP port on the remote machine be forwarded over
|
||||||
the secure channel to the specified host and port from the local machine.
|
the secure channel to the specified host and port from the local machine.
|
||||||
@ -1472,7 +1463,6 @@ Note that this option applies to protocol version 1 only.
|
|||||||
Specifies what variables from the local
|
Specifies what variables from the local
|
||||||
.Xr environ 7
|
.Xr environ 7
|
||||||
should be sent to the server.
|
should be sent to the server.
|
||||||
Note that environment passing is only supported for protocol 2.
|
|
||||||
The server must also support it, and the server must be configured to
|
The server must also support it, and the server must be configured to
|
||||||
accept these environment variables.
|
accept these environment variables.
|
||||||
Note that the
|
Note that the
|
||||||
@ -1520,7 +1510,6 @@ If, for example,
|
|||||||
.Cm ServerAliveCountMax
|
.Cm ServerAliveCountMax
|
||||||
is left at the default, if the server becomes unresponsive,
|
is left at the default, if the server becomes unresponsive,
|
||||||
ssh will disconnect after approximately 45 seconds.
|
ssh will disconnect after approximately 45 seconds.
|
||||||
This option applies to protocol version 2 only.
|
|
||||||
.It Cm ServerAliveInterval
|
.It Cm ServerAliveInterval
|
||||||
Sets a timeout interval in seconds after which if no data has been received
|
Sets a timeout interval in seconds after which if no data has been received
|
||||||
from the server,
|
from the server,
|
||||||
@ -1529,7 +1518,6 @@ will send a message through the encrypted
|
|||||||
channel to request a response from the server.
|
channel to request a response from the server.
|
||||||
The default
|
The default
|
||||||
is 0, indicating that these messages will not be sent to the server.
|
is 0, indicating that these messages will not be sent to the server.
|
||||||
This option applies to protocol version 2 only.
|
|
||||||
.It Cm StreamLocalBindMask
|
.It Cm StreamLocalBindMask
|
||||||
Sets the octal file creation mode mask
|
Sets the octal file creation mode mask
|
||||||
.Pq umask
|
.Pq umask
|
||||||
@ -1726,7 +1714,6 @@ or
|
|||||||
.Dq ask .
|
.Dq ask .
|
||||||
The default is
|
The default is
|
||||||
.Dq no .
|
.Dq no .
|
||||||
Note that this option applies to protocol version 2 only.
|
|
||||||
.Pp
|
.Pp
|
||||||
See also VERIFYING HOST KEYS in
|
See also VERIFYING HOST KEYS in
|
||||||
.Xr ssh 1 .
|
.Xr ssh 1 .
|
||||||
|
16
sshd.8
16
sshd.8
@ -33,8 +33,8 @@
|
|||||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.\" $OpenBSD: sshd.8,v 1.283 2016/02/05 03:07:06 djm Exp $
|
.\" $OpenBSD: sshd.8,v 1.284 2016/02/17 07:38:19 jmc Exp $
|
||||||
.Dd $Mdocdate: February 5 2016 $
|
.Dd $Mdocdate: February 17 2016 $
|
||||||
.Dt SSHD 8
|
.Dt SSHD 8
|
||||||
.Os
|
.Os
|
||||||
.Sh NAME
|
.Sh NAME
|
||||||
@ -275,14 +275,12 @@ though this can be changed via the
|
|||||||
.Cm Protocol
|
.Cm Protocol
|
||||||
option in
|
option in
|
||||||
.Xr sshd_config 5 .
|
.Xr sshd_config 5 .
|
||||||
Protocol 2 supports DSA, ECDSA, Ed25519 and RSA keys;
|
Protocol 1 should not be used
|
||||||
protocol 1 only supports RSA keys.
|
and is only offered to support legacy devices.
|
||||||
For both protocols,
|
|
||||||
each host has a host-specific key,
|
|
||||||
normally 2048 bits,
|
|
||||||
used to identify the host.
|
|
||||||
.Pp
|
.Pp
|
||||||
Forward security for protocol 1 is provided through
|
Each host has a host-specific key,
|
||||||
|
used to identify the host.
|
||||||
|
Partial forward security for protocol 1 is provided through
|
||||||
an additional server key,
|
an additional server key,
|
||||||
normally 1024 bits,
|
normally 1024 bits,
|
||||||
generated when the server starts.
|
generated when the server starts.
|
||||||
|
@ -33,8 +33,8 @@
|
|||||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.\" $OpenBSD: sshd_config.5,v 1.218 2016/02/16 05:11:04 djm Exp $
|
.\" $OpenBSD: sshd_config.5,v 1.219 2016/02/17 07:38:19 jmc Exp $
|
||||||
.Dd $Mdocdate: February 16 2016 $
|
.Dd $Mdocdate: February 17 2016 $
|
||||||
.Dt SSHD_CONFIG 5
|
.Dt SSHD_CONFIG 5
|
||||||
.Os
|
.Os
|
||||||
.Sh NAME
|
.Sh NAME
|
||||||
@ -70,8 +70,7 @@ See
|
|||||||
in
|
in
|
||||||
.Xr ssh_config 5
|
.Xr ssh_config 5
|
||||||
for how to configure the client.
|
for how to configure the client.
|
||||||
Note that environment passing is only supported for protocol 2, and
|
The
|
||||||
that the
|
|
||||||
.Ev TERM
|
.Ev TERM
|
||||||
environment variable is always sent whenever the client
|
environment variable is always sent whenever the client
|
||||||
requests a pseudo-terminal as it is required by the protocol.
|
requests a pseudo-terminal as it is required by the protocol.
|
||||||
@ -226,7 +225,7 @@ of
|
|||||||
.Dq publickey,publickey
|
.Dq publickey,publickey
|
||||||
will require successful authentication using two different public keys.
|
will require successful authentication using two different public keys.
|
||||||
.Pp
|
.Pp
|
||||||
This option is only available for SSH protocol 2 and will yield a fatal
|
This option will yield a fatal
|
||||||
error if enabled if protocol 1 is also enabled.
|
error if enabled if protocol 1 is also enabled.
|
||||||
Note that each authentication method listed should also be explicitly enabled
|
Note that each authentication method listed should also be explicitly enabled
|
||||||
in the configuration.
|
in the configuration.
|
||||||
@ -373,7 +372,6 @@ authentication is allowed.
|
|||||||
If the argument is
|
If the argument is
|
||||||
.Dq none
|
.Dq none
|
||||||
then no banner is displayed.
|
then no banner is displayed.
|
||||||
This option is only available for protocol version 2.
|
|
||||||
By default, no banner is displayed.
|
By default, no banner is displayed.
|
||||||
.It Cm ChallengeResponseAuthentication
|
.It Cm ChallengeResponseAuthentication
|
||||||
Specifies whether challenge-response authentication is allowed (e.g. via
|
Specifies whether challenge-response authentication is allowed (e.g. via
|
||||||
@ -437,7 +435,7 @@ The default is
|
|||||||
indicating not to
|
indicating not to
|
||||||
.Xr chroot 2 .
|
.Xr chroot 2 .
|
||||||
.It Cm Ciphers
|
.It Cm Ciphers
|
||||||
Specifies the ciphers allowed for protocol version 2.
|
Specifies the ciphers allowed.
|
||||||
Multiple ciphers must be comma-separated.
|
Multiple ciphers must be comma-separated.
|
||||||
If the specified value begins with a
|
If the specified value begins with a
|
||||||
.Sq +
|
.Sq +
|
||||||
@ -518,7 +516,6 @@ If
|
|||||||
.Cm ClientAliveCountMax
|
.Cm ClientAliveCountMax
|
||||||
is left at the default, unresponsive SSH clients
|
is left at the default, unresponsive SSH clients
|
||||||
will be disconnected after approximately 45 seconds.
|
will be disconnected after approximately 45 seconds.
|
||||||
This option applies to protocol version 2 only.
|
|
||||||
.It Cm ClientAliveInterval
|
.It Cm ClientAliveInterval
|
||||||
Sets a timeout interval in seconds after which if no data has been received
|
Sets a timeout interval in seconds after which if no data has been received
|
||||||
from the client,
|
from the client,
|
||||||
@ -527,7 +524,6 @@ will send a message through the encrypted
|
|||||||
channel to request a response from the client.
|
channel to request a response from the client.
|
||||||
The default
|
The default
|
||||||
is 0, indicating that these messages will not be sent to the client.
|
is 0, indicating that these messages will not be sent to the client.
|
||||||
This option applies to protocol version 2 only.
|
|
||||||
.It Cm Compression
|
.It Cm Compression
|
||||||
Specifies whether compression is allowed, or delayed until
|
Specifies whether compression is allowed, or delayed until
|
||||||
the user has authenticated successfully.
|
the user has authenticated successfully.
|
||||||
@ -627,13 +623,11 @@ The default is
|
|||||||
Specifies whether user authentication based on GSSAPI is allowed.
|
Specifies whether user authentication based on GSSAPI is allowed.
|
||||||
The default is
|
The default is
|
||||||
.Dq no .
|
.Dq no .
|
||||||
Note that this option applies to protocol version 2 only.
|
|
||||||
.It Cm GSSAPICleanupCredentials
|
.It Cm GSSAPICleanupCredentials
|
||||||
Specifies whether to automatically destroy the user's credentials cache
|
Specifies whether to automatically destroy the user's credentials cache
|
||||||
on logout.
|
on logout.
|
||||||
The default is
|
The default is
|
||||||
.Dq yes .
|
.Dq yes .
|
||||||
Note that this option applies to protocol version 2 only.
|
|
||||||
.It Cm GSSAPIStrictAcceptorCheck
|
.It Cm GSSAPIStrictAcceptorCheck
|
||||||
Determines whether to be strict about the identity of the GSSAPI acceptor
|
Determines whether to be strict about the identity of the GSSAPI acceptor
|
||||||
a client authenticates against.
|
a client authenticates against.
|
||||||
@ -676,9 +670,6 @@ may be used to list supported key types.
|
|||||||
Specifies whether rhosts or /etc/hosts.equiv authentication together
|
Specifies whether rhosts or /etc/hosts.equiv authentication together
|
||||||
with successful public key client host authentication is allowed
|
with successful public key client host authentication is allowed
|
||||||
(host-based authentication).
|
(host-based authentication).
|
||||||
This option is similar to
|
|
||||||
.Cm RhostsRSAAuthentication
|
|
||||||
and applies to protocol version 2 only.
|
|
||||||
The default is
|
The default is
|
||||||
.Dq no .
|
.Dq no .
|
||||||
.It Cm HostbasedUsesNameFromPacketOnly
|
.It Cm HostbasedUsesNameFromPacketOnly
|
||||||
@ -749,7 +740,7 @@ is specified, the location of the socket will be read from the
|
|||||||
.Ev SSH_AUTH_SOCK
|
.Ev SSH_AUTH_SOCK
|
||||||
environment variable.
|
environment variable.
|
||||||
.It Cm HostKeyAlgorithms
|
.It Cm HostKeyAlgorithms
|
||||||
Specifies the protocol version 2 host key algorithms
|
Specifies the host key algorithms
|
||||||
that the server offers.
|
that the server offers.
|
||||||
The default for this option is:
|
The default for this option is:
|
||||||
.Bd -literal -offset 3n
|
.Bd -literal -offset 3n
|
||||||
@ -970,8 +961,7 @@ DEBUG2 and DEBUG3 each specify higher levels of debugging output.
|
|||||||
Logging with a DEBUG level violates the privacy of users and is not recommended.
|
Logging with a DEBUG level violates the privacy of users and is not recommended.
|
||||||
.It Cm MACs
|
.It Cm MACs
|
||||||
Specifies the available MAC (message authentication code) algorithms.
|
Specifies the available MAC (message authentication code) algorithms.
|
||||||
The MAC algorithm is used in protocol version 2
|
The MAC algorithm is used for data integrity protection.
|
||||||
for data integrity protection.
|
|
||||||
Multiple algorithms must be comma-separated.
|
Multiple algorithms must be comma-separated.
|
||||||
If the specified value begins with a
|
If the specified value begins with a
|
||||||
.Sq +
|
.Sq +
|
||||||
@ -1380,7 +1370,6 @@ may be used to list supported key types.
|
|||||||
Specifies whether public key authentication is allowed.
|
Specifies whether public key authentication is allowed.
|
||||||
The default is
|
The default is
|
||||||
.Dq yes .
|
.Dq yes .
|
||||||
Note that this option applies to protocol version 2 only.
|
|
||||||
.It Cm RekeyLimit
|
.It Cm RekeyLimit
|
||||||
Specifies the maximum amount of data that may be transmitted before the
|
Specifies the maximum amount of data that may be transmitted before the
|
||||||
session key is renegotiated, optionally followed a maximum amount of
|
session key is renegotiated, optionally followed a maximum amount of
|
||||||
@ -1406,7 +1395,6 @@ is
|
|||||||
.Dq default none ,
|
.Dq default none ,
|
||||||
which means that rekeying is performed after the cipher's default amount
|
which means that rekeying is performed after the cipher's default amount
|
||||||
of data has been sent or received and no time based rekeying is done.
|
of data has been sent or received and no time based rekeying is done.
|
||||||
This option applies to protocol version 2 only.
|
|
||||||
.It Cm RevokedKeys
|
.It Cm RevokedKeys
|
||||||
Specifies revoked public keys file, or
|
Specifies revoked public keys file, or
|
||||||
.Dq none
|
.Dq none
|
||||||
@ -1493,7 +1481,6 @@ This may simplify configurations using
|
|||||||
to force a different filesystem root on clients.
|
to force a different filesystem root on clients.
|
||||||
.Pp
|
.Pp
|
||||||
By default no subsystems are defined.
|
By default no subsystems are defined.
|
||||||
Note that this option applies to protocol version 2 only.
|
|
||||||
.It Cm SyslogFacility
|
.It Cm SyslogFacility
|
||||||
Gives the facility code that is used when logging messages from
|
Gives the facility code that is used when logging messages from
|
||||||
.Xr sshd 8 .
|
.Xr sshd 8 .
|
||||||
|
Loading…
x
Reference in New Issue
Block a user