- djm@cvs.openbsd.org 2005/04/21 06:17:50

[ssh-add.1 ssh-agent.1 ssh-keygen.1 ssh.1 ssh_config.5 sshd.8]
     [sshd_config.5] OpenSSH doesn't ever look at the $HOME environment
     variable, so don't say that we do (bz #623); ok deraadt@
This commit is contained in:
Damien Miller 2005-05-26 12:04:02 +10:00
parent a31c929f36
commit 167ea5d026
8 changed files with 94 additions and 90 deletions

View File

@ -23,6 +23,10 @@
- jakob@cvs.openbsd.org 2005/04/20 10:05:45 - jakob@cvs.openbsd.org 2005/04/20 10:05:45
[dns.c] [dns.c]
do not try to look up SSHFP for numerical hostname. ok djm@ do not try to look up SSHFP for numerical hostname. ok djm@
- djm@cvs.openbsd.org 2005/04/21 06:17:50
[ssh-add.1 ssh-agent.1 ssh-keygen.1 ssh.1 ssh_config.5 sshd.8]
[sshd_config.5] OpenSSH doesn't ever look at the $HOME environment
variable, so don't say that we do (bz #623); ok deraadt@
20050524 20050524
- (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec] - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
@ -2522,4 +2526,4 @@
- (djm) Trim deprecated options from INSTALL. Mention UsePAM - (djm) Trim deprecated options from INSTALL. Mention UsePAM
- (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
$Id: ChangeLog,v 1.3767 2005/05/26 02:03:31 djm Exp $ $Id: ChangeLog,v 1.3768 2005/05/26 02:04:02 djm Exp $

View File

@ -1,4 +1,4 @@
.\" $OpenBSD: ssh-add.1,v 1.42 2005/03/01 17:32:19 jmc Exp $ .\" $OpenBSD: ssh-add.1,v 1.43 2005/04/21 06:17:50 djm Exp $
.\" .\"
.\" -*- nroff -*- .\" -*- nroff -*-
.\" .\"
@ -57,10 +57,10 @@
adds RSA or DSA identities to the authentication agent, adds RSA or DSA identities to the authentication agent,
.Xr ssh-agent 1 . .Xr ssh-agent 1 .
When run without arguments, it adds the files When run without arguments, it adds the files
.Pa $HOME/.ssh/id_rsa , .Pa ~/.ssh/id_rsa ,
.Pa $HOME/.ssh/id_dsa .Pa ~/.ssh/id_dsa
and and
.Pa $HOME/.ssh/identity . .Pa ~/.ssh/identity .
Alternative file names can be given on the command line. Alternative file names can be given on the command line.
If any file requires a passphrase, If any file requires a passphrase,
.Nm .Nm
@ -142,11 +142,11 @@ agent.
.El .El
.Sh FILES .Sh FILES
.Bl -tag -width Ds .Bl -tag -width Ds
.It Pa $HOME/.ssh/identity .It Pa ~/.ssh/identity
Contains the protocol version 1 RSA authentication identity of the user. Contains the protocol version 1 RSA authentication identity of the user.
.It Pa $HOME/.ssh/id_dsa .It Pa ~/.ssh/id_dsa
Contains the protocol version 2 DSA authentication identity of the user. Contains the protocol version 2 DSA authentication identity of the user.
.It Pa $HOME/.ssh/id_rsa .It Pa ~/.ssh/id_rsa
Contains the protocol version 2 RSA authentication identity of the user. Contains the protocol version 2 RSA authentication identity of the user.
.El .El
.Pp .Pp

View File

@ -1,4 +1,4 @@
.\" $OpenBSD: ssh-agent.1,v 1.41 2004/07/11 17:48:47 deraadt Exp $ .\" $OpenBSD: ssh-agent.1,v 1.42 2005/04/21 06:17:50 djm Exp $
.\" .\"
.\" Author: Tatu Ylonen <ylo@cs.hut.fi> .\" Author: Tatu Ylonen <ylo@cs.hut.fi>
.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@ -111,10 +111,10 @@ Keys are added using
When executed without arguments, When executed without arguments,
.Xr ssh-add 1 .Xr ssh-add 1
adds the files adds the files
.Pa $HOME/.ssh/id_rsa , .Pa ~/.ssh/id_rsa ,
.Pa $HOME/.ssh/id_dsa .Pa ~/.ssh/id_dsa
and and
.Pa $HOME/.ssh/identity . .Pa ~/.ssh/identity .
If the identity has a passphrase, If the identity has a passphrase,
.Xr ssh-add 1 .Xr ssh-add 1
asks for the passphrase (using a small X11 application if running asks for the passphrase (using a small X11 application if running
@ -179,11 +179,11 @@ The agent exits automatically when the command given on the command
line terminates. line terminates.
.Sh FILES .Sh FILES
.Bl -tag -width Ds .Bl -tag -width Ds
.It Pa $HOME/.ssh/identity .It Pa ~/.ssh/identity
Contains the protocol version 1 RSA authentication identity of the user. Contains the protocol version 1 RSA authentication identity of the user.
.It Pa $HOME/.ssh/id_dsa .It Pa ~/.ssh/id_dsa
Contains the protocol version 2 DSA authentication identity of the user. Contains the protocol version 2 DSA authentication identity of the user.
.It Pa $HOME/.ssh/id_rsa .It Pa ~/.ssh/id_rsa
Contains the protocol version 2 RSA authentication identity of the user. Contains the protocol version 2 RSA authentication identity of the user.
.It Pa /tmp/ssh-XXXXXXXX/agent.<ppid> .It Pa /tmp/ssh-XXXXXXXX/agent.<ppid>
Unix-domain sockets used to contain the connection to the Unix-domain sockets used to contain the connection to the

View File

@ -1,4 +1,4 @@
.\" $OpenBSD: ssh-keygen.1,v 1.67 2005/03/14 10:09:03 dtucker Exp $ .\" $OpenBSD: ssh-keygen.1,v 1.68 2005/04/21 06:17:50 djm Exp $
.\" .\"
.\" -*- nroff -*- .\" -*- nroff -*-
.\" .\"
@ -129,10 +129,10 @@ section for details.
Normally each user wishing to use SSH Normally each user wishing to use SSH
with RSA or DSA authentication runs this once to create the authentication with RSA or DSA authentication runs this once to create the authentication
key in key in
.Pa $HOME/.ssh/identity , .Pa ~/.ssh/identity ,
.Pa $HOME/.ssh/id_dsa .Pa ~/.ssh/id_dsa
or or
.Pa $HOME/.ssh/id_rsa . .Pa ~/.ssh/id_rsa .
Additionally, the system administrator may use this to generate host keys, Additionally, the system administrator may use this to generate host keys,
as seen in as seen in
.Pa /etc/rc . .Pa /etc/rc .
@ -381,7 +381,7 @@ It is important that this file contains moduli of a range of bit lengths and
that both ends of a connection share common moduli. that both ends of a connection share common moduli.
.Sh FILES .Sh FILES
.Bl -tag -width Ds .Bl -tag -width Ds
.It Pa $HOME/.ssh/identity .It Pa ~/.ssh/identity
Contains the protocol version 1 RSA authentication identity of the user. Contains the protocol version 1 RSA authentication identity of the user.
This file should not be readable by anyone but the user. This file should not be readable by anyone but the user.
It is possible to It is possible to
@ -392,14 +392,14 @@ This file is not automatically accessed by
but it is offered as the default file for the private key. but it is offered as the default file for the private key.
.Xr ssh 1 .Xr ssh 1
will read this file when a login attempt is made. will read this file when a login attempt is made.
.It Pa $HOME/.ssh/identity.pub .It Pa ~/.ssh/identity.pub
Contains the protocol version 1 RSA public key for authentication. Contains the protocol version 1 RSA public key for authentication.
The contents of this file should be added to The contents of this file should be added to
.Pa $HOME/.ssh/authorized_keys .Pa ~/.ssh/authorized_keys
on all machines on all machines
where the user wishes to log in using RSA authentication. where the user wishes to log in using RSA authentication.
There is no need to keep the contents of this file secret. There is no need to keep the contents of this file secret.
.It Pa $HOME/.ssh/id_dsa .It Pa ~/.ssh/id_dsa
Contains the protocol version 2 DSA authentication identity of the user. Contains the protocol version 2 DSA authentication identity of the user.
This file should not be readable by anyone but the user. This file should not be readable by anyone but the user.
It is possible to It is possible to
@ -410,14 +410,14 @@ This file is not automatically accessed by
but it is offered as the default file for the private key. but it is offered as the default file for the private key.
.Xr ssh 1 .Xr ssh 1
will read this file when a login attempt is made. will read this file when a login attempt is made.
.It Pa $HOME/.ssh/id_dsa.pub .It Pa ~/.ssh/id_dsa.pub
Contains the protocol version 2 DSA public key for authentication. Contains the protocol version 2 DSA public key for authentication.
The contents of this file should be added to The contents of this file should be added to
.Pa $HOME/.ssh/authorized_keys .Pa ~/.ssh/authorized_keys
on all machines on all machines
where the user wishes to log in using public key authentication. where the user wishes to log in using public key authentication.
There is no need to keep the contents of this file secret. There is no need to keep the contents of this file secret.
.It Pa $HOME/.ssh/id_rsa .It Pa ~/.ssh/id_rsa
Contains the protocol version 2 RSA authentication identity of the user. Contains the protocol version 2 RSA authentication identity of the user.
This file should not be readable by anyone but the user. This file should not be readable by anyone but the user.
It is possible to It is possible to
@ -428,10 +428,10 @@ This file is not automatically accessed by
but it is offered as the default file for the private key. but it is offered as the default file for the private key.
.Xr ssh 1 .Xr ssh 1
will read this file when a login attempt is made. will read this file when a login attempt is made.
.It Pa $HOME/.ssh/id_rsa.pub .It Pa ~/.ssh/id_rsa.pub
Contains the protocol version 2 RSA public key for authentication. Contains the protocol version 2 RSA public key for authentication.
The contents of this file should be added to The contents of this file should be added to
.Pa $HOME/.ssh/authorized_keys .Pa ~/.ssh/authorized_keys
on all machines on all machines
where the user wishes to log in using public key authentication. where the user wishes to log in using public key authentication.
There is no need to keep the contents of this file secret. There is no need to keep the contents of this file secret.

70
ssh.1
View File

@ -34,7 +34,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\" .\"
.\" $OpenBSD: ssh.1,v 1.206 2005/04/14 12:30:30 jmc Exp $ .\" $OpenBSD: ssh.1,v 1.207 2005/04/21 06:17:50 djm Exp $
.Dd September 25, 1999 .Dd September 25, 1999
.Dt SSH 1 .Dt SSH 1
.Os .Os
@ -109,9 +109,9 @@ or
.Pa /etc/shosts.equiv .Pa /etc/shosts.equiv
on the remote machine, and the user names are on the remote machine, and the user names are
the same on both sides, or if the files the same on both sides, or if the files
.Pa $HOME/.rhosts .Pa ~/.rhosts
or or
.Pa $HOME/.shosts .Pa ~/.shosts
exist in the user's home directory on the exist in the user's home directory on the
remote machine and contain a line containing the name of the client remote machine and contain a line containing the name of the client
machine and the name of the user on that machine, the user is machine and the name of the user on that machine, the user is
@ -120,7 +120,7 @@ Additionally, if the server can verify the client's
host key (see host key (see
.Pa /etc/ssh/ssh_known_hosts .Pa /etc/ssh/ssh_known_hosts
and and
.Pa $HOME/.ssh/known_hosts .Pa ~/.ssh/known_hosts
in the in the
.Sx FILES .Sx FILES
section), only then is login permitted. section), only then is login permitted.
@ -128,7 +128,7 @@ This authentication method closes security holes due to IP
spoofing, DNS spoofing and routing spoofing. spoofing, DNS spoofing and routing spoofing.
[Note to the administrator: [Note to the administrator:
.Pa /etc/hosts.equiv , .Pa /etc/hosts.equiv ,
.Pa $HOME/.rhosts , .Pa ~/.rhosts ,
and the rlogin/rsh protocol in general, are inherently insecure and should be and the rlogin/rsh protocol in general, are inherently insecure and should be
disabled if security is desired.] disabled if security is desired.]
.Pp .Pp
@ -144,7 +144,7 @@ key pair for authentication purposes.
The server knows the public key, and only the user knows the private key. The server knows the public key, and only the user knows the private key.
.Pp .Pp
The file The file
.Pa $HOME/.ssh/authorized_keys .Pa ~/.ssh/authorized_keys
lists the public keys that are permitted for logging in. lists the public keys that are permitted for logging in.
When the user logs in, the When the user logs in, the
.Nm .Nm
@ -165,18 +165,18 @@ implements the RSA authentication protocol automatically.
The user creates his/her RSA key pair by running The user creates his/her RSA key pair by running
.Xr ssh-keygen 1 . .Xr ssh-keygen 1 .
This stores the private key in This stores the private key in
.Pa $HOME/.ssh/identity .Pa ~/.ssh/identity
and stores the public key in and stores the public key in
.Pa $HOME/.ssh/identity.pub .Pa ~/.ssh/identity.pub
in the user's home directory. in the user's home directory.
The user should then copy the The user should then copy the
.Pa identity.pub .Pa identity.pub
to to
.Pa $HOME/.ssh/authorized_keys .Pa ~/.ssh/authorized_keys
in his/her home directory on the remote machine (the in his/her home directory on the remote machine (the
.Pa authorized_keys .Pa authorized_keys
file corresponds to the conventional file corresponds to the conventional
.Pa $HOME/.rhosts .Pa ~/.rhosts
file, and has one key file, and has one key
per line, though the lines can be very long). per line, though the lines can be very long).
After this, the user can log in without giving the password. After this, the user can log in without giving the password.
@ -206,12 +206,12 @@ password authentication are tried.
The public key method is similar to RSA authentication described The public key method is similar to RSA authentication described
in the previous section and allows the RSA or DSA algorithm to be used: in the previous section and allows the RSA or DSA algorithm to be used:
The client uses his private key, The client uses his private key,
.Pa $HOME/.ssh/id_dsa .Pa ~/.ssh/id_dsa
or or
.Pa $HOME/.ssh/id_rsa , .Pa ~/.ssh/id_rsa ,
to sign the session identifier and sends the result to the server. to sign the session identifier and sends the result to the server.
The server checks whether the matching public key is listed in The server checks whether the matching public key is listed in
.Pa $HOME/.ssh/authorized_keys .Pa ~/.ssh/authorized_keys
and grants access if both the key is found and the signature is correct. and grants access if both the key is found and the signature is correct.
The session identifier is derived from a shared Diffie-Hellman value The session identifier is derived from a shared Diffie-Hellman value
and is only known to the client and the server. and is only known to the client and the server.
@ -365,7 +365,7 @@ electronic purse; another is going through firewalls.
automatically maintains and checks a database containing automatically maintains and checks a database containing
identifications for all hosts it has ever been used with. identifications for all hosts it has ever been used with.
Host keys are stored in Host keys are stored in
.Pa $HOME/.ssh/known_hosts .Pa ~/.ssh/known_hosts
in the user's home directory. in the user's home directory.
Additionally, the file Additionally, the file
.Pa /etc/ssh/ssh_known_hosts .Pa /etc/ssh/ssh_known_hosts
@ -522,7 +522,7 @@ the system-wide configuration file
.Pq Pa /etc/ssh/ssh_config .Pq Pa /etc/ssh/ssh_config
will be ignored. will be ignored.
The default for the per-user configuration file is The default for the per-user configuration file is
.Pa $HOME/.ssh/config . .Pa ~/.ssh/config .
.It Fl f .It Fl f
Requests Requests
.Nm .Nm
@ -548,11 +548,11 @@ private RSA key.
Selects a file from which the identity (private key) for Selects a file from which the identity (private key) for
RSA or DSA authentication is read. RSA or DSA authentication is read.
The default is The default is
.Pa $HOME/.ssh/identity .Pa ~/.ssh/identity
for protocol version 1, and for protocol version 1, and
.Pa $HOME/.ssh/id_rsa .Pa ~/.ssh/id_rsa
and and
.Pa $HOME/.ssh/id_dsa .Pa ~/.ssh/id_dsa
for protocol version 2. for protocol version 2.
Identity files may also be specified on Identity files may also be specified on
a per-host basis in the configuration file. a per-host basis in the configuration file.
@ -941,7 +941,7 @@ Set to the name of the user logging in.
Additionally, Additionally,
.Nm .Nm
reads reads
.Pa $HOME/.ssh/environment , .Pa ~/.ssh/environment ,
and adds lines of the format and adds lines of the format
.Dq VARNAME=value .Dq VARNAME=value
to the environment if the file exists and if users are allowed to to the environment if the file exists and if users are allowed to
@ -952,13 +952,13 @@ option in
.Xr sshd_config 5 . .Xr sshd_config 5 .
.Sh FILES .Sh FILES
.Bl -tag -width Ds .Bl -tag -width Ds
.It Pa $HOME/.ssh/known_hosts .It Pa ~/.ssh/known_hosts
Records host keys for all hosts the user has logged into that are not Records host keys for all hosts the user has logged into that are not
in in
.Pa /etc/ssh/ssh_known_hosts . .Pa /etc/ssh/ssh_known_hosts .
See See
.Xr sshd 8 . .Xr sshd 8 .
.It Pa $HOME/.ssh/identity, $HOME/.ssh/id_dsa, $HOME/.ssh/id_rsa .It Pa ~/.ssh/identity, ~/.ssh/id_dsa, ~/.ssh/id_rsa
Contains the authentication identity of the user. Contains the authentication identity of the user.
They are for protocol 1 RSA, protocol 2 DSA, and protocol 2 RSA, respectively. They are for protocol 1 RSA, protocol 2 DSA, and protocol 2 RSA, respectively.
These files These files
@ -970,21 +970,21 @@ ignores a private key file if it is accessible by others.
It is possible to specify a passphrase when It is possible to specify a passphrase when
generating the key; the passphrase will be used to encrypt the generating the key; the passphrase will be used to encrypt the
sensitive part of this file using 3DES. sensitive part of this file using 3DES.
.It Pa $HOME/.ssh/identity.pub, $HOME/.ssh/id_dsa.pub, $HOME/.ssh/id_rsa.pub .It Pa ~/.ssh/identity.pub, ~/.ssh/id_dsa.pub, ~/.ssh/id_rsa.pub
Contains the public key for authentication (public part of the Contains the public key for authentication (public part of the
identity file in human-readable form). identity file in human-readable form).
The contents of the The contents of the
.Pa $HOME/.ssh/identity.pub .Pa ~/.ssh/identity.pub
file should be added to the file file should be added to the file
.Pa $HOME/.ssh/authorized_keys .Pa ~/.ssh/authorized_keys
on all machines on all machines
where the user wishes to log in using protocol version 1 RSA authentication. where the user wishes to log in using protocol version 1 RSA authentication.
The contents of the The contents of the
.Pa $HOME/.ssh/id_dsa.pub .Pa ~/.ssh/id_dsa.pub
and and
.Pa $HOME/.ssh/id_rsa.pub .Pa ~/.ssh/id_rsa.pub
file should be added to file should be added to
.Pa $HOME/.ssh/authorized_keys .Pa ~/.ssh/authorized_keys
on all machines on all machines
where the user wishes to log in using protocol version 2 DSA/RSA authentication. where the user wishes to log in using protocol version 2 DSA/RSA authentication.
These files are not These files are not
@ -992,13 +992,13 @@ sensitive and can (but need not) be readable by anyone.
These files are These files are
never used automatically and are not necessary; they are only provided for never used automatically and are not necessary; they are only provided for
the convenience of the user. the convenience of the user.
.It Pa $HOME/.ssh/config .It Pa ~/.ssh/config
This is the per-user configuration file. This is the per-user configuration file.
The file format and configuration options are described in The file format and configuration options are described in
.Xr ssh_config 5 . .Xr ssh_config 5 .
Because of the potential for abuse, this file must have strict permissions: Because of the potential for abuse, this file must have strict permissions:
read/write for the user, and not accessible by others. read/write for the user, and not accessible by others.
.It Pa $HOME/.ssh/authorized_keys .It Pa ~/.ssh/authorized_keys
Lists the public keys (RSA/DSA) that can be used for logging in as this user. Lists the public keys (RSA/DSA) that can be used for logging in as this user.
The format of this file is described in the The format of this file is described in the
.Xr sshd 8 .Xr sshd 8
@ -1058,7 +1058,7 @@ be setuid root when that authentication method is used.
By default By default
.Nm .Nm
is not setuid root. is not setuid root.
.It Pa $HOME/.rhosts .It Pa ~/.rhosts
This file is used in This file is used in
.Cm RhostsRSAAuthentication .Cm RhostsRSAAuthentication
and and
@ -1088,12 +1088,12 @@ authentication before permitting log in.
If the server machine does not have the client's host key in If the server machine does not have the client's host key in
.Pa /etc/ssh/ssh_known_hosts , .Pa /etc/ssh/ssh_known_hosts ,
it can be stored in it can be stored in
.Pa $HOME/.ssh/known_hosts . .Pa ~/.ssh/known_hosts .
The easiest way to do this is to The easiest way to do this is to
connect back to the client from the server machine using ssh; this connect back to the client from the server machine using ssh; this
will automatically add the host key to will automatically add the host key to
.Pa $HOME/.ssh/known_hosts . .Pa ~/.ssh/known_hosts .
.It Pa $HOME/.shosts .It Pa ~/.shosts
This file is used exactly the same way as This file is used exactly the same way as
.Pa .rhosts . .Pa .rhosts .
The purpose for The purpose for
@ -1133,7 +1133,7 @@ when the user logs in just before the user's shell (or command) is started.
See the See the
.Xr sshd 8 .Xr sshd 8
manual page for more information. manual page for more information.
.It Pa $HOME/.ssh/rc .It Pa ~/.ssh/rc
Commands in this file are executed by Commands in this file are executed by
.Nm .Nm
when the user logs in just before the user's shell (or command) is when the user logs in just before the user's shell (or command) is
@ -1141,7 +1141,7 @@ started.
See the See the
.Xr sshd 8 .Xr sshd 8
manual page for more information. manual page for more information.
.It Pa $HOME/.ssh/environment .It Pa ~/.ssh/environment
Contains additional definitions for environment variables, see section Contains additional definitions for environment variables, see section
.Sx ENVIRONMENT .Sx ENVIRONMENT
above. above.

View File

@ -34,7 +34,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\" .\"
.\" $OpenBSD: ssh_config.5,v 1.49 2005/03/16 11:10:38 jmc Exp $ .\" $OpenBSD: ssh_config.5,v 1.50 2005/04/21 06:17:50 djm Exp $
.Dd September 25, 1999 .Dd September 25, 1999
.Dt SSH_CONFIG 5 .Dt SSH_CONFIG 5
.Os .Os
@ -43,7 +43,7 @@
.Nd OpenSSH SSH client configuration files .Nd OpenSSH SSH client configuration files
.Sh SYNOPSIS .Sh SYNOPSIS
.Bl -tag -width Ds -compact .Bl -tag -width Ds -compact
.It Pa $HOME/.ssh/config .It Pa ~/.ssh/config
.It Pa /etc/ssh/ssh_config .It Pa /etc/ssh/ssh_config
.El .El
.Sh DESCRIPTION .Sh DESCRIPTION
@ -55,7 +55,7 @@ the following order:
command-line options command-line options
.It .It
user's configuration file user's configuration file
.Pq Pa $HOME/.ssh/config .Pq Pa ~/.ssh/config
.It .It
system-wide configuration file system-wide configuration file
.Pq Pa /etc/ssh/ssh_config .Pq Pa /etc/ssh/ssh_config
@ -411,7 +411,7 @@ Note that this option applies to protocol version 2 only.
Indicates that Indicates that
.Nm ssh .Nm ssh
should hash host names and addresses when they are added to should hash host names and addresses when they are added to
.Pa $HOME/.ssh/known_hosts . .Pa ~/.ssh/known_hosts .
These hashed names may be used normally by These hashed names may be used normally by
.Nm ssh .Nm ssh
and and
@ -457,11 +457,11 @@ specifications).
Specifies a file from which the user's RSA or DSA authentication identity Specifies a file from which the user's RSA or DSA authentication identity
is read. is read.
The default is The default is
.Pa $HOME/.ssh/identity .Pa ~/.ssh/identity
for protocol version 1, and for protocol version 1, and
.Pa $HOME/.ssh/id_rsa .Pa ~/.ssh/id_rsa
and and
.Pa $HOME/.ssh/id_dsa .Pa ~/.ssh/id_dsa
for protocol version 2. for protocol version 2.
Additionally, any identities represented by the authentication agent Additionally, any identities represented by the authentication agent
will be used for authentication. will be used for authentication.
@ -751,7 +751,7 @@ If this flag is set to
.Dq yes , .Dq yes ,
.Nm ssh .Nm ssh
will never automatically add host keys to the will never automatically add host keys to the
.Pa $HOME/.ssh/known_hosts .Pa ~/.ssh/known_hosts
file, and refuses to connect to hosts whose host key has changed. file, and refuses to connect to hosts whose host key has changed.
This provides maximum protection against trojan horse attacks, This provides maximum protection against trojan horse attacks,
however, can be annoying when the however, can be annoying when the
@ -823,7 +823,7 @@ having to remember to give the user name on the command line.
.It Cm UserKnownHostsFile .It Cm UserKnownHostsFile
Specifies a file to use for the user Specifies a file to use for the user
host key database instead of host key database instead of
.Pa $HOME/.ssh/known_hosts . .Pa ~/.ssh/known_hosts .
.It Cm VerifyHostKeyDNS .It Cm VerifyHostKeyDNS
Specifies whether to verify the remote key using DNS and SSHFP resource Specifies whether to verify the remote key using DNS and SSHFP resource
records. records.
@ -856,7 +856,7 @@ The default is
.El .El
.Sh FILES .Sh FILES
.Bl -tag -width Ds .Bl -tag -width Ds
.It Pa $HOME/.ssh/config .It Pa ~/.ssh/config
This is the per-user configuration file. This is the per-user configuration file.
The format of this file is described above. The format of this file is described above.
This file is used by the This file is used by the

30
sshd.8
View File

@ -34,7 +34,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\" .\"
.\" $OpenBSD: sshd.8,v 1.206 2005/03/01 14:59:49 jmc Exp $ .\" $OpenBSD: sshd.8,v 1.207 2005/04/21 06:17:50 djm Exp $
.Dd September 25, 1999 .Dd September 25, 1999
.Dt SSHD 8 .Dt SSHD 8
.Os .Os
@ -350,7 +350,7 @@ If the login is on a tty, and no command has been specified,
prints last login time and prints last login time and
.Pa /etc/motd .Pa /etc/motd
(unless prevented in the configuration file or by (unless prevented in the configuration file or by
.Pa $HOME/.hushlogin ; .Pa ~/.hushlogin ;
see the see the
.Sx FILES .Sx FILES
section). section).
@ -367,7 +367,7 @@ Changes to run with normal user privileges.
Sets up basic environment. Sets up basic environment.
.It .It
Reads the file Reads the file
.Pa $HOME/.ssh/environment , .Pa ~/.ssh/environment ,
if it exists, and users are allowed to change their environment. if it exists, and users are allowed to change their environment.
See the See the
.Cm PermitUserEnvironment .Cm PermitUserEnvironment
@ -377,7 +377,7 @@ option in
Changes to user's home directory. Changes to user's home directory.
.It .It
If If
.Pa $HOME/.ssh/rc .Pa ~/.ssh/rc
exists, runs it; else if exists, runs it; else if
.Pa /etc/ssh/sshrc .Pa /etc/ssh/sshrc
exists, runs exists, runs
@ -390,7 +390,7 @@ authentication protocol and cookie in standard input.
Runs user's shell or command. Runs user's shell or command.
.El .El
.Sh AUTHORIZED_KEYS FILE FORMAT .Sh AUTHORIZED_KEYS FILE FORMAT
.Pa $HOME/.ssh/authorized_keys .Pa ~/.ssh/authorized_keys
is the default file that lists the public keys that are is the default file that lists the public keys that are
permitted for RSA authentication in protocol version 1 permitted for RSA authentication in protocol version 1
and for public key authentication (PubkeyAuthentication) and for public key authentication (PubkeyAuthentication)
@ -528,7 +528,7 @@ permitopen="10.2.1.55:80",permitopen="10.2.1.56:25" 1024 33 23...2323
The The
.Pa /etc/ssh/ssh_known_hosts .Pa /etc/ssh/ssh_known_hosts
and and
.Pa $HOME/.ssh/known_hosts .Pa ~/.ssh/known_hosts
files contain host public keys for all known hosts. files contain host public keys for all known hosts.
The global file should The global file should
be prepared by the administrator (optional), and the per-user file is be prepared by the administrator (optional), and the per-user file is
@ -639,7 +639,7 @@ listening for connections (if there are several daemons running
concurrently for different ports, this contains the process ID of the one concurrently for different ports, this contains the process ID of the one
started last). started last).
The content of this file is not sensitive; it can be world-readable. The content of this file is not sensitive; it can be world-readable.
.It Pa $HOME/.ssh/authorized_keys .It Pa ~/.ssh/authorized_keys
Lists the public keys (RSA or DSA) that can be used to log into the user's account. Lists the public keys (RSA or DSA) that can be used to log into the user's account.
This file must be readable by root (which may on some machines imply This file must be readable by root (which may on some machines imply
it being world-readable if the user's home directory resides on an NFS it being world-readable if the user's home directory resides on an NFS
@ -653,7 +653,7 @@ and/or
.Pa id_rsa.pub .Pa id_rsa.pub
files into this file, as described in files into this file, as described in
.Xr ssh-keygen 1 . .Xr ssh-keygen 1 .
.It Pa "/etc/ssh/ssh_known_hosts", "$HOME/.ssh/known_hosts" .It Pa "/etc/ssh/ssh_known_hosts", "~/.ssh/known_hosts"
These files are consulted when using rhosts with RSA host These files are consulted when using rhosts with RSA host
authentication or protocol version 2 hostbased authentication authentication or protocol version 2 hostbased authentication
to check the public key of the host. to check the public key of the host.
@ -663,12 +663,12 @@ to verify that it is connecting to the correct remote host.
These files should be writable only by root/the owner. These files should be writable only by root/the owner.
.Pa /etc/ssh/ssh_known_hosts .Pa /etc/ssh/ssh_known_hosts
should be world-readable, and should be world-readable, and
.Pa $HOME/.ssh/known_hosts .Pa ~/.ssh/known_hosts
can, but need not be, world-readable. can, but need not be, world-readable.
.It Pa /etc/motd .It Pa /etc/motd
See See
.Xr motd 5 . .Xr motd 5 .
.It Pa $HOME/.hushlogin .It Pa ~/.hushlogin
This file is used to suppress printing the last login time and This file is used to suppress printing the last login time and
.Pa /etc/motd , .Pa /etc/motd ,
if if
@ -691,7 +691,7 @@ The file should be world-readable.
Access controls that should be enforced by tcp-wrappers are defined here. Access controls that should be enforced by tcp-wrappers are defined here.
Further details are described in Further details are described in
.Xr hosts_access 5 . .Xr hosts_access 5 .
.It Pa $HOME/.rhosts .It Pa ~/.rhosts
This file is used during This file is used during
.Cm RhostsRSAAuthentication .Cm RhostsRSAAuthentication
and and
@ -709,7 +709,7 @@ It is also possible to use netgroups in the file.
Either host or user Either host or user
name may be of the form +@groupname to specify all hosts or all users name may be of the form +@groupname to specify all hosts or all users
in the group. in the group.
.It Pa $HOME/.shosts .It Pa ~/.shosts
For ssh, For ssh,
this file is exactly the same as for this file is exactly the same as for
.Pa .rhosts . .Pa .rhosts .
@ -758,7 +758,7 @@ This is processed exactly as
.Pa /etc/hosts.equiv . .Pa /etc/hosts.equiv .
However, this file may be useful in environments that want to run both However, this file may be useful in environments that want to run both
rsh/rlogin and ssh. rsh/rlogin and ssh.
.It Pa $HOME/.ssh/environment .It Pa ~/.ssh/environment
This file is read into the environment at login (if it exists). This file is read into the environment at login (if it exists).
It can only contain empty lines, comment lines (that start with It can only contain empty lines, comment lines (that start with
.Ql # ) , .Ql # ) ,
@ -769,7 +769,7 @@ Environment processing is disabled by default and is
controlled via the controlled via the
.Cm PermitUserEnvironment .Cm PermitUserEnvironment
option. option.
.It Pa $HOME/.ssh/rc .It Pa ~/.ssh/rc
If this file exists, it is run with If this file exists, it is run with
.Pa /bin/sh .Pa /bin/sh
after reading the after reading the
@ -814,7 +814,7 @@ This file should be writable only by the user, and need not be
readable by anyone else. readable by anyone else.
.It Pa /etc/ssh/sshrc .It Pa /etc/ssh/sshrc
Like Like
.Pa $HOME/.ssh/rc . .Pa ~/.ssh/rc .
This can be used to specify This can be used to specify
machine-specific login-time initializations globally. machine-specific login-time initializations globally.
This file should be writable only by root, and should be world-readable. This file should be writable only by root, and should be world-readable.

View File

@ -34,7 +34,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\" .\"
.\" $OpenBSD: sshd_config.5,v 1.40 2005/03/18 17:05:00 jmc Exp $ .\" $OpenBSD: sshd_config.5,v 1.41 2005/04/21 06:17:50 djm Exp $
.Dd September 25, 1999 .Dd September 25, 1999
.Dt SSHD_CONFIG 5 .Dt SSHD_CONFIG 5
.Os .Os
@ -327,7 +327,7 @@ The default is
Specifies whether Specifies whether
.Nm sshd .Nm sshd
should ignore the user's should ignore the user's
.Pa $HOME/.ssh/known_hosts .Pa ~/.ssh/known_hosts
during during
.Cm RhostsRSAAuthentication .Cm RhostsRSAAuthentication
or or