mirror of git://anongit.mindrot.org/openssh.git
- (djm) OpenBSD CVS Sync
- jmc@cvs.openbsd.org 2003/03/28 10:11:43 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5] [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8] - killed whitespace - new sentence new line - .Bk for arguments ok markus@
This commit is contained in:
parent
f18462f5bf
commit
495dca3518
13
ChangeLog
13
ChangeLog
|
@ -1,3 +1,14 @@
|
||||||
|
20030401
|
||||||
|
- (djm) OpenBSD CVS Sync
|
||||||
|
- jmc@cvs.openbsd.org 2003/03/28 10:11:43
|
||||||
|
[scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
|
||||||
|
[ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
|
||||||
|
- killed whitespace
|
||||||
|
- new sentence new line
|
||||||
|
- .Bk for arguments
|
||||||
|
ok markus@
|
||||||
|
|
||||||
|
|
||||||
20030326
|
20030326
|
||||||
- (djm) OpenBSD CVS Sync
|
- (djm) OpenBSD CVS Sync
|
||||||
- deraadt@cvs.openbsd.org 2003/03/26 04:02:51
|
- deraadt@cvs.openbsd.org 2003/03/26 04:02:51
|
||||||
|
@ -1259,4 +1270,4 @@
|
||||||
save auth method before monitor_reset_key_state(); bugzilla bug #284;
|
save auth method before monitor_reset_key_state(); bugzilla bug #284;
|
||||||
ok provos@
|
ok provos@
|
||||||
|
|
||||||
$Id: ChangeLog,v 1.2642 2003/03/26 05:01:11 djm Exp $
|
$Id: ChangeLog,v 1.2643 2003/04/01 11:42:14 djm Exp $
|
||||||
|
|
4
scp.1
4
scp.1
|
@ -9,7 +9,7 @@
|
||||||
.\"
|
.\"
|
||||||
.\" Created: Sun May 7 00:14:37 1995 ylo
|
.\" Created: Sun May 7 00:14:37 1995 ylo
|
||||||
.\"
|
.\"
|
||||||
.\" $OpenBSD: scp.1,v 1.26 2003/01/28 17:24:51 stevesk Exp $
|
.\" $OpenBSD: scp.1,v 1.27 2003/03/28 10:11:43 jmc Exp $
|
||||||
.\"
|
.\"
|
||||||
.Dd September 25, 1999
|
.Dd September 25, 1999
|
||||||
.Dt SCP 1
|
.Dt SCP 1
|
||||||
|
@ -19,6 +19,7 @@
|
||||||
.Nd secure copy (remote file copy program)
|
.Nd secure copy (remote file copy program)
|
||||||
.Sh SYNOPSIS
|
.Sh SYNOPSIS
|
||||||
.Nm scp
|
.Nm scp
|
||||||
|
.Bk -words
|
||||||
.Op Fl pqrvBC1246
|
.Op Fl pqrvBC1246
|
||||||
.Op Fl F Ar ssh_config
|
.Op Fl F Ar ssh_config
|
||||||
.Op Fl S Ar program
|
.Op Fl S Ar program
|
||||||
|
@ -40,6 +41,7 @@
|
||||||
.Ar host2 No :
|
.Ar host2 No :
|
||||||
.Oc Ar file2
|
.Oc Ar file2
|
||||||
.Sm on
|
.Sm on
|
||||||
|
.Ek
|
||||||
.Sh DESCRIPTION
|
.Sh DESCRIPTION
|
||||||
.Nm
|
.Nm
|
||||||
copies files between hosts on a network.
|
copies files between hosts on a network.
|
||||||
|
|
26
sftp.1
26
sftp.1
|
@ -1,4 +1,4 @@
|
||||||
.\" $OpenBSD: sftp.1,v 1.40 2003/01/10 08:19:07 fgsch Exp $
|
.\" $OpenBSD: sftp.1,v 1.41 2003/03/28 10:11:43 jmc Exp $
|
||||||
.\"
|
.\"
|
||||||
.\" Copyright (c) 2001 Damien Miller. All rights reserved.
|
.\" Copyright (c) 2001 Damien Miller. All rights reserved.
|
||||||
.\"
|
.\"
|
||||||
|
@ -30,6 +30,7 @@
|
||||||
.Nd Secure file transfer program
|
.Nd Secure file transfer program
|
||||||
.Sh SYNOPSIS
|
.Sh SYNOPSIS
|
||||||
.Nm sftp
|
.Nm sftp
|
||||||
|
.Bk -words
|
||||||
.Op Fl vC1
|
.Op Fl vC1
|
||||||
.Op Fl b Ar batchfile
|
.Op Fl b Ar batchfile
|
||||||
.Op Fl o Ar ssh_option
|
.Op Fl o Ar ssh_option
|
||||||
|
@ -40,10 +41,15 @@
|
||||||
.Op Fl R Ar num_requests
|
.Op Fl R Ar num_requests
|
||||||
.Op Fl S Ar program
|
.Op Fl S Ar program
|
||||||
.Ar host
|
.Ar host
|
||||||
|
.Ek
|
||||||
.Nm sftp
|
.Nm sftp
|
||||||
.Op [\fIuser\fR@]\fIhost\fR[:\fIfile\fR [\fIfile\fR]]
|
.Oo Oo Ar user Ns No @ Oc Ns
|
||||||
|
.Ar host Ns Oo : Ns Ar file Oo
|
||||||
|
.Ar file Oc Oc Oc
|
||||||
.Nm sftp
|
.Nm sftp
|
||||||
.Op [\fIuser\fR@]\fIhost\fR[:\fIdir\fR[\fI/\fR]]
|
.Oo Oo Ar user Ns No @ Oc Ns
|
||||||
|
.Ar host Ns Oo : Ns Ar dir Ns
|
||||||
|
.Oo Ar / Oc Oc Oc
|
||||||
.Sh DESCRIPTION
|
.Sh DESCRIPTION
|
||||||
.Nm
|
.Nm
|
||||||
is an interactive file transfer program, similar to
|
is an interactive file transfer program, similar to
|
||||||
|
@ -77,13 +83,13 @@ non-interactive authentication.
|
||||||
will abort if any of the following
|
will abort if any of the following
|
||||||
commands fail:
|
commands fail:
|
||||||
.Ic get , put , rename , ln ,
|
.Ic get , put , rename , ln ,
|
||||||
.Ic rm , mkdir , chdir , ls ,
|
.Ic rm , mkdir , chdir , ls ,
|
||||||
.Ic lchdir , chmod , chown , chgrp , lpwd
|
.Ic lchdir , chmod , chown , chgrp , lpwd
|
||||||
and
|
and
|
||||||
.Ic lmkdir .
|
.Ic lmkdir .
|
||||||
Termination on error can be suppressed on a command by command basis by
|
Termination on error can be suppressed on a command by command basis by
|
||||||
prefixing the command with a
|
prefixing the command with a
|
||||||
.Ic '-'
|
.Ic '-'
|
||||||
character (For example,
|
character (For example,
|
||||||
.Ic -rm /tmp/blah*
|
.Ic -rm /tmp/blah*
|
||||||
).
|
).
|
||||||
|
@ -95,19 +101,19 @@ in the format used in
|
||||||
This is useful for specifying options
|
This is useful for specifying options
|
||||||
for which there is no separate
|
for which there is no separate
|
||||||
.Nm sftp
|
.Nm sftp
|
||||||
command-line flag. For example, to specify an alternate
|
command-line flag. For example, to specify an alternate
|
||||||
port use:
|
port use:
|
||||||
.Ic sftp -oPort=24 .
|
.Ic sftp -oPort=24 .
|
||||||
.It Fl s Ar subsystem | sftp_server
|
.It Fl s Ar subsystem | sftp_server
|
||||||
Specifies the SSH2 subsystem or the path for an sftp server
|
Specifies the SSH2 subsystem or the path for an sftp server
|
||||||
on the remote host. A path is useful for using sftp over
|
on the remote host. A path is useful for using sftp over
|
||||||
protocol version 1, or when the remote
|
protocol version 1, or when the remote
|
||||||
.Nm sshd
|
.Nm sshd
|
||||||
does not have an sftp subsystem configured.
|
does not have an sftp subsystem configured.
|
||||||
.It Fl v
|
.It Fl v
|
||||||
Raise logging level. This option is also passed to ssh.
|
Raise logging level. This option is also passed to ssh.
|
||||||
.It Fl B Ar buffer_size
|
.It Fl B Ar buffer_size
|
||||||
Specify the size of the buffer that
|
Specify the size of the buffer that
|
||||||
.Nm
|
.Nm
|
||||||
uses when transferring files. Larger buffers require fewer round trips at
|
uses when transferring files. Larger buffers require fewer round trips at
|
||||||
the cost of higher memory consumption. The default is 32768 bytes.
|
the cost of higher memory consumption. The default is 32768 bytes.
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
.\" $OpenBSD: ssh-add.1,v 1.37 2003/02/10 11:51:47 markus Exp $
|
.\" $OpenBSD: ssh-add.1,v 1.38 2003/03/28 10:11:43 jmc Exp $
|
||||||
.\"
|
.\"
|
||||||
.\" -*- nroff -*-
|
.\" -*- nroff -*-
|
||||||
.\"
|
.\"
|
||||||
|
@ -95,10 +95,11 @@ specified in
|
||||||
.Xr sshd_config 5 .
|
.Xr sshd_config 5 .
|
||||||
.It Fl c
|
.It Fl c
|
||||||
Indicates that added identities should be subject to confirmation before
|
Indicates that added identities should be subject to confirmation before
|
||||||
being used for authentication. Confirmation is performed by the
|
being used for authentication.
|
||||||
|
Confirmation is performed by the
|
||||||
.Ev SSH_ASKPASS
|
.Ev SSH_ASKPASS
|
||||||
program mentioned below. Successful confirmation is signaled by a zero
|
program mentioned below.
|
||||||
exit status from the
|
Successful confirmation is signaled by a zero exit status from the
|
||||||
.Ev SSH_ASKPASS
|
.Ev SSH_ASKPASS
|
||||||
program, rather than text entered into the requester.
|
program, rather than text entered into the requester.
|
||||||
.It Fl s Ar reader
|
.It Fl s Ar reader
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
.\" $OpenBSD: ssh-agent.1,v 1.36 2003/01/21 18:14:36 marc Exp $
|
.\" $OpenBSD: ssh-agent.1,v 1.37 2003/03/28 10:11:43 jmc Exp $
|
||||||
.\"
|
.\"
|
||||||
.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
|
.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
|
||||||
.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
||||||
|
@ -88,7 +88,7 @@ Kill the current agent (given by the
|
||||||
.Ev SSH_AGENT_PID
|
.Ev SSH_AGENT_PID
|
||||||
environment variable).
|
environment variable).
|
||||||
.It Fl t Ar life
|
.It Fl t Ar life
|
||||||
Set a default value for the maximum lifetime of identities added to the agent.
|
Set a default value for the maximum lifetime of identities added to the agent.
|
||||||
The lifetime may be specified in seconds or in a time format specified in
|
The lifetime may be specified in seconds or in a time format specified in
|
||||||
.Xr sshd 8 .
|
.Xr sshd 8 .
|
||||||
A lifetime specified for an identity with
|
A lifetime specified for an identity with
|
||||||
|
@ -96,7 +96,8 @@ A lifetime specified for an identity with
|
||||||
overrides this value.
|
overrides this value.
|
||||||
Without this option the default maximum lifetime is forever.
|
Without this option the default maximum lifetime is forever.
|
||||||
.It Fl d
|
.It Fl d
|
||||||
Debug mode. When this option is specified
|
Debug mode.
|
||||||
|
When this option is specified
|
||||||
.Nm
|
.Nm
|
||||||
will not fork.
|
will not fork.
|
||||||
.El
|
.El
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
.\" $OpenBSD: ssh-keygen.1,v 1.55 2002/11/26 02:35:30 stevesk Exp $
|
.\" $OpenBSD: ssh-keygen.1,v 1.56 2003/03/28 10:11:43 jmc Exp $
|
||||||
.\"
|
.\"
|
||||||
.\" -*- nroff -*-
|
.\" -*- nroff -*-
|
||||||
.\"
|
.\"
|
||||||
|
@ -45,12 +45,14 @@
|
||||||
.Nd authentication key generation, management and conversion
|
.Nd authentication key generation, management and conversion
|
||||||
.Sh SYNOPSIS
|
.Sh SYNOPSIS
|
||||||
.Nm ssh-keygen
|
.Nm ssh-keygen
|
||||||
|
.Bk -words
|
||||||
.Op Fl q
|
.Op Fl q
|
||||||
.Op Fl b Ar bits
|
.Op Fl b Ar bits
|
||||||
.Fl t Ar type
|
.Fl t Ar type
|
||||||
.Op Fl N Ar new_passphrase
|
.Op Fl N Ar new_passphrase
|
||||||
.Op Fl C Ar comment
|
.Op Fl C Ar comment
|
||||||
.Op Fl f Ar output_keyfile
|
.Op Fl f Ar output_keyfile
|
||||||
|
.Ek
|
||||||
.Nm ssh-keygen
|
.Nm ssh-keygen
|
||||||
.Fl p
|
.Fl p
|
||||||
.Op Fl P Ar old_passphrase
|
.Op Fl P Ar old_passphrase
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
.\" $OpenBSD: ssh-keyscan.1,v 1.14 2002/02/13 08:33:47 mpech Exp $
|
.\" $OpenBSD: ssh-keyscan.1,v 1.15 2003/03/28 10:11:43 jmc Exp $
|
||||||
.\"
|
.\"
|
||||||
.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>.
|
.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>.
|
||||||
.\"
|
.\"
|
||||||
|
@ -14,6 +14,7 @@
|
||||||
.Nd gather ssh public keys
|
.Nd gather ssh public keys
|
||||||
.Sh SYNOPSIS
|
.Sh SYNOPSIS
|
||||||
.Nm ssh-keyscan
|
.Nm ssh-keyscan
|
||||||
|
.Bk -words
|
||||||
.Op Fl v46
|
.Op Fl v46
|
||||||
.Op Fl p Ar port
|
.Op Fl p Ar port
|
||||||
.Op Fl T Ar timeout
|
.Op Fl T Ar timeout
|
||||||
|
@ -21,10 +22,12 @@
|
||||||
.Op Fl f Ar file
|
.Op Fl f Ar file
|
||||||
.Op Ar host | addrlist namelist
|
.Op Ar host | addrlist namelist
|
||||||
.Op Ar ...
|
.Op Ar ...
|
||||||
|
.Ek
|
||||||
.Sh DESCRIPTION
|
.Sh DESCRIPTION
|
||||||
.Nm
|
.Nm
|
||||||
is a utility for gathering the public ssh host keys of a number of
|
is a utility for gathering the public ssh host keys of a number of
|
||||||
hosts. It was designed to aid in building and verifying
|
hosts.
|
||||||
|
It was designed to aid in building and verifying
|
||||||
.Pa ssh_known_hosts
|
.Pa ssh_known_hosts
|
||||||
files.
|
files.
|
||||||
.Nm
|
.Nm
|
||||||
|
@ -33,9 +36,11 @@ scripts.
|
||||||
.Pp
|
.Pp
|
||||||
.Nm
|
.Nm
|
||||||
uses non-blocking socket I/O to contact as many hosts as possible in
|
uses non-blocking socket I/O to contact as many hosts as possible in
|
||||||
parallel, so it is very efficient. The keys from a domain of 1,000
|
parallel, so it is very efficient.
|
||||||
|
The keys from a domain of 1,000
|
||||||
hosts can be collected in tens of seconds, even when some of those
|
hosts can be collected in tens of seconds, even when some of those
|
||||||
hosts are down or do not run ssh. For scanning, one does not need
|
hosts are down or do not run ssh.
|
||||||
|
For scanning, one does not need
|
||||||
login access to the machines that are being scanned, nor does the
|
login access to the machines that are being scanned, nor does the
|
||||||
scanning process involve any encryption.
|
scanning process involve any encryption.
|
||||||
.Pp
|
.Pp
|
||||||
|
@ -44,12 +49,13 @@ The options are as follows:
|
||||||
.It Fl p Ar port
|
.It Fl p Ar port
|
||||||
Port to connect to on the remote host.
|
Port to connect to on the remote host.
|
||||||
.It Fl T Ar timeout
|
.It Fl T Ar timeout
|
||||||
Set the timeout for connection attempts. If
|
Set the timeout for connection attempts.
|
||||||
|
If
|
||||||
.Pa timeout
|
.Pa timeout
|
||||||
seconds have elapsed since a connection was initiated to a host or since the
|
seconds have elapsed since a connection was initiated to a host or since the
|
||||||
last time anything was read from that host, then the connection is
|
last time anything was read from that host, then the connection is
|
||||||
closed and the host in question considered unavailable. Default is 5
|
closed and the host in question considered unavailable.
|
||||||
seconds.
|
Default is 5 seconds.
|
||||||
.It Fl t Ar type
|
.It Fl t Ar type
|
||||||
Specifies the type of the key to fetch from the scanned hosts.
|
Specifies the type of the key to fetch from the scanned hosts.
|
||||||
The possible values are
|
The possible values are
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
.\" $OpenBSD: ssh-keysign.8,v 1.5 2002/11/24 21:46:24 stevesk Exp $
|
.\" $OpenBSD: ssh-keysign.8,v 1.6 2003/03/28 10:11:43 jmc Exp $
|
||||||
.\"
|
.\"
|
||||||
.\" Copyright (c) 2002 Markus Friedl. All rights reserved.
|
.\" Copyright (c) 2002 Markus Friedl. All rights reserved.
|
||||||
.\"
|
.\"
|
||||||
|
@ -62,8 +62,8 @@ Controls whether
|
||||||
is enabled.
|
is enabled.
|
||||||
.It Pa /etc/ssh/ssh_host_dsa_key, /etc/ssh/ssh_host_rsa_key
|
.It Pa /etc/ssh/ssh_host_dsa_key, /etc/ssh/ssh_host_rsa_key
|
||||||
These files contain the private parts of the host keys used to
|
These files contain the private parts of the host keys used to
|
||||||
generate the digital signature. They
|
generate the digital signature.
|
||||||
should be owned by root, readable only by root, and not
|
They should be owned by root, readable only by root, and not
|
||||||
accessible to others.
|
accessible to others.
|
||||||
Since they are readable only by root,
|
Since they are readable only by root,
|
||||||
.Nm
|
.Nm
|
||||||
|
|
34
ssh.1
34
ssh.1
|
@ -34,7 +34,7 @@
|
||||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.\" $OpenBSD: ssh.1,v 1.167 2002/09/27 15:46:21 stevesk Exp $
|
.\" $OpenBSD: ssh.1,v 1.168 2003/03/28 10:11:43 jmc Exp $
|
||||||
.Dd September 25, 1999
|
.Dd September 25, 1999
|
||||||
.Dt SSH 1
|
.Dt SSH 1
|
||||||
.Os
|
.Os
|
||||||
|
@ -48,6 +48,7 @@
|
||||||
.Op Ar command
|
.Op Ar command
|
||||||
.Pp
|
.Pp
|
||||||
.Nm ssh
|
.Nm ssh
|
||||||
|
.Bk -words
|
||||||
.Op Fl afgknqstvxACNTX1246
|
.Op Fl afgknqstvxACNTX1246
|
||||||
.Op Fl b Ar bind_address
|
.Op Fl b Ar bind_address
|
||||||
.Op Fl c Ar cipher_spec
|
.Op Fl c Ar cipher_spec
|
||||||
|
@ -66,6 +67,8 @@
|
||||||
.Sm on
|
.Sm on
|
||||||
.Xc
|
.Xc
|
||||||
.Oc
|
.Oc
|
||||||
|
.Ek
|
||||||
|
.Bk -words
|
||||||
.Oo Fl R Xo
|
.Oo Fl R Xo
|
||||||
.Sm off
|
.Sm off
|
||||||
.Ar port :
|
.Ar port :
|
||||||
|
@ -77,6 +80,7 @@
|
||||||
.Op Fl D Ar port
|
.Op Fl D Ar port
|
||||||
.Ar hostname | user@hostname
|
.Ar hostname | user@hostname
|
||||||
.Op Ar command
|
.Op Ar command
|
||||||
|
.Ek
|
||||||
.Sh DESCRIPTION
|
.Sh DESCRIPTION
|
||||||
.Nm
|
.Nm
|
||||||
(SSH client) is a program for logging into a remote machine and for
|
(SSH client) is a program for logging into a remote machine and for
|
||||||
|
@ -361,7 +365,7 @@ variable is set to
|
||||||
.Fl A
|
.Fl A
|
||||||
and
|
and
|
||||||
.Fl a
|
.Fl a
|
||||||
options described later) and
|
options described later) and
|
||||||
the user is using an authentication agent, the connection to the agent
|
the user is using an authentication agent, the connection to the agent
|
||||||
is automatically forwarded to the remote side.
|
is automatically forwarded to the remote side.
|
||||||
.Pp
|
.Pp
|
||||||
|
@ -403,10 +407,11 @@ Disables forwarding of the authentication agent connection.
|
||||||
Enables forwarding of the authentication agent connection.
|
Enables forwarding of the authentication agent connection.
|
||||||
This can also be specified on a per-host basis in a configuration file.
|
This can also be specified on a per-host basis in a configuration file.
|
||||||
.Pp
|
.Pp
|
||||||
Agent forwarding should be enabled with caution. Users with the
|
Agent forwarding should be enabled with caution.
|
||||||
ability to bypass file permissions on the remote host (for the agent's
|
Users with the ability to bypass file permissions on the remote host
|
||||||
Unix-domain socket) can access the local agent through the forwarded
|
(for the agent's Unix-domain socket)
|
||||||
connection. An attacker cannot obtain key material from the agent,
|
can access the local agent through the forwarded connection.
|
||||||
|
An attacker cannot obtain key material from the agent,
|
||||||
however they can perform operations on the keys that enable them to
|
however they can perform operations on the keys that enable them to
|
||||||
authenticate using the identities loaded into the agent.
|
authenticate using the identities loaded into the agent.
|
||||||
.It Fl b Ar bind_address
|
.It Fl b Ar bind_address
|
||||||
|
@ -428,8 +433,8 @@ is only supported in the
|
||||||
client for interoperability with legacy protocol 1 implementations
|
client for interoperability with legacy protocol 1 implementations
|
||||||
that do not support the
|
that do not support the
|
||||||
.Ar 3des
|
.Ar 3des
|
||||||
cipher. Its use is strongly discouraged due to cryptographic
|
cipher.
|
||||||
weaknesses.
|
Its use is strongly discouraged due to cryptographic weaknesses.
|
||||||
.It Fl c Ar cipher_spec
|
.It Fl c Ar cipher_spec
|
||||||
Additionally, for protocol version 2 a comma-separated list of ciphers can
|
Additionally, for protocol version 2 a comma-separated list of ciphers can
|
||||||
be specified in order of preference.
|
be specified in order of preference.
|
||||||
|
@ -566,11 +571,11 @@ Disables X11 forwarding.
|
||||||
Enables X11 forwarding.
|
Enables X11 forwarding.
|
||||||
This can also be specified on a per-host basis in a configuration file.
|
This can also be specified on a per-host basis in a configuration file.
|
||||||
.Pp
|
.Pp
|
||||||
X11 forwarding should be enabled with caution. Users with the ability
|
X11 forwarding should be enabled with caution.
|
||||||
to bypass file permissions on the remote host (for the user's X
|
Users with the ability to bypass file permissions on the remote host
|
||||||
authorization database) can access the local X11 display through the
|
(for the user's X authorization database)
|
||||||
forwarded connection. An attacker may then be able to perform
|
can access the local X11 display through the forwarded connection.
|
||||||
activities such as keystroke monitoring.
|
An attacker may then be able to perform activities such as keystroke monitoring.
|
||||||
.It Fl C
|
.It Fl C
|
||||||
Requests compression of all data (including stdin, stdout, stderr, and
|
Requests compression of all data (including stdin, stdout, stderr, and
|
||||||
data for forwarded X11 and TCP/IP connections).
|
data for forwarded X11 and TCP/IP connections).
|
||||||
|
@ -637,7 +642,8 @@ This works by allocating a socket to listen to
|
||||||
on the local side, and whenever a connection is made to this port, the
|
on the local side, and whenever a connection is made to this port, the
|
||||||
connection is forwarded over the secure channel, and the application
|
connection is forwarded over the secure channel, and the application
|
||||||
protocol is then used to determine where to connect to from the
|
protocol is then used to determine where to connect to from the
|
||||||
remote machine. Currently the SOCKS4 protocol is supported, and
|
remote machine.
|
||||||
|
Currently the SOCKS4 protocol is supported, and
|
||||||
.Nm
|
.Nm
|
||||||
will act as a SOCKS4 server.
|
will act as a SOCKS4 server.
|
||||||
Only root can forward privileged ports.
|
Only root can forward privileged ports.
|
||||||
|
|
48
ssh_config.5
48
ssh_config.5
|
@ -34,7 +34,7 @@
|
||||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.\" $OpenBSD: ssh_config.5,v 1.6 2003/02/06 09:27:29 markus Exp $
|
.\" $OpenBSD: ssh_config.5,v 1.7 2003/03/28 10:11:43 jmc Exp $
|
||||||
.Dd September 25, 1999
|
.Dd September 25, 1999
|
||||||
.Dt SSH_CONFIG 5
|
.Dt SSH_CONFIG 5
|
||||||
.Os
|
.Os
|
||||||
|
@ -176,8 +176,8 @@ is only supported in the
|
||||||
client for interoperability with legacy protocol 1 implementations
|
client for interoperability with legacy protocol 1 implementations
|
||||||
that do not support the
|
that do not support the
|
||||||
.Ar 3des
|
.Ar 3des
|
||||||
cipher. Its use is strongly discouraged due to cryptographic
|
cipher.
|
||||||
weaknesses.
|
Its use is strongly discouraged due to cryptographic weaknesses.
|
||||||
The default is
|
The default is
|
||||||
.Dq 3des .
|
.Dq 3des .
|
||||||
.It Cm Ciphers
|
.It Cm Ciphers
|
||||||
|
@ -193,7 +193,8 @@ The default is
|
||||||
.It Cm ClearAllForwardings
|
.It Cm ClearAllForwardings
|
||||||
Specifies that all local, remote and dynamic port forwardings
|
Specifies that all local, remote and dynamic port forwardings
|
||||||
specified in the configuration files or on the command line be
|
specified in the configuration files or on the command line be
|
||||||
cleared. This option is primarily useful when used from the
|
cleared.
|
||||||
|
This option is primarily useful when used from the
|
||||||
.Nm ssh
|
.Nm ssh
|
||||||
command line to clear port forwardings set in
|
command line to clear port forwardings set in
|
||||||
configuration files, and is automatically set by
|
configuration files, and is automatically set by
|
||||||
|
@ -230,13 +231,14 @@ The default is 1.
|
||||||
Specifies that a TCP/IP port on the local machine be forwarded
|
Specifies that a TCP/IP port on the local machine be forwarded
|
||||||
over the secure channel, and the application
|
over the secure channel, and the application
|
||||||
protocol is then used to determine where to connect to from the
|
protocol is then used to determine where to connect to from the
|
||||||
remote machine. The argument must be a port number.
|
remote machine.
|
||||||
|
The argument must be a port number.
|
||||||
Currently the SOCKS4 protocol is supported, and
|
Currently the SOCKS4 protocol is supported, and
|
||||||
.Nm ssh
|
.Nm ssh
|
||||||
will act as a SOCKS4 server.
|
will act as a SOCKS4 server.
|
||||||
Multiple forwardings may be specified, and
|
Multiple forwardings may be specified, and
|
||||||
additional forwardings can be given on the command line. Only
|
additional forwardings can be given on the command line.
|
||||||
the superuser can forward privileged ports.
|
Only the superuser can forward privileged ports.
|
||||||
.It Cm EscapeChar
|
.It Cm EscapeChar
|
||||||
Sets the escape character (default:
|
Sets the escape character (default:
|
||||||
.Ql ~ ) .
|
.Ql ~ ) .
|
||||||
|
@ -259,10 +261,11 @@ or
|
||||||
The default is
|
The default is
|
||||||
.Dq no .
|
.Dq no .
|
||||||
.Pp
|
.Pp
|
||||||
Agent forwarding should be enabled with caution. Users with the
|
Agent forwarding should be enabled with caution.
|
||||||
ability to bypass file permissions on the remote host (for the agent's
|
Users with the ability to bypass file permissions on the remote host
|
||||||
Unix-domain socket) can access the local agent through the forwarded
|
(for the agent's Unix-domain socket)
|
||||||
connection. An attacker cannot obtain key material from the agent,
|
can access the local agent through the forwarded connection.
|
||||||
|
An attacker cannot obtain key material from the agent,
|
||||||
however they can perform operations on the keys that enable them to
|
however they can perform operations on the keys that enable them to
|
||||||
authenticate using the identities loaded into the agent.
|
authenticate using the identities loaded into the agent.
|
||||||
.It Cm ForwardX11
|
.It Cm ForwardX11
|
||||||
|
@ -277,18 +280,18 @@ or
|
||||||
The default is
|
The default is
|
||||||
.Dq no .
|
.Dq no .
|
||||||
.Pp
|
.Pp
|
||||||
X11 forwarding should be enabled with caution. Users with the ability
|
X11 forwarding should be enabled with caution.
|
||||||
to bypass file permissions on the remote host (for the user's X
|
Users with the ability to bypass file permissions on the remote host
|
||||||
authorization database) can access the local X11 display through the
|
(for the user's X authorization database)
|
||||||
forwarded connection. An attacker may then be able to perform
|
can access the local X11 display through the forwarded connection.
|
||||||
activities such as keystroke monitoring.
|
An attacker may then be able to perform activities such as keystroke monitoring.
|
||||||
.It Cm GatewayPorts
|
.It Cm GatewayPorts
|
||||||
Specifies whether remote hosts are allowed to connect to local
|
Specifies whether remote hosts are allowed to connect to local
|
||||||
forwarded ports.
|
forwarded ports.
|
||||||
By default,
|
By default,
|
||||||
.Nm ssh
|
.Nm ssh
|
||||||
binds local port forwardings to the loopback address. This
|
binds local port forwardings to the loopback address.
|
||||||
prevents other remote hosts from connecting to forwarded ports.
|
This prevents other remote hosts from connecting to forwarded ports.
|
||||||
.Cm GatewayPorts
|
.Cm GatewayPorts
|
||||||
can be used to specify that
|
can be used to specify that
|
||||||
.Nm ssh
|
.Nm ssh
|
||||||
|
@ -395,8 +398,9 @@ Gives the verbosity level that is used when logging messages from
|
||||||
.Nm ssh .
|
.Nm ssh .
|
||||||
The possible values are:
|
The possible values are:
|
||||||
QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3.
|
QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3.
|
||||||
The default is INFO. DEBUG and DEBUG1 are equivalent. DEBUG2
|
The default is INFO.
|
||||||
and DEBUG3 each specify higher levels of verbose output.
|
DEBUG and DEBUG1 are equivalent.
|
||||||
|
DEBUG2 and DEBUG3 each specify higher levels of verbose output.
|
||||||
.It Cm MACs
|
.It Cm MACs
|
||||||
Specifies the MAC (message authentication code) algorithms
|
Specifies the MAC (message authentication code) algorithms
|
||||||
in order of preference.
|
in order of preference.
|
||||||
|
@ -474,8 +478,8 @@ somewhere.
|
||||||
Host key management will be done using the
|
Host key management will be done using the
|
||||||
HostName of the host being connected (defaulting to the name typed by
|
HostName of the host being connected (defaulting to the name typed by
|
||||||
the user).
|
the user).
|
||||||
Setting the command to
|
Setting the command to
|
||||||
.Dq none
|
.Dq none
|
||||||
disables this option entirely.
|
disables this option entirely.
|
||||||
Note that
|
Note that
|
||||||
.Cm CheckHostIP
|
.Cm CheckHostIP
|
||||||
|
|
|
@ -34,7 +34,7 @@
|
||||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.\" $OpenBSD: sshd_config.5,v 1.14 2003/01/23 08:58:47 jmc Exp $
|
.\" $OpenBSD: sshd_config.5,v 1.15 2003/03/28 10:11:43 jmc Exp $
|
||||||
.Dd September 25, 1999
|
.Dd September 25, 1999
|
||||||
.Dt SSHD_CONFIG 5
|
.Dt SSHD_CONFIG 5
|
||||||
.Os
|
.Os
|
||||||
|
@ -211,8 +211,8 @@ Specifies whether remote hosts are allowed to connect to ports
|
||||||
forwarded for the client.
|
forwarded for the client.
|
||||||
By default,
|
By default,
|
||||||
.Nm sshd
|
.Nm sshd
|
||||||
binds remote port forwardings to the loopback address. This
|
binds remote port forwardings to the loopback address.
|
||||||
prevents other remote hosts from connecting to forwarded ports.
|
This prevents other remote hosts from connecting to forwarded ports.
|
||||||
.Cm GatewayPorts
|
.Cm GatewayPorts
|
||||||
can be used to specify that
|
can be used to specify that
|
||||||
.Nm sshd
|
.Nm sshd
|
||||||
|
@ -370,7 +370,8 @@ is not specified,
|
||||||
will listen on the address and all prior
|
will listen on the address and all prior
|
||||||
.Cm Port
|
.Cm Port
|
||||||
options specified. The default is to listen on all local
|
options specified. The default is to listen on all local
|
||||||
addresses. Multiple
|
addresses.
|
||||||
|
Multiple
|
||||||
.Cm ListenAddress
|
.Cm ListenAddress
|
||||||
options are permitted. Additionally, any
|
options are permitted. Additionally, any
|
||||||
.Cm Port
|
.Cm Port
|
||||||
|
@ -385,10 +386,10 @@ Gives the verbosity level that is used when logging messages from
|
||||||
.Nm sshd .
|
.Nm sshd .
|
||||||
The possible values are:
|
The possible values are:
|
||||||
QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3.
|
QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3.
|
||||||
The default is INFO. DEBUG and DEBUG1 are equivalent. DEBUG2
|
The default is INFO.
|
||||||
and DEBUG3 each specify higher levels of debugging output.
|
DEBUG and DEBUG1 are equivalent.
|
||||||
Logging with a DEBUG level violates the privacy of users
|
DEBUG2 and DEBUG3 each specify higher levels of debugging output.
|
||||||
and is not recommended.
|
Logging with a DEBUG level violates the privacy of users and is not recommended.
|
||||||
.It Cm MACs
|
.It Cm MACs
|
||||||
Specifies the available MAC (message authentication code) algorithms.
|
Specifies the available MAC (message authentication code) algorithms.
|
||||||
The MAC algorithm is used in protocol version 2
|
The MAC algorithm is used in protocol version 2
|
||||||
|
@ -599,16 +600,18 @@ will be disabled because
|
||||||
.Xr login 1
|
.Xr login 1
|
||||||
does not know how to handle
|
does not know how to handle
|
||||||
.Xr xauth 1
|
.Xr xauth 1
|
||||||
cookies. If
|
cookies.
|
||||||
|
If
|
||||||
.Cm UsePrivilegeSeparation
|
.Cm UsePrivilegeSeparation
|
||||||
is specified, it will be disabled after authentication.
|
is specified, it will be disabled after authentication.
|
||||||
.It Cm UsePrivilegeSeparation
|
.It Cm UsePrivilegeSeparation
|
||||||
Specifies whether
|
Specifies whether
|
||||||
.Nm sshd
|
.Nm sshd
|
||||||
separates privileges by creating an unprivileged child process
|
separates privileges by creating an unprivileged child process
|
||||||
to deal with incoming network traffic. After successful authentication,
|
to deal with incoming network traffic.
|
||||||
another process will be created that has the privilege of the authenticated
|
After successful authentication, another process will be created that has
|
||||||
user. The goal of privilege separation is to prevent privilege
|
the privilege of the authenticated user.
|
||||||
|
The goal of privilege separation is to prevent privilege
|
||||||
escalation by containing any corruption within the unprivileged processes.
|
escalation by containing any corruption within the unprivileged processes.
|
||||||
The default is
|
The default is
|
||||||
.Dq yes .
|
.Dq yes .
|
||||||
|
@ -666,7 +669,8 @@ is enabled.
|
||||||
Specifies whether
|
Specifies whether
|
||||||
.Nm sshd
|
.Nm sshd
|
||||||
should bind the X11 forwarding server to the loopback address or to
|
should bind the X11 forwarding server to the loopback address or to
|
||||||
the wildcard address. By default,
|
the wildcard address.
|
||||||
|
By default,
|
||||||
.Nm sshd
|
.Nm sshd
|
||||||
binds the forwarding server to the loopback address and sets the
|
binds the forwarding server to the loopback address and sets the
|
||||||
hostname part of the
|
hostname part of the
|
||||||
|
|
Loading…
Reference in New Issue