Deleted Added
full compact
ssh.0 (239844) ssh.0 (239849)
1SSH(1) OpenBSD Reference Manual SSH(1)
2
3NAME
4 ssh - OpenSSH SSH client (remote login program)
5
6SYNOPSIS
7 ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec]
8 [-D [bind_address:]port] [-e escape_char] [-F configfile] [-I pkcs11]

--- 289 unchanged lines hidden (view full) ---

298 works by allocating a socket to listen to port on the remote
299 side, and whenever a connection is made to this port, the
300 connection is forwarded over the secure channel, and a connection
301 is made to host port hostport from the local machine.
302
303 Port forwardings can also be specified in the configuration file.
304 Privileged ports can be forwarded only when logging in as root on
305 the remote machine. IPv6 addresses can be specified by enclosing
1SSH(1) OpenBSD Reference Manual SSH(1)
2
3NAME
4 ssh - OpenSSH SSH client (remote login program)
5
6SYNOPSIS
7 ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec]
8 [-D [bind_address:]port] [-e escape_char] [-F configfile] [-I pkcs11]

--- 289 unchanged lines hidden (view full) ---

298 works by allocating a socket to listen to port on the remote
299 side, and whenever a connection is made to this port, the
300 connection is forwarded over the secure channel, and a connection
301 is made to host port hostport from the local machine.
302
303 Port forwardings can also be specified in the configuration file.
304 Privileged ports can be forwarded only when logging in as root on
305 the remote machine. IPv6 addresses can be specified by enclosing
306 the address in square braces.
306 the address in square brackets.
307
308 By default, the listening socket on the server will be bound to
309 the loopback interface only. This may be overridden by
310 specifying a bind_address. An empty bind_address, or the address
311 `*', indicates that the remote socket should listen on all
312 interfaces. Specifying a remote bind_address will only succeed
313 if the server's GatewayPorts option is enabled (see
314 sshd_config(5)).

--- 27 unchanged lines hidden (view full) ---

342 -v Verbose mode. Causes ssh to print debugging messages about its
343 progress. This is helpful in debugging connection,
344 authentication, and configuration problems. Multiple -v options
345 increase the verbosity. The maximum is 3.
346
347 -W host:port
348 Requests that standard input and output on the client be
349 forwarded to host on port over the secure channel. Implies -N,
307
308 By default, the listening socket on the server will be bound to
309 the loopback interface only. This may be overridden by
310 specifying a bind_address. An empty bind_address, or the address
311 `*', indicates that the remote socket should listen on all
312 interfaces. Specifying a remote bind_address will only succeed
313 if the server's GatewayPorts option is enabled (see
314 sshd_config(5)).

--- 27 unchanged lines hidden (view full) ---

342 -v Verbose mode. Causes ssh to print debugging messages about its
343 progress. This is helpful in debugging connection,
344 authentication, and configuration problems. Multiple -v options
345 increase the verbosity. The maximum is 3.
346
347 -W host:port
348 Requests that standard input and output on the client be
349 forwarded to host on port over the secure channel. Implies -N,
350 -T, ExitOnForwardFailure and ClearAllForwardings and works with
350 -T, ExitOnForwardFailure and ClearAllForwardings. Works with
351 Protocol version 2 only.
352
353 -w local_tun[:remote_tun]
354 Requests tunnel device forwarding with the specified tun(4)
355 devices between the client (local_tun) and the server
356 (remote_tun).
357
358 The devices may be specified by numerical ID or the keyword

--- 471 unchanged lines hidden (view full) ---

830 /etc/ssh/ssh_config
831 Systemwide configuration file. The file format and configuration
832 options are described in ssh_config(5).
833
834 /etc/ssh/ssh_host_key
835 /etc/ssh/ssh_host_dsa_key
836 /etc/ssh/ssh_host_ecdsa_key
837 /etc/ssh/ssh_host_rsa_key
351 Protocol version 2 only.
352
353 -w local_tun[:remote_tun]
354 Requests tunnel device forwarding with the specified tun(4)
355 devices between the client (local_tun) and the server
356 (remote_tun).
357
358 The devices may be specified by numerical ID or the keyword

--- 471 unchanged lines hidden (view full) ---

830 /etc/ssh/ssh_config
831 Systemwide configuration file. The file format and configuration
832 options are described in ssh_config(5).
833
834 /etc/ssh/ssh_host_key
835 /etc/ssh/ssh_host_dsa_key
836 /etc/ssh/ssh_host_ecdsa_key
837 /etc/ssh/ssh_host_rsa_key
838 These three files contain the private parts of the host keys and
839 are used for host-based authentication. If protocol version 1 is
838 These files contain the private parts of the host keys and are
839 used for host-based authentication. If protocol version 1 is
840 used, ssh must be setuid root, since the host key is readable
841 only by root. For protocol version 2, ssh uses ssh-keysign(8) to
842 access the host keys, eliminating the requirement that ssh be
843 setuid root when host-based authentication is used. By default
844 ssh is not setuid root.
845
846 /etc/ssh/ssh_known_hosts
847 Systemwide list of known host keys. This file should be prepared

--- 51 unchanged lines hidden (view full) ---

899
900AUTHORS
901 OpenSSH is a derivative of the original and free ssh 1.2.12 release by
902 Tatu Ylonen. Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo
903 de Raadt and Dug Song removed many bugs, re-added newer features and
904 created OpenSSH. Markus Friedl contributed the support for SSH protocol
905 versions 1.5 and 2.0.
906
840 used, ssh must be setuid root, since the host key is readable
841 only by root. For protocol version 2, ssh uses ssh-keysign(8) to
842 access the host keys, eliminating the requirement that ssh be
843 setuid root when host-based authentication is used. By default
844 ssh is not setuid root.
845
846 /etc/ssh/ssh_known_hosts
847 Systemwide list of known host keys. This file should be prepared

--- 51 unchanged lines hidden (view full) ---

899
900AUTHORS
901 OpenSSH is a derivative of the original and free ssh 1.2.12 release by
902 Tatu Ylonen. Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo
903 de Raadt and Dug Song removed many bugs, re-added newer features and
904 created OpenSSH. Markus Friedl contributed the support for SSH protocol
905 versions 1.5 and 2.0.
906
907OpenBSD 5.0 September 11, 2011 OpenBSD 5.0
907OpenBSD 5.2 June 18, 2012 OpenBSD 5.2