ssh.0 (239844) | ssh.0 (239849) |
---|---|
1SSH(1) OpenBSD Reference Manual SSH(1) 2 3NAME 4 ssh - OpenSSH SSH client (remote login program) 5 6SYNOPSIS 7 ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] 8 [-D [bind_address:]port] [-e escape_char] [-F configfile] [-I pkcs11] --- 289 unchanged lines hidden (view full) --- 298 works by allocating a socket to listen to port on the remote 299 side, and whenever a connection is made to this port, the 300 connection is forwarded over the secure channel, and a connection 301 is made to host port hostport from the local machine. 302 303 Port forwardings can also be specified in the configuration file. 304 Privileged ports can be forwarded only when logging in as root on 305 the remote machine. IPv6 addresses can be specified by enclosing | 1SSH(1) OpenBSD Reference Manual SSH(1) 2 3NAME 4 ssh - OpenSSH SSH client (remote login program) 5 6SYNOPSIS 7 ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] 8 [-D [bind_address:]port] [-e escape_char] [-F configfile] [-I pkcs11] --- 289 unchanged lines hidden (view full) --- 298 works by allocating a socket to listen to port on the remote 299 side, and whenever a connection is made to this port, the 300 connection is forwarded over the secure channel, and a connection 301 is made to host port hostport from the local machine. 302 303 Port forwardings can also be specified in the configuration file. 304 Privileged ports can be forwarded only when logging in as root on 305 the remote machine. IPv6 addresses can be specified by enclosing |
306 the address in square braces. | 306 the address in square brackets. |
307 308 By default, the listening socket on the server will be bound to 309 the loopback interface only. This may be overridden by 310 specifying a bind_address. An empty bind_address, or the address 311 `*', indicates that the remote socket should listen on all 312 interfaces. Specifying a remote bind_address will only succeed 313 if the server's GatewayPorts option is enabled (see 314 sshd_config(5)). --- 27 unchanged lines hidden (view full) --- 342 -v Verbose mode. Causes ssh to print debugging messages about its 343 progress. This is helpful in debugging connection, 344 authentication, and configuration problems. Multiple -v options 345 increase the verbosity. The maximum is 3. 346 347 -W host:port 348 Requests that standard input and output on the client be 349 forwarded to host on port over the secure channel. Implies -N, | 307 308 By default, the listening socket on the server will be bound to 309 the loopback interface only. This may be overridden by 310 specifying a bind_address. An empty bind_address, or the address 311 `*', indicates that the remote socket should listen on all 312 interfaces. Specifying a remote bind_address will only succeed 313 if the server's GatewayPorts option is enabled (see 314 sshd_config(5)). --- 27 unchanged lines hidden (view full) --- 342 -v Verbose mode. Causes ssh to print debugging messages about its 343 progress. This is helpful in debugging connection, 344 authentication, and configuration problems. Multiple -v options 345 increase the verbosity. The maximum is 3. 346 347 -W host:port 348 Requests that standard input and output on the client be 349 forwarded to host on port over the secure channel. Implies -N, |
350 -T, ExitOnForwardFailure and ClearAllForwardings and works with | 350 -T, ExitOnForwardFailure and ClearAllForwardings. Works with |
351 Protocol version 2 only. 352 353 -w local_tun[:remote_tun] 354 Requests tunnel device forwarding with the specified tun(4) 355 devices between the client (local_tun) and the server 356 (remote_tun). 357 358 The devices may be specified by numerical ID or the keyword --- 471 unchanged lines hidden (view full) --- 830 /etc/ssh/ssh_config 831 Systemwide configuration file. The file format and configuration 832 options are described in ssh_config(5). 833 834 /etc/ssh/ssh_host_key 835 /etc/ssh/ssh_host_dsa_key 836 /etc/ssh/ssh_host_ecdsa_key 837 /etc/ssh/ssh_host_rsa_key | 351 Protocol version 2 only. 352 353 -w local_tun[:remote_tun] 354 Requests tunnel device forwarding with the specified tun(4) 355 devices between the client (local_tun) and the server 356 (remote_tun). 357 358 The devices may be specified by numerical ID or the keyword --- 471 unchanged lines hidden (view full) --- 830 /etc/ssh/ssh_config 831 Systemwide configuration file. The file format and configuration 832 options are described in ssh_config(5). 833 834 /etc/ssh/ssh_host_key 835 /etc/ssh/ssh_host_dsa_key 836 /etc/ssh/ssh_host_ecdsa_key 837 /etc/ssh/ssh_host_rsa_key |
838 These three files contain the private parts of the host keys and 839 are used for host-based authentication. If protocol version 1 is | 838 These files contain the private parts of the host keys and are 839 used for host-based authentication. If protocol version 1 is |
840 used, ssh must be setuid root, since the host key is readable 841 only by root. For protocol version 2, ssh uses ssh-keysign(8) to 842 access the host keys, eliminating the requirement that ssh be 843 setuid root when host-based authentication is used. By default 844 ssh is not setuid root. 845 846 /etc/ssh/ssh_known_hosts 847 Systemwide list of known host keys. This file should be prepared --- 51 unchanged lines hidden (view full) --- 899 900AUTHORS 901 OpenSSH is a derivative of the original and free ssh 1.2.12 release by 902 Tatu Ylonen. Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo 903 de Raadt and Dug Song removed many bugs, re-added newer features and 904 created OpenSSH. Markus Friedl contributed the support for SSH protocol 905 versions 1.5 and 2.0. 906 | 840 used, ssh must be setuid root, since the host key is readable 841 only by root. For protocol version 2, ssh uses ssh-keysign(8) to 842 access the host keys, eliminating the requirement that ssh be 843 setuid root when host-based authentication is used. By default 844 ssh is not setuid root. 845 846 /etc/ssh/ssh_known_hosts 847 Systemwide list of known host keys. This file should be prepared --- 51 unchanged lines hidden (view full) --- 899 900AUTHORS 901 OpenSSH is a derivative of the original and free ssh 1.2.12 release by 902 Tatu Ylonen. Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo 903 de Raadt and Dug Song removed many bugs, re-added newer features and 904 created OpenSSH. Markus Friedl contributed the support for SSH protocol 905 versions 1.5 and 2.0. 906 |
907OpenBSD 5.0 September 11, 2011 OpenBSD 5.0 | 907OpenBSD 5.2 June 18, 2012 OpenBSD 5.2 |