ssh.1 (128460) | ssh.1 (137019) |
---|---|
1.\" -*- nroff -*- 2.\" 3.\" Author: Tatu Ylonen <ylo@cs.hut.fi> 4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 5.\" All rights reserved 6.\" 7.\" As far as I am concerned, the code I have written for this software 8.\" can be used freely for any purpose. Any derived versions of this --- 20 unchanged lines hidden (view full) --- 29.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 30.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 31.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 32.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 33.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 36.\" | 1.\" -*- nroff -*- 2.\" 3.\" Author: Tatu Ylonen <ylo@cs.hut.fi> 4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 5.\" All rights reserved 6.\" 7.\" As far as I am concerned, the code I have written for this software 8.\" can be used freely for any purpose. Any derived versions of this --- 20 unchanged lines hidden (view full) --- 29.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 30.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 31.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 32.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 33.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 36.\" |
37.\" $FreeBSD: head/crypto/openssh/ssh.1 128460 2004-04-20 09:46:41Z des $ 38.\" $OpenBSD: ssh.1,v 1.181 2003/12/16 15:49:51 markus Exp $ | 37.\" $OpenBSD: ssh.1,v 1.194 2004/08/12 21:41:13 jakob Exp $ 38.\" $FreeBSD: head/crypto/openssh/ssh.1 137019 2004-10-28 16:11:31Z des $ |
39.Dd September 25, 1999 40.Dt SSH 1 41.Os 42.Sh NAME 43.Nm ssh 44.Nd OpenSSH SSH client (remote login program) 45.Sh SYNOPSIS 46.Nm ssh | 39.Dd September 25, 1999 40.Dt SSH 1 41.Os 42.Sh NAME 43.Nm ssh 44.Nd OpenSSH SSH client (remote login program) 45.Sh SYNOPSIS 46.Nm ssh |
47.Op Fl 1246AaCfgkNnqsTtVvXxY | 47.Op Fl 1246AaCfgkMNnqsTtVvXxY |
48.Op Fl b Ar bind_address 49.Op Fl c Ar cipher_spec | 48.Op Fl b Ar bind_address 49.Op Fl c Ar cipher_spec |
50.Bk -words |
|
50.Op Fl D Ar port 51.Op Fl e Ar escape_char 52.Op Fl F Ar configfile 53.Op Fl i Ar identity_file | 51.Op Fl D Ar port 52.Op Fl e Ar escape_char 53.Op Fl F Ar configfile 54.Op Fl i Ar identity_file |
54.Bk -words | |
55.Oo Fl L Xo 56.Sm off 57.Ar port : 58.Ar host : 59.Ar hostport 60.Sm on 61.Xc 62.Oc --- 7 unchanged lines hidden (view full) --- 70.Oo Fl R Xo 71.Sm off 72.Ar port : 73.Ar host : 74.Ar hostport 75.Sm on 76.Xc 77.Oc | 55.Oo Fl L Xo 56.Sm off 57.Ar port : 58.Ar host : 59.Ar hostport 60.Sm on 61.Xc 62.Oc --- 7 unchanged lines hidden (view full) --- 70.Oo Fl R Xo 71.Sm off 72.Ar port : 73.Ar host : 74.Ar hostport 75.Sm on 76.Xc 77.Oc |
78.Op Fl S Ar ctl |
|
78.Oo Ar user Ns @ Oc Ns Ar hostname 79.Op Ar command 80.Sh DESCRIPTION 81.Nm 82(SSH client) is a program for logging into a remote machine and for 83executing commands on a remote machine. 84It is intended to replace rlogin and rsh, 85and provide secure encrypted communications between --- 151 unchanged lines hidden (view full) --- 237If public key authentication fails or is not available, a password 238can be sent encrypted to the remote host to prove the user's identity. 239.Pp 240Additionally, 241.Nm 242supports hostbased or challenge response authentication. 243.Pp 244Protocol 2 provides additional mechanisms for confidentiality | 79.Oo Ar user Ns @ Oc Ns Ar hostname 80.Op Ar command 81.Sh DESCRIPTION 82.Nm 83(SSH client) is a program for logging into a remote machine and for 84executing commands on a remote machine. 85It is intended to replace rlogin and rsh, 86and provide secure encrypted communications between --- 151 unchanged lines hidden (view full) --- 238If public key authentication fails or is not available, a password 239can be sent encrypted to the remote host to prove the user's identity. 240.Pp 241Additionally, 242.Nm 243supports hostbased or challenge response authentication. 244.Pp 245Protocol 2 provides additional mechanisms for confidentiality |
245(the traffic is encrypted using 3DES, Blowfish, CAST128 or Arcfour) 246and integrity (hmac-md5, hmac-sha1). | 246(the traffic is encrypted using AES, 3DES, Blowfish, CAST128 or Arcfour) 247and integrity (hmac-md5, hmac-sha1, hmac-ripemd160). |
247Note that protocol 1 lacks a strong mechanism for ensuring the 248integrity of the connection. 249.Ss Login session and remote execution 250When the user's identity has been accepted by the server, the server 251either executes the given command, or logs into the machine and gives 252the user a normal shell on the remote machine. 253All communication with 254the remote command or shell will be automatically encrypted. --- 43 unchanged lines hidden (view full) --- 298.Nm 299at logout when waiting for forwarded connection / X11 sessions to terminate. 300.It Cm ~? 301Display a list of escape characters. 302.It Cm ~B 303Send a BREAK to the remote system 304(only useful for SSH protocol version 2 and if the peer supports it). 305.It Cm ~C | 248Note that protocol 1 lacks a strong mechanism for ensuring the 249integrity of the connection. 250.Ss Login session and remote execution 251When the user's identity has been accepted by the server, the server 252either executes the given command, or logs into the machine and gives 253the user a normal shell on the remote machine. 254All communication with 255the remote command or shell will be automatically encrypted. --- 43 unchanged lines hidden (view full) --- 299.Nm 300at logout when waiting for forwarded connection / X11 sessions to terminate. 301.It Cm ~? 302Display a list of escape characters. 303.It Cm ~B 304Send a BREAK to the remote system 305(only useful for SSH protocol version 2 and if the peer supports it). 306.It Cm ~C |
306Open command line (only useful for adding port forwardings using the | 307Open command line. 308Currently this allows the addition of port forwardings using the |
307.Fl L 308and 309.Fl R | 309.Fl L 310and 311.Fl R |
310options). | 312options (see below). 313It also allows the cancellation of existing remote port-forwardings 314using 315.Fl KR Ar hostport . 316Basic help is available, using the 317.Fl h 318option. |
311.It Cm ~R 312Request rekeying of the connection 313(only useful for SSH protocol version 2 and if the peer supports it). 314.El 315.Ss X11 and TCP forwarding 316If the 317.Cm ForwardX11 318variable is set to --- 70 unchanged lines hidden (view full) --- 389trojan horse from getting the user's password. 390Another purpose of this mechanism is to prevent man-in-the-middle attacks 391which could otherwise be used to circumvent the encryption. 392The 393.Cm StrictHostKeyChecking 394option can be used to prevent logins to machines whose 395host key is not known or has changed. 396.Pp | 319.It Cm ~R 320Request rekeying of the connection 321(only useful for SSH protocol version 2 and if the peer supports it). 322.El 323.Ss X11 and TCP forwarding 324If the 325.Cm ForwardX11 326variable is set to --- 70 unchanged lines hidden (view full) --- 397trojan horse from getting the user's password. 398Another purpose of this mechanism is to prevent man-in-the-middle attacks 399which could otherwise be used to circumvent the encryption. 400The 401.Cm StrictHostKeyChecking 402option can be used to prevent logins to machines whose 403host key is not known or has changed. 404.Pp |
405.Nm 406can be configured to verify host identification using fingerprint resource 407records (SSHFP) published in DNS. 408The 409.Cm VerifyHostKeyDNS 410option can be used to control how DNS lookups are performed. 411SSHFP resource records can be generated using 412.Xr ssh-keygen 1 . 413.Pp |
|
397The options are as follows: 398.Bl -tag -width Ds 399.It Fl 1 400Forces 401.Nm 402to try protocol version 1 only. 403.It Fl 2 404Forces --- 34 unchanged lines hidden (view full) --- 439.Cm CompressionLevel 440option for protocol version 1. 441Compression is desirable on modem lines and other 442slow connections, but will only slow down things on fast networks. 443The default value can be set on a host-by-host basis in the 444configuration files; see the 445.Cm Compression 446option. | 414The options are as follows: 415.Bl -tag -width Ds 416.It Fl 1 417Forces 418.Nm 419to try protocol version 1 only. 420.It Fl 2 421Forces --- 34 unchanged lines hidden (view full) --- 456.Cm CompressionLevel 457option for protocol version 1. 458Compression is desirable on modem lines and other 459slow connections, but will only slow down things on fast networks. 460The default value can be set on a host-by-host basis in the 461configuration files; see the 462.Cm Compression 463option. |
447.It Fl c Ar blowfish | 3des | des 448Selects the cipher to use for encrypting the session. | 464.It Fl c Ar cipher_spec 465Selects the cipher specification for encrypting the session. 466.Pp 467Protocol version 1 allows specification of a single cipher. 468The suported values are 469.Dq 3des , 470.Dq blowfish 471and 472.Dq des . |
449.Ar 3des | 473.Ar 3des |
450is used by default. 451It is believed to be secure. 452.Ar 3des | |
453(triple-des) is an encrypt-decrypt-encrypt triple with three different keys. | 474(triple-des) is an encrypt-decrypt-encrypt triple with three different keys. |
475It is believed to be secure. |
|
454.Ar blowfish 455is a fast block cipher; it appears very secure and is much faster than 456.Ar 3des . 457.Ar des 458is only supported in the 459.Nm 460client for interoperability with legacy protocol 1 implementations 461that do not support the 462.Ar 3des 463cipher. 464Its use is strongly discouraged due to cryptographic weaknesses. | 476.Ar blowfish 477is a fast block cipher; it appears very secure and is much faster than 478.Ar 3des . 479.Ar des 480is only supported in the 481.Nm 482client for interoperability with legacy protocol 1 implementations 483that do not support the 484.Ar 3des 485cipher. 486Its use is strongly discouraged due to cryptographic weaknesses. |
465.It Fl c Ar cipher_spec 466Additionally, for protocol version 2 a comma-separated list of ciphers can 467be specified in order of preference. 468See 469.Cm Ciphers 470for more information. | 487The default is 488.Dq 3des . 489.Pp 490For protocol version 2 491.Ar cipher_spec 492is a comma-separated list of ciphers 493listed in order of preference. 494The supported ciphers are 495.Dq 3des-cbc , 496.Dq aes128-cbc , 497.Dq aes192-cbc , 498.Dq aes256-cbc , 499.Dq aes128-ctr , 500.Dq aes192-ctr , 501.Dq aes256-ctr , 502.Dq arcfour , 503.Dq blowfish-cbc , 504and 505.Dq cast128-cbc . 506The default is 507.Bd -literal 508 ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour, 509 aes192-cbc,aes256-cbc'' 510.Ed |
471.It Fl D Ar port 472Specifies a local 473.Dq dynamic 474application-level port forwarding. 475This works by allocating a socket to listen to 476.Ar port 477on the local side, and whenever a connection is made to this port, the 478connection is forwarded over the secure channel, and the application --- 86 unchanged lines hidden (view full) --- 565.Xo 566.Ar port No / Ar host No / 567.Ar hostport . 568.Xc 569.Sm on 570.It Fl l Ar login_name 571Specifies the user to log in as on the remote machine. 572This also may be specified on a per-host basis in the configuration file. | 511.It Fl D Ar port 512Specifies a local 513.Dq dynamic 514application-level port forwarding. 515This works by allocating a socket to listen to 516.Ar port 517on the local side, and whenever a connection is made to this port, the 518connection is forwarded over the secure channel, and the application --- 86 unchanged lines hidden (view full) --- 605.Xo 606.Ar port No / Ar host No / 607.Ar hostport . 608.Xc 609.Sm on 610.It Fl l Ar login_name 611Specifies the user to log in as on the remote machine. 612This also may be specified on a per-host basis in the configuration file. |
613.It Fl M 614Places the 615.Nm 616client into 617.Dq master 618mode for connection sharing. 619Refer to the description of 620.Cm ControlMaster 621in 622.Xr ssh_config 5 623for details. |
|
573.It Fl m Ar mac_spec 574Additionally, for protocol version 2 a comma-separated list of MAC 575(message authentication code) algorithms can 576be specified in order of preference. 577See the 578.Cm MACs 579keyword for more information. 580.It Fl N --- 34 unchanged lines hidden (view full) --- 615.It ChallengeResponseAuthentication 616.It CheckHostIP 617.It Cipher 618.It Ciphers 619.It ClearAllForwardings 620.It Compression 621.It CompressionLevel 622.It ConnectionAttempts | 624.It Fl m Ar mac_spec 625Additionally, for protocol version 2 a comma-separated list of MAC 626(message authentication code) algorithms can 627be specified in order of preference. 628See the 629.Cm MACs 630keyword for more information. 631.It Fl N --- 34 unchanged lines hidden (view full) --- 666.It ChallengeResponseAuthentication 667.It CheckHostIP 668.It Cipher 669.It Ciphers 670.It ClearAllForwardings 671.It Compression 672.It CompressionLevel 673.It ConnectionAttempts |
623.It ConnectionTimeout | 674.It ConnectTimeout 675.It ControlMaster 676.It ControlPath |
624.It DynamicForward 625.It EscapeChar 626.It ForwardAgent 627.It ForwardX11 628.It ForwardX11Trusted 629.It GatewayPorts 630.It GlobalKnownHostsFile 631.It GSSAPIAuthentication --- 14 unchanged lines hidden (view full) --- 646.It Port 647.It PreferredAuthentications 648.It Protocol 649.It ProxyCommand 650.It PubkeyAuthentication 651.It RemoteForward 652.It RhostsRSAAuthentication 653.It RSAAuthentication | 677.It DynamicForward 678.It EscapeChar 679.It ForwardAgent 680.It ForwardX11 681.It ForwardX11Trusted 682.It GatewayPorts 683.It GlobalKnownHostsFile 684.It GSSAPIAuthentication --- 14 unchanged lines hidden (view full) --- 699.It Port 700.It PreferredAuthentications 701.It Protocol 702.It ProxyCommand 703.It PubkeyAuthentication 704.It RemoteForward 705.It RhostsRSAAuthentication 706.It RSAAuthentication |
707.It SendEnv |
|
654.It ServerAliveInterval 655.It ServerAliveCountMax 656.It SmartcardDevice 657.It StrictHostKeyChecking 658.It TCPKeepAlive 659.It UsePrivilegedPort 660.It User 661.It UserKnownHostsFile --- 28 unchanged lines hidden (view full) --- 690logging in as root on the remote machine. 691IPv6 addresses can be specified with an alternative syntax: 692.Sm off 693.Xo 694.Ar port No / Ar host No / 695.Ar hostport . 696.Xc 697.Sm on | 708.It ServerAliveInterval 709.It ServerAliveCountMax 710.It SmartcardDevice 711.It StrictHostKeyChecking 712.It TCPKeepAlive 713.It UsePrivilegedPort 714.It User 715.It UserKnownHostsFile --- 28 unchanged lines hidden (view full) --- 744logging in as root on the remote machine. 745IPv6 addresses can be specified with an alternative syntax: 746.Sm off 747.Xo 748.Ar port No / Ar host No / 749.Ar hostport . 750.Xc 751.Sm on |
752.It Fl S Ar ctl 753Specifies the location of a control socket for connection sharing. 754Refer to the description of 755.Cm ControlPath 756and 757.Cm ControlMaster 758in 759.Xr ssh_config 5 760for details. |
|
698.It Fl s 699May be used to request invocation of a subsystem on the remote system. 700Subsystems are a feature of the SSH2 protocol which facilitate the use 701of SSH as a secure transport for other applications (eg.\& 702.Xr sftp 1 ) . 703The subsystem is specified as the remote command. 704.It Fl T 705Disable pseudo-tty allocation. --- 176 unchanged lines hidden (view full) --- 882sensitive and can (but need not) be readable by anyone. 883These files are 884never used automatically and are not necessary; they are only provided for 885the convenience of the user. 886.It Pa $HOME/.ssh/config 887This is the per-user configuration file. 888The file format and configuration options are described in 889.Xr ssh_config 5 . | 761.It Fl s 762May be used to request invocation of a subsystem on the remote system. 763Subsystems are a feature of the SSH2 protocol which facilitate the use 764of SSH as a secure transport for other applications (eg.\& 765.Xr sftp 1 ) . 766The subsystem is specified as the remote command. 767.It Fl T 768Disable pseudo-tty allocation. --- 176 unchanged lines hidden (view full) --- 945sensitive and can (but need not) be readable by anyone. 946These files are 947never used automatically and are not necessary; they are only provided for 948the convenience of the user. 949.It Pa $HOME/.ssh/config 950This is the per-user configuration file. 951The file format and configuration options are described in 952.Xr ssh_config 5 . |
953Because of the potential for abuse, this file must have strict permissions: 954read/write for the user, and not accessible by others. |
|
890.It Pa $HOME/.ssh/authorized_keys 891Lists the public keys (RSA/DSA) that can be used for logging in as this user. 892The format of this file is described in the 893.Xr sshd 8 894manual page. 895In the simplest form the format is the same as the 896.Pa .pub 897identity files. --- 174 unchanged lines hidden --- | 955.It Pa $HOME/.ssh/authorized_keys 956Lists the public keys (RSA/DSA) that can be used for logging in as this user. 957The format of this file is described in the 958.Xr sshd 8 959manual page. 960In the simplest form the format is the same as the 961.Pa .pub 962identity files. --- 174 unchanged lines hidden --- |