ssh_config.0 (180741) | ssh_config.0 (180744) |
---|---|
1SSH_CONFIG(5) OpenBSD Programmer's Manual SSH_CONFIG(5) 2 3NAME 4 ssh_config - OpenSSH SSH client configuration files 5 6SYNOPSIS 7 ~/.ssh/config 8 /etc/ssh/ssh_config --- 186 unchanged lines hidden (view full) --- 195 Sets the escape character (default: `~'). The escape character 196 can also be set on the command line. The argument should be a 197 single character, `^' followed by a letter, or ``none'' to dis- 198 able the escape character entirely (making the connection trans- 199 parent for binary data). 200 201 ExitOnForwardFailure 202 Specifies whether ssh(1) should terminate the connection if it | 1SSH_CONFIG(5) OpenBSD Programmer's Manual SSH_CONFIG(5) 2 3NAME 4 ssh_config - OpenSSH SSH client configuration files 5 6SYNOPSIS 7 ~/.ssh/config 8 /etc/ssh/ssh_config --- 186 unchanged lines hidden (view full) --- 195 Sets the escape character (default: `~'). The escape character 196 can also be set on the command line. The argument should be a 197 single character, `^' followed by a letter, or ``none'' to dis- 198 able the escape character entirely (making the connection trans- 199 parent for binary data). 200 201 ExitOnForwardFailure 202 Specifies whether ssh(1) should terminate the connection if it |
203 cannot set up all requested dynamic, local, and remote port for- 204 wardings. The argument must be ``yes'' or ``no''. The default 205 is ``no''. | 203 cannot set up all requested dynamic, tunnel, local, and remote 204 port forwardings. The argument must be ``yes'' or ``no''. The 205 default is ``no''. |
206 207 ForwardAgent 208 Specifies whether the connection to the authentication agent (if 209 any) will be forwarded to the remote machine. The argument must 210 be ``yes'' or ``no''. The default is ``no''. 211 212 Agent forwarding should be enabled with caution. Users with the 213 ability to bypass file permissions on the remote host (for the --- 146 unchanged lines hidden (view full) --- 360 ssh(1). The possible values are: QUIET, FATAL, ERROR, INFO, VER- 361 BOSE, DEBUG, DEBUG1, DEBUG2, and DEBUG3. The default is INFO. 362 DEBUG and DEBUG1 are equivalent. DEBUG2 and DEBUG3 each specify 363 higher levels of verbose output. 364 365 MACs Specifies the MAC (message authentication code) algorithms in or- 366 der of preference. The MAC algorithm is used in protocol version 367 2 for data integrity protection. Multiple algorithms must be | 206 207 ForwardAgent 208 Specifies whether the connection to the authentication agent (if 209 any) will be forwarded to the remote machine. The argument must 210 be ``yes'' or ``no''. The default is ``no''. 211 212 Agent forwarding should be enabled with caution. Users with the 213 ability to bypass file permissions on the remote host (for the --- 146 unchanged lines hidden (view full) --- 360 ssh(1). The possible values are: QUIET, FATAL, ERROR, INFO, VER- 361 BOSE, DEBUG, DEBUG1, DEBUG2, and DEBUG3. The default is INFO. 362 DEBUG and DEBUG1 are equivalent. DEBUG2 and DEBUG3 each specify 363 higher levels of verbose output. 364 365 MACs Specifies the MAC (message authentication code) algorithms in or- 366 der of preference. The MAC algorithm is used in protocol version 367 2 for data integrity protection. Multiple algorithms must be |
368 comma-separated. The default is: ``hmac-md5,hmac-sha1,hmac- 369 ripemd160,hmac-sha1-96,hmac-md5-96''. | 368 comma-separated. The default is: |
370 | 369 |
370 hmac-md5,hmac-sha1,umac-64@openssh.com, 371 hmac-ripemd160,hmac-sha1-96,hmac-md5-96 372 |
|
371 NoHostAuthenticationForLocalhost 372 This option can be used if the home directory is shared across 373 machines. In this case localhost will refer to a different ma- 374 chine on each of the machines and the user will get many warnings 375 about changed host keys. However, this option disables host au- 376 thentication for localhost. The argument to this keyword must be 377 ``yes'' or ``no''. The default is to check the host key for lo- 378 calhost. --- 258 unchanged lines hidden (view full) --- 637 638AUTHORS 639 OpenSSH is a derivative of the original and free ssh 1.2.12 release by 640 Tatu Ylonen. Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo 641 de Raadt and Dug Song removed many bugs, re-added newer features and cre- 642 ated OpenSSH. Markus Friedl contributed the support for SSH protocol 643 versions 1.5 and 2.0. 644 | 373 NoHostAuthenticationForLocalhost 374 This option can be used if the home directory is shared across 375 machines. In this case localhost will refer to a different ma- 376 chine on each of the machines and the user will get many warnings 377 about changed host keys. However, this option disables host au- 378 thentication for localhost. The argument to this keyword must be 379 ``yes'' or ``no''. The default is to check the host key for lo- 380 calhost. --- 258 unchanged lines hidden (view full) --- 639 640AUTHORS 641 OpenSSH is a derivative of the original and free ssh 1.2.12 release by 642 Tatu Ylonen. Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo 643 de Raadt and Dug Song removed many bugs, re-added newer features and cre- 644 ated OpenSSH. Markus Friedl contributed the support for SSH protocol 645 versions 1.5 and 2.0. 646 |
645OpenBSD 4.1 September 25, 1999 10 | 647OpenBSD 4.2 August 15, 2007 10 |