Deleted Added
full compact
ssh_config.0 (239844) ssh_config.0 (239849)
1SSH_CONFIG(5) OpenBSD Programmer's Manual SSH_CONFIG(5)
2
3NAME
4 ssh_config - OpenSSH SSH client configuration files
5
6SYNOPSIS
7 ~/.ssh/config
8 /etc/ssh/ssh_config

--- 347 unchanged lines hidden (view full) ---

356 Specifies that ssh(1) should only use the authentication identity
357 files configured in the ssh_config files, even if ssh-agent(1)
358 offers more identities. The argument to this keyword must be
359 ``yes'' or ``no''. This option is intended for situations where
360 ssh-agent offers many different identities. The default is
361 ``no''.
362
363 IdentityFile
1SSH_CONFIG(5) OpenBSD Programmer's Manual SSH_CONFIG(5)
2
3NAME
4 ssh_config - OpenSSH SSH client configuration files
5
6SYNOPSIS
7 ~/.ssh/config
8 /etc/ssh/ssh_config

--- 347 unchanged lines hidden (view full) ---

356 Specifies that ssh(1) should only use the authentication identity
357 files configured in the ssh_config files, even if ssh-agent(1)
358 offers more identities. The argument to this keyword must be
359 ``yes'' or ``no''. This option is intended for situations where
360 ssh-agent offers many different identities. The default is
361 ``no''.
362
363 IdentityFile
364 Specifies a file from which the user's DSA, ECDSA or DSA
364 Specifies a file from which the user's DSA, ECDSA or RSA
365 authentication identity is read. The default is ~/.ssh/identity
366 for protocol version 1, and ~/.ssh/id_dsa, ~/.ssh/id_ecdsa and
367 ~/.ssh/id_rsa for protocol version 2. Additionally, any
368 identities represented by the authentication agent will be used
369 for authentication. ssh(1) will try to load certificate
370 information from the filename obtained by appending -cert.pub to
371 the path of a specified IdentityFile.
372

--- 85 unchanged lines hidden (view full) ---

458 higher levels of verbose output.
459
460 MACs Specifies the MAC (message authentication code) algorithms in
461 order of preference. The MAC algorithm is used in protocol
462 version 2 for data integrity protection. Multiple algorithms
463 must be comma-separated. The default is:
464
465 hmac-md5,hmac-sha1,umac-64@openssh.com,
365 authentication identity is read. The default is ~/.ssh/identity
366 for protocol version 1, and ~/.ssh/id_dsa, ~/.ssh/id_ecdsa and
367 ~/.ssh/id_rsa for protocol version 2. Additionally, any
368 identities represented by the authentication agent will be used
369 for authentication. ssh(1) will try to load certificate
370 information from the filename obtained by appending -cert.pub to
371 the path of a specified IdentityFile.
372

--- 85 unchanged lines hidden (view full) ---

458 higher levels of verbose output.
459
460 MACs Specifies the MAC (message authentication code) algorithms in
461 order of preference. The MAC algorithm is used in protocol
462 version 2 for data integrity protection. Multiple algorithms
463 must be comma-separated. The default is:
464
465 hmac-md5,hmac-sha1,umac-64@openssh.com,
466 hmac-ripemd160,hmac-sha1-96,hmac-md5-96,
467 hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,
468 hmac-sha2-512-96
466 hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,
467 hmac-sha1-96,hmac-md5-96
469
470 NoHostAuthenticationForLocalhost
471 This option can be used if the home directory is shared across
472 machines. In this case localhost will refer to a different
473 machine on each of the machines and the user will get many
474 warnings about changed host keys. However, this option disables
475 host authentication for localhost. The argument to this keyword
476 must be ``yes'' or ``no''. The default is to check the host key

--- 282 unchanged lines hidden (view full) ---

759
760AUTHORS
761 OpenSSH is a derivative of the original and free ssh 1.2.12 release by
762 Tatu Ylonen. Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo
763 de Raadt and Dug Song removed many bugs, re-added newer features and
764 created OpenSSH. Markus Friedl contributed the support for SSH protocol
765 versions 1.5 and 2.0.
766
468
469 NoHostAuthenticationForLocalhost
470 This option can be used if the home directory is shared across
471 machines. In this case localhost will refer to a different
472 machine on each of the machines and the user will get many
473 warnings about changed host keys. However, this option disables
474 host authentication for localhost. The argument to this keyword
475 must be ``yes'' or ``no''. The default is to check the host key

--- 282 unchanged lines hidden (view full) ---

758
759AUTHORS
760 OpenSSH is a derivative of the original and free ssh 1.2.12 release by
761 Tatu Ylonen. Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo
762 de Raadt and Dug Song removed many bugs, re-added newer features and
763 created OpenSSH. Markus Friedl contributed the support for SSH protocol
764 versions 1.5 and 2.0.
765
767OpenBSD 5.0 September 9, 2011 OpenBSD 5.0
766OpenBSD 5.2 June 29, 2012 OpenBSD 5.2