Deleted Added
full compact
sshd.0 (180741) sshd.0 (180744)
1SSHD(8) OpenBSD System Manager's Manual SSHD(8)
2
3NAME
4 sshd - OpenSSH SSH daemon
5
6SYNOPSIS
7 sshd [-46Ddeiqt] [-b bits] [-f config_file] [-g login_grace_time]
8 [-h host_key_file] [-k key_gen_time] [-o option] [-p port] [-u len]
9
10DESCRIPTION
11 sshd (OpenSSH Daemon) is the daemon program for ssh(1). Together these
1SSHD(8) OpenBSD System Manager's Manual SSHD(8)
2
3NAME
4 sshd - OpenSSH SSH daemon
5
6SYNOPSIS
7 sshd [-46Ddeiqt] [-b bits] [-f config_file] [-g login_grace_time]
8 [-h host_key_file] [-k key_gen_time] [-o option] [-p port] [-u len]
9
10DESCRIPTION
11 sshd (OpenSSH Daemon) is the daemon program for ssh(1). Together these
12 programs replace rlogin and rsh, and provide secure encrypted communica-
13 tions between two untrusted hosts over an insecure network.
12 programs replace rlogin(1) and rsh(1), and provide secure encrypted com-
13 munications between two untrusted hosts over an insecure network.
14
15 sshd listens for connections from clients. It is normally started at
16 boot from /etc/rc. It forks a new daemon for each incoming connection.
17 The forked daemons handle key exchange, encryption, authentication, com-
18 mand execution, and data exchange.
19
20 sshd can be configured using command-line options or a configuration file
21 (by default sshd_config(5)); command-line options override values speci-

--- 18 unchanged lines hidden (view full) ---

40 log, and does not put itself in the background. The server also
41 will not fork and will only process one connection. This option
42 is only intended for debugging for the server. Multiple -d op-
43 tions increase the debugging level. Maximum is 3.
44
45 -e When this option is specified, sshd will send the output to the
46 standard error instead of the system log.
47
14
15 sshd listens for connections from clients. It is normally started at
16 boot from /etc/rc. It forks a new daemon for each incoming connection.
17 The forked daemons handle key exchange, encryption, authentication, com-
18 mand execution, and data exchange.
19
20 sshd can be configured using command-line options or a configuration file
21 (by default sshd_config(5)); command-line options override values speci-

--- 18 unchanged lines hidden (view full) ---

40 log, and does not put itself in the background. The server also
41 will not fork and will only process one connection. This option
42 is only intended for debugging for the server. Multiple -d op-
43 tions increase the debugging level. Maximum is 3.
44
45 -e When this option is specified, sshd will send the output to the
46 standard error instead of the system log.
47
48 -f configuration_file
48 -f config_file
49 Specifies the name of the configuration file. The default is
50 /etc/ssh/sshd_config. sshd refuses to start if there is no con-
51 figuration file.
52
53 -g login_grace_time
54 Gives the grace time for clients to authenticate themselves (de-
55 fault 120 seconds). If the client fails to authenticate the user
56 within this many seconds, the server disconnects and exits. A

--- 81 unchanged lines hidden (view full) ---

138 tion algorithm to use from those offered by the server.
139
140 For protocol 2, forward security is provided through a Diffie-Hellman key
141 agreement. This key agreement results in a shared session key. The rest
142 of the session is encrypted using a symmetric cipher, currently 128-bit
143 AES, Blowfish, 3DES, CAST128, Arcfour, 192-bit AES, or 256-bit AES. The
144 client selects the encryption algorithm to use from those offered by the
145 server. Additionally, session integrity is provided through a crypto-
49 Specifies the name of the configuration file. The default is
50 /etc/ssh/sshd_config. sshd refuses to start if there is no con-
51 figuration file.
52
53 -g login_grace_time
54 Gives the grace time for clients to authenticate themselves (de-
55 fault 120 seconds). If the client fails to authenticate the user
56 within this many seconds, the server disconnects and exits. A

--- 81 unchanged lines hidden (view full) ---

138 tion algorithm to use from those offered by the server.
139
140 For protocol 2, forward security is provided through a Diffie-Hellman key
141 agreement. This key agreement results in a shared session key. The rest
142 of the session is encrypted using a symmetric cipher, currently 128-bit
143 AES, Blowfish, 3DES, CAST128, Arcfour, 192-bit AES, or 256-bit AES. The
144 client selects the encryption algorithm to use from those offered by the
145 server. Additionally, session integrity is provided through a crypto-
146 graphic message authentication code (hmac-sha1 or hmac-md5).
146 graphic message authentication code (hmac-md5, hmac-sha1, umac-64 or
147 hmac-ripemd160).
147
148 Finally, the server and the client enter an authentication dialog. The
149 client tries to authenticate itself using host-based authentication, pub-
150 lic key authentication, challenge-response authentication, or password
151 authentication.
152
153 Regardless of the authentication type, the account is checked to ensure
154 that it is accessible. An account is not accessible if it is locked,
155 listed in DenyUsers or its group is listed in DenyGroups . The defini-
156 tion of a locked account is system dependant. Some platforms have their
157 own account database (eg AIX) and some modify the passwd field ( `*LK*'
158 on Solaris and UnixWare, `*' on HP-UX, containing `Nologin' on Tru64, a
148
149 Finally, the server and the client enter an authentication dialog. The
150 client tries to authenticate itself using host-based authentication, pub-
151 lic key authentication, challenge-response authentication, or password
152 authentication.
153
154 Regardless of the authentication type, the account is checked to ensure
155 that it is accessible. An account is not accessible if it is locked,
156 listed in DenyUsers or its group is listed in DenyGroups . The defini-
157 tion of a locked account is system dependant. Some platforms have their
158 own account database (eg AIX) and some modify the passwd field ( `*LK*'
159 on Solaris and UnixWare, `*' on HP-UX, containing `Nologin' on Tru64, a
159 leading `*LOCKED*' on FreeBSD and a leading `!!' on Linux). If there is
160 a requirement to disable password authentication for the account while
161 allowing still public-key, then the passwd field should be set to some-
162 thing other than these values (eg `NP' or `*NP*' ).
160 leading `*LOCKED*' on FreeBSD and a leading `!' on most Linuxes). If
161 there is a requirement to disable password authentication for the account
162 while allowing still public-key, then the passwd field should be set to
163 something other than these values (eg `NP' or `*NP*' ).
163
164 If the client successfully authenticates itself, a dialog for preparing
165 the session is entered. At this time the client may request things like
166 allocating a pseudo-tty, forwarding X11 connections, forwarding TCP con-
167 nections, or forwarding the authentication agent connection over the se-
168 cure channel.
169
170 After this, the client either requests a shell or execution of a command.

--- 301 unchanged lines hidden (view full) ---

472 log in, and non-root connections are refused. The file should be
473 world-readable.
474
475 /etc/shosts.equiv
476 This file is used in exactly the same way as hosts.equiv, but al-
477 lows host-based authentication without permitting login with
478 rlogin/rsh.
479
164
165 If the client successfully authenticates itself, a dialog for preparing
166 the session is entered. At this time the client may request things like
167 allocating a pseudo-tty, forwarding X11 connections, forwarding TCP con-
168 nections, or forwarding the authentication agent connection over the se-
169 cure channel.
170
171 After this, the client either requests a shell or execution of a command.

--- 301 unchanged lines hidden (view full) ---

473 log in, and non-root connections are refused. The file should be
474 world-readable.
475
476 /etc/shosts.equiv
477 This file is used in exactly the same way as hosts.equiv, but al-
478 lows host-based authentication without permitting login with
479 rlogin/rsh.
480
480 /etc/ssh/ssh_known_hosts
481 Systemwide list of known host keys. This file should be prepared
482 by the system administrator to contain the public host keys of
483 all machines in the organization. The format of this file is de-
484 scribed above. This file should be writable only by root/the
485 owner and should be world-readable.
486
487 /etc/ssh/ssh_host_key
488 /etc/ssh/ssh_host_dsa_key
489 /etc/ssh/ssh_host_rsa_key
490 These three files contain the private parts of the host keys.
491 These files should only be owned by root, readable only by root,
492 and not accessible to others. Note that sshd does not start if
493 these files are group/world-accessible.
494
495 /etc/ssh/ssh_host_key.pub
496 /etc/ssh/ssh_host_dsa_key.pub
497 /etc/ssh/ssh_host_rsa_key.pub
498 These three files contain the public parts of the host keys.
499 These files should be world-readable but writable only by root.
500 Their contents should match the respective private parts. These
501 files are not really used for anything; they are provided for the
502 convenience of the user so their contents can be copied to known
503 hosts files. These files are created using ssh-keygen(1).
504
481 /etc/ssh/ssh_host_key
482 /etc/ssh/ssh_host_dsa_key
483 /etc/ssh/ssh_host_rsa_key
484 These three files contain the private parts of the host keys.
485 These files should only be owned by root, readable only by root,
486 and not accessible to others. Note that sshd does not start if
487 these files are group/world-accessible.
488
489 /etc/ssh/ssh_host_key.pub
490 /etc/ssh/ssh_host_dsa_key.pub
491 /etc/ssh/ssh_host_rsa_key.pub
492 These three files contain the public parts of the host keys.
493 These files should be world-readable but writable only by root.
494 Their contents should match the respective private parts. These
495 files are not really used for anything; they are provided for the
496 convenience of the user so their contents can be copied to known
497 hosts files. These files are created using ssh-keygen(1).
498
499 /etc/ssh/ssh_known_hosts
500 Systemwide list of known host keys. This file should be prepared
501 by the system administrator to contain the public host keys of
502 all machines in the organization. The format of this file is de-
503 scribed above. This file should be writable only by root/the
504 owner and should be world-readable.
505
505 /etc/ssh/sshd_config
506 Contains configuration data for sshd. The file format and con-
507 figuration options are described in sshd_config(5).
508
509 /etc/ssh/sshrc
510 Similar to ~/.ssh/rc, it can be used to specify machine-specific
511 login-time initializations globally. This file should be
512 writable only by root, and should be world-readable.

--- 8 unchanged lines hidden (view full) ---

521 Contains the process ID of the sshd listening for connections (if
522 there are several daemons running concurrently for different
523 ports, this contains the process ID of the one started last).
524 The content of this file is not sensitive; it can be world-read-
525 able.
526
527SEE ALSO
528 scp(1), sftp(1), ssh(1), ssh-add(1), ssh-agent(1), ssh-keygen(1),
506 /etc/ssh/sshd_config
507 Contains configuration data for sshd. The file format and con-
508 figuration options are described in sshd_config(5).
509
510 /etc/ssh/sshrc
511 Similar to ~/.ssh/rc, it can be used to specify machine-specific
512 login-time initializations globally. This file should be
513 writable only by root, and should be world-readable.

--- 8 unchanged lines hidden (view full) ---

522 Contains the process ID of the sshd listening for connections (if
523 there are several daemons running concurrently for different
524 ports, this contains the process ID of the one started last).
525 The content of this file is not sensitive; it can be world-read-
526 able.
527
528SEE ALSO
529 scp(1), sftp(1), ssh(1), ssh-add(1), ssh-agent(1), ssh-keygen(1),
529 chroot(2), hosts_access(5), login.conf(5), moduli(5), sshd_config(5),
530 inetd(8), sftp-server(8)
530 ssh-keyscan(1), chroot(2), hosts_access(5), login.conf(5), moduli(5),
531 sshd_config(5), inetd(8), sftp-server(8)
531
532AUTHORS
533 OpenSSH is a derivative of the original and free ssh 1.2.12 release by
534 Tatu Ylonen. Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo
535 de Raadt and Dug Song removed many bugs, re-added newer features and cre-
536 ated OpenSSH. Markus Friedl contributed the support for SSH protocol
537 versions 1.5 and 2.0. Niels Provos and Markus Friedl contributed support
538 for privilege separation.
539
540CAVEATS
541 System security is not improved unless rshd, rlogind, and rexecd are dis-
542 abled (thus completely disabling rlogin and rsh into the machine).
543
532
533AUTHORS
534 OpenSSH is a derivative of the original and free ssh 1.2.12 release by
535 Tatu Ylonen. Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo
536 de Raadt and Dug Song removed many bugs, re-added newer features and cre-
537 ated OpenSSH. Markus Friedl contributed the support for SSH protocol
538 versions 1.5 and 2.0. Niels Provos and Markus Friedl contributed support
539 for privilege separation.
540
541CAVEATS
542 System security is not improved unless rshd, rlogind, and rexecd are dis-
543 abled (thus completely disabling rlogin and rsh into the machine).
544
544OpenBSD 4.1 September 25, 1999 9
545OpenBSD 4.2 August 16, 2007 9