Deleted Added
full compact
1.\" -*- nroff -*-
2.\"
3.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5.\" All rights reserved
6.\"
7.\" As far as I am concerned, the code I have written for this software
8.\" can be used freely for any purpose. Any derived versions of this

--- 20 unchanged lines hidden (view full) ---

29.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
30.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
31.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
32.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
33.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\"
37.\" $OpenBSD: ssh_config.5,v 1.5 2002/08/29 22:54:10 stevesk Exp $
38.\" $FreeBSD: head/crypto/openssh/ssh_config.5 110692 2003-02-11 12:11:15Z des $
37.\" $OpenBSD: ssh_config.5,v 1.7 2003/03/28 10:11:43 jmc Exp $
38.\" $FreeBSD: head/crypto/openssh/ssh_config.5 113911 2003-04-23 17:13:13Z des $
39.Dd September 25, 1999
40.Dt SSH_CONFIG 5
41.Os
42.Sh NAME
43.Nm ssh_config
44.Nd OpenSSH SSH client configuration files
45.Sh SYNOPSIS
46.Bl -tag -width Ds -compact

--- 125 unchanged lines hidden (view full) ---

172.Dq des
173are supported.
174.Ar des
175is only supported in the
176.Nm ssh
177client for interoperability with legacy protocol 1 implementations
178that do not support the
179.Ar 3des
180cipher. Its use is strongly discouraged due to cryptographic
181weaknesses.
180cipher.
181Its use is strongly discouraged due to cryptographic weaknesses.
182The default is
183.Dq 3des .
184.It Cm Ciphers
185Specifies the ciphers allowed for protocol version 2
186in order of preference.
187Multiple ciphers must be comma-separated.
188The default is
189.Pp
190.Bd -literal
191 ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,
192 aes192-cbc,aes256-cbc''
193.Ed
194.It Cm ClearAllForwardings
195Specifies that all local, remote and dynamic port forwardings
196specified in the configuration files or on the command line be
197cleared. This option is primarily useful when used from the
197cleared.
198This option is primarily useful when used from the
199.Nm ssh
200command line to clear port forwardings set in
201configuration files, and is automatically set by
202.Xr scp 1
203and
204.Xr sftp 1 .
205The argument must be
206.Dq yes

--- 20 unchanged lines hidden (view full) ---

227Specifies the number of tries (one per second) to make before exiting.
228The argument must be an integer.
229This may be useful in scripts if the connection sometimes fails.
230The default is 1.
231.It Cm DynamicForward
232Specifies that a TCP/IP port on the local machine be forwarded
233over the secure channel, and the application
234protocol is then used to determine where to connect to from the
234remote machine. The argument must be a port number.
235remote machine.
236The argument must be a port number.
237Currently the SOCKS4 protocol is supported, and
238.Nm ssh
239will act as a SOCKS4 server.
240Multiple forwardings may be specified, and
239additional forwardings can be given on the command line. Only
240the superuser can forward privileged ports.
241additional forwardings can be given on the command line.
242Only the superuser can forward privileged ports.
243.It Cm EscapeChar
244Sets the escape character (default:
245.Ql ~ ) .
246The escape character can also
247be set on the command line.
248The argument should be a single character,
249.Ql ^
250followed by a letter, or

--- 6 unchanged lines hidden (view full) ---

257will be forwarded to the remote machine.
258The argument must be
259.Dq yes
260or
261.Dq no .
262The default is
263.Dq no .
264.Pp
263Agent forwarding should be enabled with caution. Users with the
264ability to bypass file permissions on the remote host (for the agent's
265Unix-domain socket) can access the local agent through the forwarded
266connection. An attacker cannot obtain key material from the agent,
265Agent forwarding should be enabled with caution.
266Users with the ability to bypass file permissions on the remote host
267(for the agent's Unix-domain socket)
268can access the local agent through the forwarded connection.
269An attacker cannot obtain key material from the agent,
270however they can perform operations on the keys that enable them to
271authenticate using the identities loaded into the agent.
272.It Cm ForwardX11
273Specifies whether X11 connections will be automatically redirected
274over the secure channel and
275.Ev DISPLAY
276set.
277The argument must be
278.Dq yes
279or
280.Dq no .
281The default is
282.Dq no .
283.Pp
281X11 forwarding should be enabled with caution. Users with the ability
282to bypass file permissions on the remote host (for the user's X
283authorization database) can access the local X11 display through the
284forwarded connection. An attacker may then be able to perform
285activities such as keystroke monitoring.
284X11 forwarding should be enabled with caution.
285Users with the ability to bypass file permissions on the remote host
286(for the user's X authorization database)
287can access the local X11 display through the forwarded connection.
288An attacker may then be able to perform activities such as keystroke monitoring.
289.It Cm GatewayPorts
290Specifies whether remote hosts are allowed to connect to local
291forwarded ports.
292By default,
293.Nm ssh
291binds local port forwardings to the loopback address. This
292prevents other remote hosts from connecting to forwarded ports.
294binds local port forwardings to the loopback address.
295This prevents other remote hosts from connecting to forwarded ports.
296.Cm GatewayPorts
297can be used to specify that
298.Nm ssh
299should bind local port forwardings to the wildcard address,
300thus allowing remote hosts to connect to forwarded ports.
301The argument must be
302.Dq yes
303or

--- 90 unchanged lines hidden (view full) ---

394Multiple forwardings may be specified, and additional
395forwardings can be given on the command line.
396Only the superuser can forward privileged ports.
397.It Cm LogLevel
398Gives the verbosity level that is used when logging messages from
399.Nm ssh .
400The possible values are:
401QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3.
399The default is INFO. DEBUG and DEBUG1 are equivalent. DEBUG2
400and DEBUG3 each specify higher levels of verbose output.
402The default is INFO.
403DEBUG and DEBUG1 are equivalent.
404DEBUG2 and DEBUG3 each specify higher levels of verbose output.
405.It Cm MACs
406Specifies the MAC (message authentication code) algorithms
407in order of preference.
408The MAC algorithm is used in protocol version 2
409for data integrity protection.
410Multiple algorithms must be comma-separated.
411The default is
412.Dq hmac-md5,hmac-sha1,hmac-ripemd160,hmac-sha1-96,hmac-md5-96 .

--- 61 unchanged lines hidden (view full) ---

474It should eventually connect an
475.Xr sshd 8
476server running on some machine, or execute
477.Ic sshd -i
478somewhere.
479Host key management will be done using the
480HostName of the host being connected (defaulting to the name typed by
481the user).
482Setting the command to
483.Dq none
484disables this option entirely.
485Note that
486.Cm CheckHostIP
487is not available for connects with a proxy command.
488.Pp
489.It Cm PubkeyAuthentication
490Specifies whether to try public key authentication.
491The argument to this keyword must be
492.Dq yes

--- 125 unchanged lines hidden (view full) ---

618.It Cm UserKnownHostsFile
619Specifies a file to use for the user
620host key database instead of
621.Pa $HOME/.ssh/known_hosts .
622.It Cm VersionAddendum
623Specifies a string to append to the regular version string to identify
624OS- or site-specific modifications.
625The default is
619.Dq FreeBSD-20030201 .
626.Dq FreeBSD-20030423 .
627.It Cm XAuthLocation
628Specifies the full pathname of the
629.Xr xauth 1
630program.
631The default is
632.Pa /usr/X11R6/bin/xauth .
633.El
634.Sh FILES

--- 28 unchanged lines hidden ---