|
Lines 186-192
Link Here
|
| 186 |
.Sh CONFIGURATION FILE |
186 |
.Sh CONFIGURATION FILE |
| 187 |
.Nm |
187 |
.Nm |
| 188 |
reads configuration data from |
188 |
reads configuration data from |
| 189 |
.Pa /etc/sshd_config |
189 |
.Pa /etc/ssh/sshd_config |
| 190 |
(or the file specified with |
190 |
(or the file specified with |
| 191 |
.Fl f |
191 |
.Fl f |
| 192 |
on the command line). The file |
192 |
on the command line). The file |
|
Lines 197-203
Link Here
|
| 197 |
The following keywords are possible. |
197 |
The following keywords are possible. |
| 198 |
.Bl -tag -width Ds |
198 |
.Bl -tag -width Ds |
| 199 |
.It Cm AFSTokenPassing |
199 |
.It Cm AFSTokenPassing |
| 200 |
Specifies whether an AFS token may be forwarded to the server. Default is |
200 |
Specifies whether an AFS token may be forwarded to the server. Default is |
| 201 |
.Dq yes . |
201 |
.Dq yes . |
| 202 |
.It Cm AllowGroups |
202 |
.It Cm AllowGroups |
| 203 |
This keyword can be followed by a number of group names, separated |
203 |
This keyword can be followed by a number of group names, separated |
|
Lines 323-340
Link Here
|
| 323 |
.Dq no |
323 |
.Dq no |
| 324 |
in both the server and the client configuration files. |
324 |
in both the server and the client configuration files. |
| 325 |
.It Cm KerberosAuthentication |
325 |
.It Cm KerberosAuthentication |
| 326 |
Specifies whether Kerberos authentication is allowed. This can |
326 |
Specifies whether Kerberos authentication is allowed. This can |
| 327 |
be in the form of a Kerberos ticket, or if |
327 |
be in the form of a Kerberos ticket, or if |
| 328 |
.Cm PasswordAuthentication |
328 |
.Cm PasswordAuthentication |
| 329 |
is yes, the password provided by the user will be validated through |
329 |
is yes, the password provided by the user will be validated through |
| 330 |
the Kerberos KDC. Default is |
330 |
the Kerberos KDC. Default is |
| 331 |
.Dq yes . |
331 |
.Dq yes . |
| 332 |
.It Cm KerberosOrLocalPasswd |
332 |
.It Cm KerberosOrLocalPasswd |
| 333 |
If set then if password authentication through Kerberos fails then |
333 |
If set then if password authentication through Kerberos fails then |
| 334 |
the password will be validated via any additional local mechanism |
334 |
the password will be validated via any additional local mechanism |
| 335 |
such as |
335 |
such as |
| 336 |
.Pa /etc/passwd |
336 |
.Pa /etc/passwd |
| 337 |
or SecurID. Default is |
337 |
or SecurID. Default is |
| 338 |
.Dq yes . |
338 |
.Dq yes . |
| 339 |
.It Cm KerberosTgtPassing |
339 |
.It Cm KerberosTgtPassing |
| 340 |
Specifies whether a Kerberos TGT may be forwarded to the server. |
340 |
Specifies whether a Kerberos TGT may be forwarded to the server. |
|
Lines 343-349
Link Here
|
| 343 |
as this only works when the Kerberos KDC is actually an AFS kaserver. |
343 |
as this only works when the Kerberos KDC is actually an AFS kaserver. |
| 344 |
.It Cm KerberosTicketCleanup |
344 |
.It Cm KerberosTicketCleanup |
| 345 |
Specifies whether to automatically destroy the user's ticket cache |
345 |
Specifies whether to automatically destroy the user's ticket cache |
| 346 |
file on logout. Default is |
346 |
file on logout. Default is |
| 347 |
.Dq yes . |
347 |
.Dq yes . |
| 348 |
.It Cm KeyRegenerationInterval |
348 |
.It Cm KeyRegenerationInterval |
| 349 |
The server key is automatically regenerated after this many seconds |
349 |
The server key is automatically regenerated after this many seconds |
|
Lines 418-436
Link Here
|
| 418 |
or equivalent.) The default is |
418 |
or equivalent.) The default is |
| 419 |
.Dq yes . |
419 |
.Dq yes . |
| 420 |
.It Cm RandomSeed |
420 |
.It Cm RandomSeed |
| 421 |
Obsolete. Random number generation uses other techniques. |
421 |
Obsolete - accepted and ignored with a warning. |
|
|
422 |
Random number generation uses other techniques. |
| 422 |
.It Cm RhostsAuthentication |
423 |
.It Cm RhostsAuthentication |
| 423 |
Specifies whether authentication using rhosts or /etc/hosts.equiv |
424 |
Specifies whether authentication using rhosts or |
|
|
425 |
.Pa /etc/hosts.equiv |
| 424 |
files is sufficient. Normally, this method should not be permitted |
426 |
files is sufficient. Normally, this method should not be permitted |
| 425 |
because it is insecure. |
427 |
because it is insecure. |
| 426 |
.Cm RhostsRSAAuthentication |
428 |
.Cm RhostsRSAAuthentication |
| 427 |
should be used |
429 |
should be used |
| 428 |
instead, because it performs RSA-based host authentication in addition |
430 |
instead, because it performs RSA-based host authentication in addition |
| 429 |
to normal rhosts or /etc/hosts.equiv authentication. |
431 |
to normal rhosts or |
|
|
432 |
.Pa /etc/hosts.equiv |
| 433 |
authentication. |
| 430 |
The default is |
434 |
The default is |
| 431 |
.Dq no . |
435 |
.Dq no . |
| 432 |
.It Cm RhostsRSAAuthentication |
436 |
.It Cm RhostsRSAAuthentication |
| 433 |
Specifies whether rhosts or /etc/hosts.equiv authentication together |
437 |
Specifies whether rhosts or |
|
|
438 |
.Pa /etc/hosts.equiv |
| 439 |
authentication together |
| 434 |
with successful RSA host authentication is allowed. The default is |
440 |
with successful RSA host authentication is allowed. The default is |
| 435 |
.Dq no . |
441 |
.Dq no . |
| 436 |
.It Cm RSAAuthentication |
442 |
.It Cm RSAAuthentication |
|
Lines 444-450
Link Here
|
| 444 |
.Xr skey 1 |
450 |
.Xr skey 1 |
| 445 |
authentication is allowed. The default is |
451 |
authentication is allowed. The default is |
| 446 |
.Dq yes . |
452 |
.Dq yes . |
| 447 |
Note that s/key authentication is enabled only if |
453 |
Note that S/Key authentication is enabled only if |
| 448 |
.Cm PasswordAuthentication |
454 |
.Cm PasswordAuthentication |
| 449 |
is allowed, too. |
455 |
is allowed, too. |
| 450 |
.It Cm StrictModes |
456 |
.It Cm StrictModes |
|
Lines 463-469
Link Here
|
| 463 |
.It Cm UseLogin |
469 |
.It Cm UseLogin |
| 464 |
Specifies whether |
470 |
Specifies whether |
| 465 |
.Xr login 1 |
471 |
.Xr login 1 |
| 466 |
is used. The default is |
472 |
is used. The default is |
| 467 |
.Dq no . |
473 |
.Dq no . |
| 468 |
.It Cm X11DisplayOffset |
474 |
.It Cm X11DisplayOffset |
| 469 |
Specifies the first display number available for |
475 |
Specifies the first display number available for |
|
Lines 516-525
Link Here
|
| 516 |
exists, runs it; else if |
522 |
exists, runs it; else if |
| 517 |
.Pa /etc/ssh/sshrc |
523 |
.Pa /etc/ssh/sshrc |
| 518 |
exists, runs |
524 |
exists, runs |
| 519 |
it; otherwise runs xauth. The |
525 |
it; otherwise runs |
|
|
526 |
.Xr xauth 1 . |
| 527 |
The |
| 520 |
.Dq rc |
528 |
.Dq rc |
| 521 |
files are given the X11 |
529 |
files are given the X11 |
| 522 |
authentication protocol and cookie in standard input. |
530 |
authentication protocol and cookie (if applicable) in standard input. |
| 523 |
.It |
531 |
.It |
| 524 |
Runs user's shell or command. |
532 |
Runs user's shell or command. |
| 525 |
.El |
533 |
.El |
|
Lines 593-603
Link Here
|
| 593 |
Prevents tty allocation (a request to allocate a pty will fail). |
601 |
Prevents tty allocation (a request to allocate a pty will fail). |
| 594 |
.El |
602 |
.El |
| 595 |
.Ss Examples |
603 |
.Ss Examples |
| 596 |
1024 33 12121.\|.\|.\|312314325 ylo@foo.bar |
604 |
.Bd -literal |
| 597 |
.Pp |
605 |
1024 33 12121...312314325 ylo@foo.bar |
| 598 |
from="*.niksula.hut.fi,!pc.niksula.hut.fi" 1024 35 23.\|.\|.\|2334 ylo@niksula |
606 |
from="*.niksula.hut.fi,!pc.niksula.hut.fi" 1024 35 23...2334 ylo@niksula |
| 599 |
.Pp |
607 |
command="dump /home",no-pty,no-port-forwarding 1024 33 23...2323 backup.hut.fi |
| 600 |
command="dump /home",no-pty,no-port-forwarding 1024 33 23.\|.\|.\|2323 backup.hut.fi |
608 |
.Ed |
| 601 |
.Sh SSH_KNOWN_HOSTS FILE FORMAT |
609 |
.Sh SSH_KNOWN_HOSTS FILE FORMAT |
| 602 |
The |
610 |
The |
| 603 |
.Pa /etc/ssh/ssh_known_hosts |
611 |
.Pa /etc/ssh/ssh_known_hosts |
|
Lines 645-651
Link Here
|
| 645 |
.Pa /etc/ssh/ssh_host_key.pub |
653 |
.Pa /etc/ssh/ssh_host_key.pub |
| 646 |
and adding the host names at the front. |
654 |
and adding the host names at the front. |
| 647 |
.Ss Examples |
655 |
.Ss Examples |
| 648 |
closenet,closenet.hut.fi,.\|.\|.\|,130.233.208.41 1024 37 159.\|.\|.93 closenet.hut.fi |
656 |
.Bd -literal |
|
|
657 |
closenet,closenet.hut.fi,...,130.233.208.41 1024 37 159...93 closenet.hut.fi |
| 658 |
.Ed |
| 649 |
.Sh FILES |
659 |
.Sh FILES |
| 650 |
.Bl -tag -width Ds |
660 |
.Bl -tag -width Ds |
| 651 |
.It Pa /etc/ssh/sshd_config |
661 |
.It Pa /etc/ssh/sshd_config |
|
Lines 687-693
Link Here
|
| 687 |
listed in one of these files to be accepted. |
697 |
listed in one of these files to be accepted. |
| 688 |
The client uses the same files |
698 |
The client uses the same files |
| 689 |
to verify that the remote host is the one we intended to |
699 |
to verify that the remote host is the one we intended to |
| 690 |
connect. These files should be writable only by root/the owner. |
700 |
connect. These files should be writable only by root/the owner. |
| 691 |
.Pa /etc/ssh/ssh_known_hosts |
701 |
.Pa /etc/ssh/ssh_known_hosts |
| 692 |
should be world-readable, and |
702 |
should be world-readable, and |
| 693 |
.Pa $HOME/.ssh/known_hosts |
703 |
.Pa $HOME/.ssh/known_hosts |
|
Lines 698-704
Link Here
|
| 698 |
refuses to let anyone except root log in. The contents of the file |
708 |
refuses to let anyone except root log in. The contents of the file |
| 699 |
are displayed to anyone trying to log in, and non-root connections are |
709 |
are displayed to anyone trying to log in, and non-root connections are |
| 700 |
refused. The file should be world-readable. |
710 |
refused. The file should be world-readable. |
| 701 |
.It Pa /etc/hosts.allow, /etc/hosts.deny |
711 |
.It Pa /etc/hosts.allow , /etc/hosts.deny |
| 702 |
If compiled with |
712 |
If compiled with |
| 703 |
.Sy LIBWRAP |
713 |
.Sy LIBWRAP |
| 704 |
support, tcp-wrappers access controls may be defined here as described in |
714 |
support, tcp-wrappers access controls may be defined here as described in |
|
Lines 720-726
Link Here
|
| 720 |
.Pa .rhosts . |
730 |
.Pa .rhosts . |
| 721 |
However, this file is |
731 |
However, this file is |
| 722 |
not used by rlogin and rshd, so using this permits access using SSH only. |
732 |
not used by rlogin and rshd, so using this permits access using SSH only. |
| 723 |
.Pa /etc/hosts.equiv |
733 |
.It Pa /etc/hosts.equiv |
| 724 |
This file is used during |
734 |
This file is used during |
| 725 |
.Pa .rhosts |
735 |
.Pa .rhosts |
| 726 |
authentication. In the |
736 |
authentication. In the |
|
Lines 762-768
Link Here
|
| 762 |
and assignment lines of the form name=value. The file should be writable |
772 |
and assignment lines of the form name=value. The file should be writable |
| 763 |
only by the user; it need not be readable by anyone else. |
773 |
only by the user; it need not be readable by anyone else. |
| 764 |
.It Pa $HOME/.ssh/rc |
774 |
.It Pa $HOME/.ssh/rc |
| 765 |
If this file exists, it is run with /bin/sh after reading the |
775 |
If this file exists, it is run with |
|
|
776 |
.Pa /bin/sh |
| 777 |
after reading the |
| 766 |
environment files but before starting the user's shell or command. If |
778 |
environment files but before starting the user's shell or command. If |
| 767 |
X11 spoofing is in use, this will receive the "proto cookie" pair in |
779 |
X11 spoofing is in use, this will receive the "proto cookie" pair in |
| 768 |
standard input (and |
780 |
standard input (and |
|
Lines 776-788
Link Here
|
| 776 |
accessible; AFS is a particular example of such an environment. |
788 |
accessible; AFS is a particular example of such an environment. |
| 777 |
.Pp |
789 |
.Pp |
| 778 |
This file will probably contain some initialization code followed by |
790 |
This file will probably contain some initialization code followed by |
| 779 |
something similar to: "if read proto cookie; then echo add $DISPLAY |
791 |
something similar to: |
| 780 |
$proto $cookie | xauth -q -; fi". |
792 |
.Bd -literal -offset indent |
|
|
793 |
if [ -n "$DISPLAY" ] && read proto cookie; then |
| 794 |
echo add $DISPLAY $proto $cookie | xauth -q - |
| 795 |
fi |
| 796 |
.Ed |
| 781 |
.Pp |
797 |
.Pp |
| 782 |
If this file does not exist, |
798 |
If this file does not exist, |
| 783 |
.Pa /etc/ssh/sshrc |
799 |
.Pa /etc/ssh/sshrc |
| 784 |
is run, and if that |
800 |
is run, and if that |
| 785 |
does not exist either, xauth is used to store the cookie. |
801 |
does not exist either, |
|
|
802 |
.Xr xauth 1 |
| 803 |
is used to store the cookie. |
| 786 |
.Pp |
804 |
.Pp |
| 787 |
This file should be writable only by the user, and need not be |
805 |
This file should be writable only by the user, and need not be |
| 788 |
readable by anyone else. |
806 |
readable by anyone else. |