version 1.225, 2016/02/16 05:11:04 |
version 1.226, 2016/02/17 07:38:19 |
|
|
Specifies whether user authentication based on GSSAPI is allowed. |
Specifies whether user authentication based on GSSAPI is allowed. |
The default is |
The default is |
.Dq no . |
.Dq no . |
Note that this option applies to protocol version 2 only. |
|
.It Cm GSSAPIDelegateCredentials |
.It Cm GSSAPIDelegateCredentials |
Forward (delegate) credentials to the server. |
Forward (delegate) credentials to the server. |
The default is |
The default is |
.Dq no . |
.Dq no . |
Note that this option applies to protocol version 2 only. |
|
.It Cm HashKnownHosts |
.It Cm HashKnownHosts |
Indicates that |
Indicates that |
.Xr ssh 1 |
.Xr ssh 1 |
|
|
.Dq no . |
.Dq no . |
The default is |
The default is |
.Dq no . |
.Dq no . |
This option applies to protocol version 2 only and |
|
is similar to |
|
.Cm RhostsRSAAuthentication . |
|
.It Cm HostbasedKeyTypes |
.It Cm HostbasedKeyTypes |
Specifies the key types that will be used for hostbased authentication |
Specifies the key types that will be used for hostbased authentication |
as a comma-separated pattern list. |
as a comma-separated pattern list. |
|
|
.Xr ssh 1 |
.Xr ssh 1 |
may be used to list supported key types. |
may be used to list supported key types. |
.It Cm HostKeyAlgorithms |
.It Cm HostKeyAlgorithms |
Specifies the protocol version 2 host key algorithms |
Specifies the host key algorithms |
that the client wants to use in order of preference. |
that the client wants to use in order of preference. |
Alternately if the specified value begins with a |
Alternately if the specified value begins with a |
.Sq + |
.Sq + |
|
|
.It Cm MACs |
.It Cm MACs |
Specifies the MAC (message authentication code) algorithms |
Specifies the MAC (message authentication code) algorithms |
in order of preference. |
in order of preference. |
The MAC algorithm is used in protocol version 2 |
The MAC algorithm is used for data integrity protection. |
for data integrity protection. |
|
Multiple algorithms must be comma-separated. |
Multiple algorithms must be comma-separated. |
If the specified value begins with a |
If the specified value begins with a |
.Sq + |
.Sq + |
|
|
Specifies the port number to connect on the remote host. |
Specifies the port number to connect on the remote host. |
The default is 22. |
The default is 22. |
.It Cm PreferredAuthentications |
.It Cm PreferredAuthentications |
Specifies the order in which the client should try protocol 2 |
Specifies the order in which the client should try authentication methods. |
authentication methods. |
|
This allows a client to prefer one method (e.g.\& |
This allows a client to prefer one method (e.g.\& |
.Cm keyboard-interactive ) |
.Cm keyboard-interactive ) |
over another method (e.g.\& |
over another method (e.g.\& |
|
|
.Dq no . |
.Dq no . |
The default is |
The default is |
.Dq yes . |
.Dq yes . |
This option applies to protocol version 2 only. |
|
.It Cm RekeyLimit |
.It Cm RekeyLimit |
Specifies the maximum amount of data that may be transmitted before the |
Specifies the maximum amount of data that may be transmitted before the |
session key is renegotiated, optionally followed a maximum amount of |
session key is renegotiated, optionally followed a maximum amount of |
|
|
.Dq default none , |
.Dq default none , |
which means that rekeying is performed after the cipher's default amount |
which means that rekeying is performed after the cipher's default amount |
of data has been sent or received and no time based rekeying is done. |
of data has been sent or received and no time based rekeying is done. |
This option applies to protocol version 2 only. |
|
.It Cm RemoteForward |
.It Cm RemoteForward |
Specifies that a TCP port on the remote machine be forwarded over |
Specifies that a TCP port on the remote machine be forwarded over |
the secure channel to the specified host and port from the local machine. |
the secure channel to the specified host and port from the local machine. |
|
|
Specifies what variables from the local |
Specifies what variables from the local |
.Xr environ 7 |
.Xr environ 7 |
should be sent to the server. |
should be sent to the server. |
Note that environment passing is only supported for protocol 2. |
|
The server must also support it, and the server must be configured to |
The server must also support it, and the server must be configured to |
accept these environment variables. |
accept these environment variables. |
Note that the |
Note that the |
|
|
.Cm ServerAliveCountMax |
.Cm ServerAliveCountMax |
is left at the default, if the server becomes unresponsive, |
is left at the default, if the server becomes unresponsive, |
ssh will disconnect after approximately 45 seconds. |
ssh will disconnect after approximately 45 seconds. |
This option applies to protocol version 2 only. |
|
.It Cm ServerAliveInterval |
.It Cm ServerAliveInterval |
Sets a timeout interval in seconds after which if no data has been received |
Sets a timeout interval in seconds after which if no data has been received |
from the server, |
from the server, |
|
|
channel to request a response from the server. |
channel to request a response from the server. |
The default |
The default |
is 0, indicating that these messages will not be sent to the server. |
is 0, indicating that these messages will not be sent to the server. |
This option applies to protocol version 2 only. |
|
.It Cm StreamLocalBindMask |
.It Cm StreamLocalBindMask |
Sets the octal file creation mode mask |
Sets the octal file creation mode mask |
.Pq umask |
.Pq umask |
|
|
.Dq ask . |
.Dq ask . |
The default is |
The default is |
.Dq no . |
.Dq no . |
Note that this option applies to protocol version 2 only. |
|
.Pp |
.Pp |
See also VERIFYING HOST KEYS in |
See also VERIFYING HOST KEYS in |
.Xr ssh 1 . |
.Xr ssh 1 . |