version 1.298, 2019/08/09 04:24:03 |
version 1.299, 2019/08/16 11:16:32 |
|
|
.It Cm Ciphers |
.It Cm Ciphers |
Specifies the ciphers allowed and their order of preference. |
Specifies the ciphers allowed and their order of preference. |
Multiple ciphers must be comma-separated. |
Multiple ciphers must be comma-separated. |
If the specified value begins with a |
If the specified list begins with a |
.Sq + |
.Sq + |
character, then the specified ciphers will be appended to the default set |
character, then the specified ciphers will be appended to the default set |
instead of replacing them. |
instead of replacing them. |
If the specified value begins with a |
If the specified list begins with a |
.Sq - |
.Sq - |
character, then the specified ciphers (including wildcards) will be removed |
character, then the specified ciphers (including wildcards) will be removed |
from the default set instead of replacing them. |
from the default set instead of replacing them. |
|
|
.It Cm KexAlgorithms |
.It Cm KexAlgorithms |
Specifies the available KEX (Key Exchange) algorithms. |
Specifies the available KEX (Key Exchange) algorithms. |
Multiple algorithms must be comma-separated. |
Multiple algorithms must be comma-separated. |
Alternately if the specified value begins with a |
If the specified list begins with a |
.Sq + |
.Sq + |
character, then the specified methods will be appended to the default set |
character, then the specified methods will be appended to the default set |
instead of replacing them. |
instead of replacing them. |
If the specified value begins with a |
If the specified list begins with a |
.Sq - |
.Sq - |
character, then the specified methods (including wildcards) will be removed |
character, then the specified methods (including wildcards) will be removed |
from the default set instead of replacing them. |
from the default set instead of replacing them. |
|
|
in order of preference. |
in order of preference. |
The MAC algorithm is used for data integrity protection. |
The MAC algorithm is used for data integrity protection. |
Multiple algorithms must be comma-separated. |
Multiple algorithms must be comma-separated. |
If the specified value begins with a |
If the specified list begins with a |
.Sq + |
.Sq + |
character, then the specified algorithms will be appended to the default set |
character, then the specified algorithms will be appended to the default set |
instead of replacing them. |
instead of replacing them. |
If the specified value begins with a |
If the specified list begins with a |
.Sq - |
.Sq - |
character, then the specified algorithms (including wildcards) will be removed |
character, then the specified algorithms (including wildcards) will be removed |
from the default set instead of replacing them. |
from the default set instead of replacing them. |
|
|
.It Cm PubkeyAcceptedKeyTypes |
.It Cm PubkeyAcceptedKeyTypes |
Specifies the key types that will be used for public key authentication |
Specifies the key types that will be used for public key authentication |
as a comma-separated list of patterns. |
as a comma-separated list of patterns. |
Alternately if the specified value begins with a |
If the specified list begins with a |
.Sq + |
.Sq + |
character, then the key types after it will be appended to the default |
character, then the key types after it will be appended to the default |
instead of replacing it. |
instead of replacing it. |
If the specified value begins with a |
If the specified list begins with a |
.Sq - |
.Sq - |
character, then the specified key types (including wildcards) will be removed |
character, then the specified key types (including wildcards) will be removed |
from the default set instead of replacing them. |
from the default set instead of replacing them. |