[BACK]Return to ssh_config.5 CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Diff for /src/usr.bin/ssh/ssh_config.5 between version 1.49 and 1.50

version 1.49, 2005/03/16 11:10:38 version 1.50, 2005/04/21 06:17:50
Line 43 
Line 43 
 .Nd OpenSSH SSH client configuration files  .Nd OpenSSH SSH client configuration files
 .Sh SYNOPSIS  .Sh SYNOPSIS
 .Bl -tag -width Ds -compact  .Bl -tag -width Ds -compact
 .It Pa $HOME/.ssh/config  .It Pa ~/.ssh/config
 .It Pa /etc/ssh/ssh_config  .It Pa /etc/ssh/ssh_config
 .El  .El
 .Sh DESCRIPTION  .Sh DESCRIPTION
Line 55 
Line 55 
 command-line options  command-line options
 .It  .It
 user's configuration file  user's configuration file
 .Pq Pa $HOME/.ssh/config  .Pq Pa ~/.ssh/config
 .It  .It
 system-wide configuration file  system-wide configuration file
 .Pq Pa /etc/ssh/ssh_config  .Pq Pa /etc/ssh/ssh_config
Line 411 
Line 411 
 Indicates that  Indicates that
 .Nm ssh  .Nm ssh
 should hash host names and addresses when they are added to  should hash host names and addresses when they are added to
 .Pa $HOME/.ssh/known_hosts .  .Pa ~/.ssh/known_hosts .
 These hashed names may be used normally by  These hashed names may be used normally by
 .Nm ssh  .Nm ssh
 and  and
Line 457 
Line 457 
 Specifies a file from which the user's RSA or DSA authentication identity  Specifies a file from which the user's RSA or DSA authentication identity
 is read.  is read.
 The default is  The default is
 .Pa $HOME/.ssh/identity  .Pa ~/.ssh/identity
 for protocol version 1, and  for protocol version 1, and
 .Pa $HOME/.ssh/id_rsa  .Pa ~/.ssh/id_rsa
 and  and
 .Pa $HOME/.ssh/id_dsa  .Pa ~/.ssh/id_dsa
 for protocol version 2.  for protocol version 2.
 Additionally, any identities represented by the authentication agent  Additionally, any identities represented by the authentication agent
 will be used for authentication.  will be used for authentication.
Line 751 
Line 751 
 .Dq yes ,  .Dq yes ,
 .Nm ssh  .Nm ssh
 will never automatically add host keys to the  will never automatically add host keys to the
 .Pa $HOME/.ssh/known_hosts  .Pa ~/.ssh/known_hosts
 file, and refuses to connect to hosts whose host key has changed.  file, and refuses to connect to hosts whose host key has changed.
 This provides maximum protection against trojan horse attacks,  This provides maximum protection against trojan horse attacks,
 however, can be annoying when the  however, can be annoying when the
Line 823 
Line 823 
 .It Cm UserKnownHostsFile  .It Cm UserKnownHostsFile
 Specifies a file to use for the user  Specifies a file to use for the user
 host key database instead of  host key database instead of
 .Pa $HOME/.ssh/known_hosts .  .Pa ~/.ssh/known_hosts .
 .It Cm VerifyHostKeyDNS  .It Cm VerifyHostKeyDNS
 Specifies whether to verify the remote key using DNS and SSHFP resource  Specifies whether to verify the remote key using DNS and SSHFP resource
 records.  records.
Line 856 
Line 856 
 .El  .El
 .Sh FILES  .Sh FILES
 .Bl -tag -width Ds  .Bl -tag -width Ds
 .It Pa $HOME/.ssh/config  .It Pa ~/.ssh/config
 This is the per-user configuration file.  This is the per-user configuration file.
 The format of this file is described above.  The format of this file is described above.
 This file is used by the  This file is used by the

Legend:
Removed from v.1.49  
changed lines
  Added in v.1.50