=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/sshd.8,v retrieving revision 1.314 retrieving revision 1.315 diff -u -r1.314 -r1.315 --- src/usr.bin/ssh/sshd.8 2021/04/03 05:46:41 1.314 +++ src/usr.bin/ssh/sshd.8 2021/06/04 05:59:18 1.315 @@ -33,8 +33,8 @@ .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.\" $OpenBSD: sshd.8,v 1.314 2021/04/03 05:46:41 djm Exp $ -.Dd $Mdocdate: April 3 2021 $ +.\" $OpenBSD: sshd.8,v 1.315 2021/06/04 05:59:18 djm Exp $ +.Dd $Mdocdate: June 4 2021 $ .Dt SSHD 8 .Os .Sh NAME @@ -638,24 +638,25 @@ .Pp An example authorized_keys file: .Bd -literal -offset 3n -# Comments allowed at start of line -ssh-rsa AAAAB3Nza...LiPk== user@example.net -from="*.sales.example.net,!pc.sales.example.net" ssh-rsa -AAAAB2...19Q== john@example.net -command="dump /home",no-pty,no-port-forwarding ssh-rsa -AAAAC3...51R== example.net -permitopen="192.0.2.1:80",permitopen="192.0.2.2:25" ssh-rsa -AAAAB5...21S== -permitlisten="localhost:8080",permitopen="localhost:22000" ssh-rsa -AAAAB5...21S== -tunnel="0",command="sh /etc/netstart tun0" ssh-rsa AAAA...== -jane@example.net -restrict,command="uptime" ssh-rsa AAAA1C8...32Tv== -user@example.net -restrict,pty,command="nethack" ssh-rsa AAAA1f8...IrrC5== -user@example.net -no-touch-required sk-ecdsa-sha2-nistp256@openssh.com AAAAInN...Ko== -user@example.net +# Comments are allowed at start of line. Blank lines are allowed. +# Plain key, no restrictions +ssh-rsa ... +# Forced command, disable PTY and all forwarding +restrict,command="dump /home" ssh-rsa ... +# Restriction of ssh -L forwarding destinations +permitopen="192.0.2.1:80",permitopen="192.0.2.2:25" ssh-rsa ... +# Restriction of ssh -R forwarding listeners +permitlisten="localhost:8080",permitlisten="[::1]:22000" ssh-rsa ... +# Configuration for tunnel forwarding +tunnel="0",command="sh /etc/netstart tun0" ssh-rsa ... +# Override of restriction to allow PTY allocation +restrict,pty,command="nethack" ssh-rsa ... +# Allow FIDO key without requiring touch +no-touch-required sk-ecdsa-sha2-nistp256@openssh.com ... +# Require user-verification (e.g. PIN or biometric) for FIDO key +verify-required sk-ecdsa-sha2-nistp256@openssh.com ... +# Trust CA key, allow touch-less FIDO if requested in certificate +cert-authority,no-touch-required,principals="user_a" ssh-rsa ... .Ed .Sh SSH_KNOWN_HOSTS FILE FORMAT The