[BACK]Return to sshd_config.5 CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Diff for /src/usr.bin/ssh/sshd_config.5 between version 1.4.2.3 and 1.5

version 1.4.2.3, 2003/04/03 22:35:18 version 1.5, 2002/07/09 17:46:25
Line 89 
Line 89 
 .It Cm AllowUsers  .It Cm AllowUsers
 This keyword can be followed by a list of user name patterns, separated  This keyword can be followed by a list of user name patterns, separated
 by spaces.  by spaces.
 If specified, login is allowed only for user names that  If specified, login is allowed only for users names that
 match one of the patterns.  match one of the patterns.
 .Ql \&*  .Ql \&*
 and  and
Line 211 
Line 211 
 forwarded for the client.  forwarded for the client.
 By default,  By default,
 .Nm sshd  .Nm sshd
 binds remote port forwardings to the loopback address.  binds remote port forwardings to the loopback address.  This
 This prevents other remote hosts from connecting to forwarded ports.  prevents other remote hosts from connecting to forwarded ports.
 .Cm GatewayPorts  .Cm GatewayPorts
 can be used to specify that  can be used to specify that
 .Nm sshd  .Nm sshd
Line 370 
Line 370 
 will listen on the address and all prior  will listen on the address and all prior
 .Cm Port  .Cm Port
 options specified. The default is to listen on all local  options specified. The default is to listen on all local
 addresses.  addresses.  Multiple
 Multiple  
 .Cm ListenAddress  .Cm ListenAddress
 options are permitted. Additionally, any  options are permitted. Additionally, any
 .Cm Port  .Cm Port
Line 380 
Line 379 
 The server disconnects after this time if the user has not  The server disconnects after this time if the user has not
 successfully logged in.  successfully logged in.
 If the value is 0, there is no time limit.  If the value is 0, there is no time limit.
 The default is 120 seconds.  The default is 600 (seconds).
 .It Cm LogLevel  .It Cm LogLevel
 Gives the verbosity level that is used when logging messages from  Gives the verbosity level that is used when logging messages from
 .Nm sshd .  .Nm sshd .
 The possible values are:  The possible values are:
 QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3.  QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3.
 The default is INFO.  The default is INFO.  DEBUG and DEBUG1 are equivalent.  DEBUG2
 DEBUG and DEBUG1 are equivalent.  and DEBUG3 each specify higher levels of debugging output.
 DEBUG2 and DEBUG3 each specify higher levels of debugging output.  Logging with a DEBUG level violates the privacy of users
 Logging with a DEBUG level violates the privacy of users and is not recommended.  and is not recommended.
 .It Cm MACs  .It Cm MACs
 Specifies the available MAC (message authentication code) algorithms.  Specifies the available MAC (message authentication code) algorithms.
 The MAC algorithm is used in protocol version 2  The MAC algorithm is used in protocol version 2
Line 460 
Line 459 
 If this option is set to  If this option is set to
 .Dq no  .Dq no
 root is not allowed to login.  root is not allowed to login.
 .It Cm PermitUserEnvironment  
 Specifies whether  
 .Pa ~/.ssh/environment  
 and  
 .Cm environment=  
 options in  
 .Pa ~/.ssh/authorized_keys  
 are processed by  
 .Nm sshd .  
 The default is  
 .Dq no .  
 Enabling environment processing may enable users to bypass access  
 restrictions in some configurations using mechanisms such as  
 .Ev LD_PRELOAD .  
 .It Cm PidFile  .It Cm PidFile
 Specifies the file that contains the process ID of the  Specifies the file that contains the process ID of the
 .Nm sshd  .Nm sshd
Line 594 
Line 579 
 .Xr login 1  .Xr login 1
 does not know how to handle  does not know how to handle
 .Xr xauth 1  .Xr xauth 1
 cookies.  cookies.  If
 If  
 .Cm UsePrivilegeSeparation  .Cm UsePrivilegeSeparation
 is specified, it will be disabled after authentication.  is specified, it will be disabled after authentication.
 .It Cm UsePrivilegeSeparation  .It Cm UsePrivilegeSeparation
 Specifies whether  Specifies whether
 .Nm sshd  .Nm sshd
 separates privileges by creating an unprivileged child process  separates privileges by creating an unprivileged child process
 to deal with incoming network traffic.  to deal with incoming network traffic.  After successful authentication,
 After successful authentication, another process will be created that has  another process will be created that has the privilege of the authenticated
 the privilege of the authenticated user.  user.  The goal of privilege separation is to prevent privilege
 The goal of privilege separation is to prevent privilege  
 escalation by containing any corruption within the unprivileged processes.  escalation by containing any corruption within the unprivileged processes.
 The default is  The default is
 .Dq yes .  .Dq yes .
Line 627 
Line 610 
 The default is 10.  The default is 10.
 .It Cm X11Forwarding  .It Cm X11Forwarding
 Specifies whether X11 forwarding is permitted.  Specifies whether X11 forwarding is permitted.
 The argument must be  
 .Dq yes  
 or  
 .Dq no .  
 The default is  The default is
 .Dq no .  .Dq no .
 .Pp  Note that disabling X11 forwarding does not improve security in any
 When X11 forwarding is enabled, there may be additional exposure to  way, as users can always install their own forwarders.
 the server and to client displays if the  
 .Nm sshd  
 proxy display is configured to listen on the wildcard address (see  
 .Cm X11UseLocalhost  
 below), however this is not the default.  
 Additionally, the authentication spoofing and authentication data  
 verification and substitution occur on the client side.  
 The security risk of using X11 forwarding is that the client's X11  
 display server may be exposed to attack when the ssh client requests  
 forwarding (see the warnings for  
 .Cm ForwardX11  
 in  
 .Xr ssh_config 5 ).  
 A system administrator may have a stance in which they want to  
 protect clients that may expose themselves to attack by unwittingly  
 requesting X11 forwarding, which can warrant a  
 .Dq no  
 setting.  
 .Pp  
 Note that disabling X11 forwarding does not prevent users from  
 forwarding X11 traffic, as users can always install their own forwarders.  
 X11 forwarding is automatically disabled if  X11 forwarding is automatically disabled if
 .Cm UseLogin  .Cm UseLogin
 is enabled.  is enabled.
Line 663 
Line 621 
 Specifies whether  Specifies whether
 .Nm sshd  .Nm sshd
 should bind the X11 forwarding server to the loopback address or to  should bind the X11 forwarding server to the loopback address or to
 the wildcard address.  the wildcard address.  By default,
 By default,  
 .Nm sshd  .Nm sshd
 binds the forwarding server to the loopback address and sets the  binds the forwarding server to the loopback address and sets the
 hostname part of the  hostname part of the
 .Ev DISPLAY  .Ev DISPLAY
 environment variable to  environment variable to
 .Dq localhost .  .Dq localhost .
 This prevents remote hosts from connecting to the proxy display.  This prevents remote hosts from connecting to the fake display.
 However, some older X11 clients may not function with this  However, some older X11 clients may not function with this
 configuration.  configuration.
 .Cm X11UseLocalhost  .Cm X11UseLocalhost
Line 686 
Line 643 
 The default is  The default is
 .Dq yes .  .Dq yes .
 .It Cm XAuthLocation  .It Cm XAuthLocation
 Specifies the full pathname of the  Specifies the location of the
 .Xr xauth 1  .Xr xauth 1
 program.  program.
 The default is  The default is
Line 698 
Line 655 
 command-line arguments and configuration file options that specify time  command-line arguments and configuration file options that specify time
 may be expressed using a sequence of the form:  may be expressed using a sequence of the form:
 .Sm off  .Sm off
 .Ar time Op Ar qualifier ,  .Ar time Oo Ar qualifier Oc ,
 .Sm on  .Sm on
 where  where
 .Ar time  .Ar time

Legend:
Removed from v.1.4.2.3  
changed lines
  Added in v.1.5