=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/sshd_config.5,v retrieving revision 1.298 retrieving revision 1.299 diff -u -r1.298 -r1.299 --- src/usr.bin/ssh/sshd_config.5 2020/01/21 06:09:56 1.298 +++ src/usr.bin/ssh/sshd_config.5 2020/01/25 06:03:11 1.299 @@ -33,8 +33,8 @@ .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.\" $OpenBSD: sshd_config.5,v 1.298 2020/01/21 06:09:56 dtucker Exp $ -.Dd $Mdocdate: January 21 2020 $ +.\" $OpenBSD: sshd_config.5,v 1.299 2020/01/25 06:03:11 djm Exp $ +.Dd $Mdocdate: January 25 2020 $ .Dt SSHD_CONFIG 5 .Os .Sh NAME @@ -1301,7 +1301,9 @@ can be used to prohibit all forwarding requests. The wildcard .Sq * -can be used for host or port to allow all hosts or ports, respectively. +can be used for host or port to allow all hosts or ports respectively. +Otherwise, no pattern matching or address lookups are performed on supplied +names. By default all port forwarding requests are permitted. .It Cm PermitRootLogin Specifies whether root can log in using