NAME ssh2_config - format of configuration file for ssh2 CONFIGURATION FILES Ssh2 obtains configuration data from the following sources (in this order): system's global configuration file (typi- cally /etc/ssh2/ssh2_config), user's configuration file ($HOME/.ssh2/ssh2_config) and the command line options. For each parameter, the last obtained value will be effective. The configuration file has the following format: `expression:' denotes the start of a per-host confi- guration block, where `expression' is an arbitrary string which distinguishes this block from others. The `expression' can contain wildcards. The `expression' will be compared with the hostname obtained from the command-line, and if it matches, the block will be evaluated. Evaluation stops at the next `expression:' statement. If more than one match is found, all will be evaluated and the last obtained values for parameters will be effective. Note that the `expression' doesn't have to be a real hostname, as long as the `expression' block contains a "Host" configuration parameter, where the real hostname to connect is defined. Empty lines and lines starting with '#' are ignored as comments. Otherwise a line is of the format "keyword arguments". Note that it is possible to enclose arguments in quotes, and use the standard C convention. The possi- ble keywords and their meanings are as follows (note that the configuration files are case-sensitive, but keywords are case-insensitive): AllowedAuthentications This keyword specifies the authentications methods that are allowed. This is a comma-separated list currently consisting of the following words: password, publickey and hostbased. Each specifies an authentication method. The default is "publickey,password". The authentication methods are tried in the order in which they are specified with this configuration parameter. That means that the least interactive methods should be placed first in this list, for example "hostbased, publickey,password" (because publickey authentication can be automated by the user, with ssh-agent). AuthenticationSuccessMsg Specifies whether to display "Authentication success- ful." after authentication has completed successfully. This is mainly to prevent malicious servers from get- ting information from the user by displaying additional password or passphrase prompts. The argument must be "yes" or "no". The default is "yes". AuthorizationFile Specifies the name of the user's authorization file. BatchMode If set to "yes", ssh2 disables password/passhphrase querying. This is useful in scripts and other batch jobs where you don't have a user to supply the pass- word. If the "StrictHostKeyChecking" parameter is set to "ask", ssh2 assumes a "no" answer to queries (this is because ssh doesn't even try to get user input when invoked with "BatchMode yes"). The argument must be "yes" or "no". Ciphers Specifies the ciphers to use for encrypting the ses- sion. Currently, des, 3des, blowfish, arcfour twofish and cast are supported. Multiple ciphers can be speci- fied as a comma-separated list. Special values to this option are any, anystd, that allows only standard (see below) ciphers (and 'none'), and anycipher that allows either any available cipher or excludes non-encrypting cipher mode none but allows all others. anystdcipher is the same as anycipher above, but includes only those ciphers mentioned in the IETF-SecSH-draft (excluding 'none'). ClearAllForwardings Specifies whether to clear all remote and local for- warded ports defined so far. The argument must be "yes" or "no". Note that scp always automatically clears all forwarded ports. Compression Specifies whether to use compression. The argument must be "yes" or "no". DefaultDomain This option is only useful if set in the global confi- guration file. This is used by ssh2 and ssh-signer2 to find out the system name, if only the base part of the system name is available by normal means (those used by e.g. hostname(1)). This is appended to the found sys- tem name, if the system name returned doesn't contain a dot ('.'). DontReadStdin Redirect input from /dev/null, ie. don't read stdin. The argument must be "yes" or "no". EscapeChar Sets the escape character (default: ~). The escape character can also be set on the command line. The argument should be a single character, '^' followed by a letter, or "none" to disable the escape character entirely (making the connection transparent for binary data). ForcePTTYAllocation For tty allocation. Ie. allocate a tty even if a com- mand is given. The argument must be "yes" or "no". ForwardAgent Specifies whether the connection to the authentication agent (if any) will be forwarded to the remote machine. The argument must be "yes" or "no". ForwardX11 Specifies whether X11 connections will be automatically redirected over the secure channel and DISPLAY set. The argument must be "yes" or "no". GatewayPorts Specifies that also remote hosts may connect to locally forwarded ports. The argument must be "yes" or "no". The default is "no". GoBackground Requests ssh2 to go to background after authentication is done and the forwardings have been established. This is useful if ssh2 is going to ask for passwords or passphrases, but the user wants it in the background. The argument must be "yes", "no" or "oneshot". With "oneshot", ssh2 behaves the same way as with `-f o' commandline arguments. The default is "no". Host Specifies the real host name to log into. With `expres- sion' above, this can be used to specify nicknames or abbreviations for hosts. The default is the name given on the command line. Numeric IP addresses are also per- mitted (both on the command line and in HostName specifications). IdentityFile Specifies the name of the user's identification file. KeepAlive Specifies whether the system should send keepalive mes- sages to the other side. If they are sent, death of the connection or crash of one of the machines will be properly noticed. However, this means that connections will die if the route is down temporarily, and some people find this annoying. The default is "yes" (to send keepalives), and the client will notice if the network goes down or the remote host dies. This is important when using scripts, and many users want it too. To disable keepalives, the value should be set to "no" in both the server and the client configuration files. LocalForward Specifies that a TCP/IP port on the local machine is forwarded over the secure channel to given host:port from the remote machine. The argument should be enclosed in double-quotes (""). The argument format is port:remotehost:remoteport . MACs Specifies the MAC (Message Authentication Code) algo- rithm to use for data integrity verification. Currently, hmac-sha1, hmac-sha1-96, hmac-md5, hmac- md5-96, hmac-ripemd160 and hmac-ripemd160-96 are sup- ported, of which hmac-sha1, hmac-sha1-96, hmac-md5 and hmac-md5-96 are included in all distributions. Multiple MACs can be specified as a comma-separated list. Special values to this option are any, anystd, that allows only standard (see below) MACs (and 'none'), and anymac that allows either any available MAC or excludes none but allows all others. anystdmac is the same as anymac above, but includes only those MACs mentioned in the IETF-SecSH-draft (excluding 'none'). NoDelay If "yes", enable socket option TCP_NODELAY. The argu- ment must be "yes" or "no". Default is "no". NumberofPasswordPrompts Specifies the number of password prompts before giving up. The argument must be an integer. Note that the server also limits the number of attempts, so setting this value larger than the server's value doesn't have any effect. Default value is three (3). PasswordPrompt Sets the password prompt that the user sees when con- necting to a host. Variables '%U' and '%H' can be used to give the user's login name and host, respectively. Port Specifies the port number to connect on the remote host. The default port number is 22. QuietMode Quiet mode. Causes all warnings and diagnostic messages to be suppressed. Only fatal errors are displayed. The argument must be "yes" or "no". RandomSeedFile Specifies the name of the user's randomseed file. RekeyIntervalSeconds Specifies the number of seconds that the key exchange is done again. The default is 3600 seconds. A value of '0' turns rekey-requests off. This doesn't prevent the server from requesting rekeys. Other servers may not have rekey-capabilities implemented correctly, and your connection may be cut off if you're connecting to a server other than sshd2. (The server may also possibly crash, but that is no fault of ssh2). RemoteForward Specifies that a TCP/IP port on the remote machine be forwarded over the secure channel to given host:port from the local machine. The argument should be enclosed in double-quotes (""). The argument format is port:remotehost:remoteport . Ssh1AgentCompatibility Specifies whether to forward also an SSH1 agent connec- tion. Legal values for this option are "none", "tradi- tional" and "ssh2". With value "none" (default), the SSH1 agent connection is not forwarded at all. With value "traditional", SSH1 agent connection is forwarded transparently like in SSH1. Value "traditional" can always be used, but it constitutes a security risk, because the agent does not get the information about the forwarding path. Value "ssh2" makes SSH1 agent forwarding similar to SSH2 agent forwarding and with this mode agent gets the information about the agent forwarding path. Note that value "ssh2" can only be used, if you use ssh-agent2 in SSH1 compatibility mode. "yes" or "no". Ssh1Compatibility Specifies whether to use SSH1 compatibility code. With this option, ssh1 is executed when the server supports only SSH 1.x protocols. The argument must be "yes" or "no". Ssh1Path Specifies the path to ssh1 client, which is executed if the server supports only SSH 1.x protocols. The argu- ments for ssh2 are passed to the ssh1 client. SocksServer Overrides the value of SSH_SOCKS_SERVER. Otherwise, functions completely equivalently. StrictHostKeyChecking If this flag is set to "yes", ssh2 will never automati- cally add host keys to the $HOME/.ssh2/hostkeys direc- tory, and refuses to connect hosts whose host key has changed. This provides maximum protection against Tro- jan horse attacks. However, it can be somewhat annoying if you don't have the necessary keys in /etc/ssh2/hostkeys and you frequently connect new hosts. Basically this option forces the user to manually add any new hosts. Normally this option is set to "ask", and new hosts will automatically be added to the known host files after you have confirmed that you really want to do that. If this is set to "no" then the new host will automatically be added to the known host files. The host keys of known hosts will be verified automatically in either case. If this value is set to "ask", the user also has the option to change the key on the disk on the fly. The argument must be "yes", "no" or "ask". User Specifies the user to log in as. This can be useful if you have a different user name in different machines. This saves the trouble of having to remember to specify the user name on the command line. VerboseMode Verbose mode. Causes ssh2 to print debugging messages about its progress. This is helpful when debugging con- nection, authentication, and configuration problems. AUTHORS SSH Communications Security Corp For more information, see http://www.ssh.com. SEE ALSO ssh2(1)
Закладки на сайте Проследить за страницей |
Created 1996-2024 by Maxim Chirkov Добавить, Поддержать, Вебмастеру |