summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/ssh_config.5
AgeCommit message (Collapse)Author
2013-06-27do not use Sx for sections outwith the man page - ingo informs me thatJason McIntyre
stuff like html will render with broken links; issue reported by Eric S. Raymond, via djm
2013-06-21explicitly mention that IdentitiesOnly can be used with IdentityFileDamien Miller
to control which keys are offered from an agent.
2013-05-16put IgnoreUnknown in the right place;Jason McIntyre
2013-05-16add the ability to ignore specific unrecognised ssh_config options;Damien Miller
bz#866; ok markus@
2013-05-16Add an optional second argument to RekeyLimit in the client to allowDarren Tucker
rekeying based on elapsed time in addition to amount of traffic. with djm@ jmc@, ok djm
2013-01-08support AES-GCM as defined in RFC 5647 (but with simpler KEX handling)Markus Friedl
ok and feedback djm@
2012-12-11add encrypt-then-mac (EtM) modes to openssh by defining new mac algorithmsMarkus Friedl
that change the packet format and compute the MAC over the encrypted message (including the packet size) instead of the plaintext data; these EtM modes are considered more secure and used by default. feedback and ok djm@
2012-12-02Make IdentitiesOnly apply to keys obtained from a PKCS11Provider.Damien Miller
This allows control of which keys are offered from tokens using IdentityFile. ok markus@
2012-10-04add umac128 variant; ok djm@ at n2k12Markus Friedl
2012-06-29match the documented MAC order of preference to the actual one; ok dtucker@Christian Weisgerber
2012-06-28Remove hmac-sha2-256-96 and hmac-sha2-512-96 MACs since they were removedDarren Tucker
from draft6 of the spec and will not be in the RFC when published. Patch from mdb at juniper net via bz#2023, ok markus.
2012-06-18RSA instead of DSA twice. From Steve.McClellan at radisys comDarren Tucker
2011-09-09fix typo in IPQoS parsing: there is no "AF14" class, but there isDamien Miller
an "AF21" class. Spotted by giesen AT snickers.org; ok markus stevesk
2011-08-02Add new SHA256 and SHA512 based HMAC modes fromDamien Miller
http://www.ietf.org/id/draft-dbider-sha2-mac-for-ssh-02.txt feedback and ok markus@
2011-06-04explain IdentifyFile's semantics a little better, prompted by bz#1898Damien Miller
ok dtucker jmc
2011-05-24Remove undocumented legacy options UserKnownHostsFile2 andDamien Miller
GlobalKnownHostsFile2 by making UserKnownHostsFile/GlobalKnownHostsFile accept multiple paths per line and making their defaults include known_hosts2; ok markus
2011-05-07- tweak previousJason McIntyre
- come consistency fixes ok djm
2011-05-06Add a RequestTTY ssh_config option to allow configuration-basedDamien Miller
control over tty allocation (like -t/-T); ok markus@
2011-05-06support negated Host matching, e.g.Damien Miller
Host *.example.org !c.example.org User mekmitasdigoat Will match "a.example.org", "b.example.org", but not "c.example.org" ok markus@
2011-05-06add a %L expansion (short-form of the local host name) for ControlPath;Damien Miller
sync some more expansions with LocalCommand; ok markus@
2010-12-08explain that IPQoS arguments are separated by whitespace; iirc requestedDamien Miller
by jmc@ a while back CVS ----------------------------------------------------------------------
2010-11-29automatically order the hostkeys requested by the client based onDamien Miller
which hostkeys are already recorded in known_hosts. This avoids hostkey warnings when connecting to servers with new ECDSA keys that are preferred by default; with markus@
2010-11-15libary -> library;Jason McIntyre
2010-11-13allow ssh and sshd to set arbitrary TOS/DSCP/QoS values instead ofDamien Miller
hardcoding lowdelay/throughput. bz#1733 patch from philipp AT redfish-solutions.com; ok markus@ deraadt@
2010-10-28knock out some "-*- nroff -*-" lines;Jason McIntyre
2010-09-22ssh.1: add kexalgorithms to the -o listJason McIntyre
ssh_config.5: format the kexalgorithms in a more consistent (prettier!) way ok djm
2010-09-22add a KexAlgorithms knob to the client and server configuration to allowDamien Miller
selection of which key exchange methods are used by ssh(1) and sshd(8) and their order of preference. ok markus@
2010-08-31Implement Elliptic Curve Cryptography modes for key exchange (ECDH) andDamien Miller
host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer better performance than plain DH and DSA at the same equivalent symmetric key length, as well as much shorter keys. Only the mandatory sections of RFC5656 are implemented, specifically the three REQUIRED curves nistp256, nistp384 and nistp521 and only ECDH and ECDSA. Point compression (optional in RFC5656 is NOT implemented). Certificate host and user keys using the new ECDSA key types are supported. Note that this code has not been tested for interoperability and may be subject to change. feedback and ok markus@
2010-08-04Remove mentions of weird "addr/port" alternate address format for IPv6Damien Miller
addresses combinations. It hasn't worked for ages and we have supported the more commen "[addr]:port" format for a long time. ok jmc@ markus@
2010-07-19add a "ControlPersist" option that automatically starts a backgroundDamien Miller
ssh(1) multiplex master when connecting. This connection can stay alive indefinitely, or can be set to automatically close after a user-specified duration of inactivity. bz#1330 - patch by dwmw2 AT infradead.org, but further hacked on by wmertens AT cisco.com, apb AT cequrux.com, martin-mindrot-bugzilla AT earth.li and myself; "looks ok" markus@
2010-07-12expand %h to the hostname in ssh_config Hostname options. While thisDamien Miller
sounds useless, it is actually handy for working with unqualified hostnames: Host *.* Hostname %h Host * Hostname %h.example.org "I like it" markus@
2010-06-26tweak previous;Jason McIntyre
2010-06-25Add X11ForwardTimeout option to specify timeout for untrusted X11Damien Miller
authentication cookies to avoid fallback in X11 code to fully-trusted implicit authentication using SO_PEERCRED described at: http://lists.x.org/archives/xorg-devel/2010-May/008636.html After the X11ForwardTimeout has expired the client will now refuse incoming X11 channel opens. based on patch from Tavis Ormandy; "nice" markus@
2010-04-16tweak previous; ok djmJason McIntyre
2010-04-14expand %r => remote username in ssh_config:ProxyCommand;Damien Miller
ok deraadt markus
2010-03-27tweak previous; ok dtuckerJason McIntyre
2010-03-26Reformat default value of PreferredAuthentications entry (current formattingDarren Tucker
implies ", " is acceptable as a separator, which it's not. ok djm@
2010-03-05mention loading of certificate files from [private]-cert.pub whenDamien Miller
they are present; feedback and ok jmc@
2010-02-10pkcs#11 is no longer optional; improve wording; ok jmc@Markus Friedl
2010-02-08replace our obsolete smartcard code with PKCS#11.Markus Friedl
ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-11/v2-20/pkcs-11v2-20.pdf ssh(1) and ssh-keygen(1) use dlopen(3) directly to talk to a PKCS#11 provider (shared library) while ssh-agent(1) delegates PKCS#11 to a forked a ssh-pkcs11-helper process. PKCS#11 is currently a compile time option. feedback and ok djm@; inspired by patches from Alon Bar-Lev
2010-01-09Remove RoutingDomain from ssh since it's now not needed. It can be replacedDarren Tucker
with "route exec" or "nc -V" as a proxycommand. "route exec" also ensures that trafic such as DNS lookups stays withing the specified routingdomain. For example (from reyk): # route -T 2 exec /usr/sbin/sshd or inherited from the parent process $ route -T 2 exec sh $ ssh 10.1.2.3 ok deraadt@ markus@ stevesk@ reyk@
2009-12-29sort previous;Jason McIntyre
2009-12-29Rename RDomain config option to RoutingDomain to be more clear andKevin Steves
consistent with other options. NOTE: if you currently use RDomain in the ssh client or server config, or ssh/sshd -o, you must update to use RoutingDomain. ok markus@ djm@
2009-11-10explain the constraints on LocalCommand some more so people don'tDamien Miller
try to abuse it.
2009-10-28Allow to set the rdomain in ssh/sftp/scp/sshd and ssh-keyscan.Reyk Floeter
ok markus@
2009-10-08some tweaks now that protocol 1 is not offered by default; ok markusJason McIntyre
2009-10-08disable protocol 1 by default (after a transition period of about 10 years)Markus Friedl
ok deraadt
2009-02-22don't advertise experimental optionsDamien Miller
2009-02-12kill trailing whitespace;Jason McIntyre
2009-02-12document RemoteForward usage with 0 listen portDamien Miller