summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/sshd_config.5
AgeCommit message (Collapse)Author
2010-12-08explain that IPQoS arguments are separated by whitespace; iirc requestedDamien Miller
by jmc@ a while back CVS ----------------------------------------------------------------------
2010-11-18add IPQoS to the various -o lists, and zap some trailing whitespace;Jason McIntyre
2010-11-13allow ssh and sshd to set arbitrary TOS/DSCP/QoS values instead ofDamien Miller
hardcoding lowdelay/throughput. bz#1733 patch from philipp AT redfish-solutions.com; ok markus@ deraadt@
2010-10-28knock out some "-*- nroff -*-" lines;Jason McIntyre
2010-09-22add a KexAlgorithms knob to the client and server configuration to allowDamien Miller
selection of which key exchange methods are used by ssh(1) and sshd(8) and their order of preference. ok markus@
2010-08-31Implement Elliptic Curve Cryptography modes for key exchange (ECDH) andDamien Miller
host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer better performance than plain DH and DSA at the same equivalent symmetric key length, as well as much shorter keys. Only the mandatory sections of RFC5656 are implemented, specifically the three REQUIRED curves nistp256, nistp384 and nistp521 and only ECDH and ECDSA. Point compression (optional in RFC5656 is NOT implemented). Certificate host and user keys using the new ECDSA key types are supported. Note that this code has not been tested for interoperability and may be subject to change. feedback and ok markus@
2010-06-30tweak previous;Jason McIntyre
2010-06-29allow key options (command="..." and friends) in AuthorizedPrincipals;Damien Miller
ok markus@
2010-06-22expose some more sshd_config options inside Match blocks:Damien Miller
AuthorizedKeysFile AuthorizedPrincipalsFile HostbasedUsesNameFromPacketOnly PermitTunnel bz#1764; feedback from imorgan AT nas.nasa.gov; ok dtucker@
2010-05-07tweak previous;Jason McIntyre
2010-05-07add some optional indirection to matching of principal names listedDamien Miller
in certificates. Currently, a certificate must include the a user's name to be accepted for authentication. This change adds the ability to specify a list of certificate principal names that are acceptable. When authenticating using a CA trusted through ~/.ssh/authorized_keys, this adds a new principals="name1[,name2,...]" key option. For CAs listed through sshd_config's TrustedCAKeys option, a new config option "AuthorizedPrincipalsFile" specifies a per-user file containing the list of acceptable names. If either option is absent, the current behaviour of requiring the username to appear in principals continues to apply. These options are useful for role accounts, disjoint account namespaces and "user@realm"-style naming policies in certificates. feedback and ok markus@
2010-03-04missing word; spotted by jmc@Damien Miller
2010-03-04tweak previous;Jason McIntyre
2010-03-04Add a TrustedUserCAKeys option to sshd_config to specify CA keys thatDamien Miller
are trusted to authenticate users (in addition than doing it per-user in authorized_keys). Add a RevokedKeys option to sshd_config and a @revoked marker to known_hosts to allow keys to me revoked and banned for user or host authentication. feedback and ok markus@
2010-02-26Add support for certificate key types for users and hosts.Damien Miller
OpenSSH certificate key types are not X.509 certificates, but a much simpler format that encodes a public key, identity information and some validity constraints and signs it with a CA key. CA keys are regular SSH keys. This certificate style avoids the attack surface of X.509 certificates and is very easy to deploy. Certified host keys allow automatic acceptance of new host keys when a CA certificate is marked as trusted in ~/.ssh/known_hosts. see VERIFYING HOST KEYS in ssh(1) for details. Certified user keys allow authentication of users when the signing CA key is marked as trusted in authorized_keys. See "AUTHORIZED_KEYS FILE FORMAT" in sshd(8) for details. Certificates are minted using ssh-keygen(1), documentation is in the "CERTIFICATES" section of that manpage. Documentation on the format of certificates is in the file PROTOCOL.certkeys feedback and ok markus@
2010-01-09Remove RoutingDomain from ssh since it's now not needed. It can be replacedDarren Tucker
with "route exec" or "nc -V" as a proxycommand. "route exec" also ensures that trafic such as DNS lookups stays withing the specified routingdomain. For example (from reyk): # route -T 2 exec /usr/sbin/sshd or inherited from the parent process $ route -T 2 exec sh $ ssh 10.1.2.3 ok deraadt@ markus@ stevesk@ reyk@
2009-12-29sort previous;Jason McIntyre
2009-12-29Rename RDomain config option to RoutingDomain to be more clear andKevin Steves
consistent with other options. NOTE: if you currently use RDomain in the ssh client or server config, or ssh/sshd -o, you must update to use RoutingDomain. ok markus@ djm@
2009-12-19try to clarify ChrootDirectory pathname argument a bit; resulting fromKevin Steves
a question on openssh-unix-dev. ok jmc@
2009-11-10clarify that StrictModes does not apply to ChrootDirectory. PermissionsDamien Miller
and ownership are always checked when chrooting. bz#1532
2009-10-28tweak previous;Jason McIntyre
2009-10-28Allow to set the rdomain in ssh/sftp/scp/sshd and ssh-keyscan.Reyk Floeter
ok markus@
2009-10-08some tweaks now that protocol 1 is not offered by default; ok markusJason McIntyre
2009-10-08disable protocol 1 by default (after a transition period of about 10 years)Markus Friedl
ok deraadt
2009-08-16Add PubkeyAuthentication to the list allowed in a Match block (bz #1577)Darren Tucker
2009-04-21clarify we cd to user's home after chroot; ok markus@ onKevin Steves
earlier version; tweaks and ok jmc@
2009-04-18tweak previous; ok steveskJason McIntyre
2009-04-17clarify that even internal-sftp needs /dev/log for logging to work; okKevin Steves
markus@
2009-04-13fix possessive; ok djm@Kevin Steves
2009-02-22missing periodDamien Miller
2009-02-22don't advertise experimental optionsDamien Miller
2009-01-24sync list of preferred ciphers; ok djm@Christian Weisgerber
2008-12-30add AllowAgentForwarding to available Match keywords listOkan Demirmen
ok djm
2008-11-04Add support for an experimental zero-knowledge password authenticationDamien Miller
method using the J-PAKE protocol described in F. Hao, P. Ryan, "Password Authenticated Key Exchange by Juggling", 16th Workshop on Security Protocols, Cambridge, April 2008. This method allows password-based authentication without exposing the password to the server. Instead, the client and server exchange cryptographic proofs to demonstrate of knowledge of the password while revealing nothing useful to an attacker or compromised endpoint. This is experimental, work-in-progress code and is presently compiled-time disabled (turn on -DJPAKE in Makefile.inc). "just commit it. It isn't too intrusive." deraadt@
2008-10-09support setting PermitEmptyPasswords in a Match blockDamien Miller
requested in PR3891; ok dtucker@
2008-07-02increase default size of ssh protocol 1 ephemeral key from 768 to 1024Damien Miller
bits; prodded by & ok dtucker@ ok deraadt@
2008-06-15Allow MaxAuthTries within a Match block. ok djm@Darren Tucker
2008-06-15MaxSessions is allowed in a Match block tooDarren Tucker
2008-06-10tweak previous;Jason McIntyre
2008-06-10better reference for pattern-listDamien Miller
2008-06-10support CIDR address matching in sshd_config "Match address" blocks, withDamien Miller
full support for negation and fall-back to classic wildcard matching. For example: Match address 192.0.2.0/24,3ffe:ffff::/32,!10.* PasswordAuthentication yes addrmatch.c code mostly lifted from flowd's addr.c feedback and ok dtucker@
2008-05-08Make the maximum number of sessions run-time controllable viaDamien Miller
a sshd_config MaxSessions knob. This is useful for disabling login/shell/subsystem access while leaving port-forwarding working (MaxSessions 0), disabling connection multiplexing (MaxSessions 1) or simply increasing the number of allows multiplexed sessions. Because some bozos are sure to configure MaxSessions in excess of the number of available file descriptors in sshd (which, at peak, might be as many as 9*MaxSessions), audit sshd to ensure that it doesn't leak fds on error paths, and make it fail gracefully on out-of-fd conditions - sending channel errors instead of than exiting with fatal(). bz#1090; MaxSessions config bits and manpage from junyer AT gmail.com ok markus@
2008-05-07sort;Jason McIntyre
2008-05-07Enable the AllowAgentForwarding option in sshd_config (global and matchPierre-Yves Ritschard
context), to specify if agents should be permitted on the server. As the man page states: ``Note that disabling Agent forwarding does not improve security unless users are also denied shell access, as they can always install their own forwarders.'' ok djm@, ok and a mild frown markus@
2008-04-05HostbasedAuthentication is supported under Match tooDamien Miller
2008-04-04oops, some unrelated stuff crept into that commit - backout.Damien Miller
spotted by jmc@
2008-04-04ChrootDirectory is supported in Match blocks (in fact, it is most usefulDamien Miller
there). Spotted by Minstrel AT minstrel.org.uk
2008-03-25ignore ~/.ssh/rc if a sshd_config ForceCommand is specified;Damien Miller
from dtucker@ ok deraadt@ djm@
2008-02-11bump Mdocdate for pages committed in "febuary", necessary becauseJason McIntyre
of a typo in rcs.c;
2008-02-10mantion that "internal-sftp" is useful with ForceCommand tooDamien Miller