]> andersk Git - gssapi-openssh.git/blame - openssh/sshd_config.5
re-fix old bug, re-introduced on re-merge of Simon's code:
[gssapi-openssh.git] / openssh / sshd_config.5
CommitLineData
884dc78b 1.\" -*- nroff -*-
2.\"
3.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5.\" All rights reserved
6.\"
7.\" As far as I am concerned, the code I have written for this software
8.\" can be used freely for any purpose. Any derived versions of this
9.\" software must be clearly marked as such, and if the derived work is
10.\" incompatible with the protocol description in the RFC file, it must be
11.\" called by a name other than "ssh" or "Secure Shell".
12.\"
13.\" Copyright (c) 1999,2000 Markus Friedl. All rights reserved.
14.\" Copyright (c) 1999 Aaron Campbell. All rights reserved.
15.\" Copyright (c) 1999 Theo de Raadt. All rights reserved.
16.\"
17.\" Redistribution and use in source and binary forms, with or without
18.\" modification, are permitted provided that the following conditions
19.\" are met:
20.\" 1. Redistributions of source code must retain the above copyright
21.\" notice, this list of conditions and the following disclaimer.
22.\" 2. Redistributions in binary form must reproduce the above copyright
23.\" notice, this list of conditions and the following disclaimer in the
24.\" documentation and/or other materials provided with the distribution.
25.\"
26.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
27.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
28.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
29.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
30.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
31.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
32.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
33.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\"
540d72c3 37.\" $OpenBSD: sshd_config.5,v 1.28 2004/02/17 19:35:21 jmc Exp $
884dc78b 38.Dd September 25, 1999
39.Dt SSHD_CONFIG 5
40.Os
41.Sh NAME
42.Nm sshd_config
43.Nd OpenSSH SSH daemon configuration file
44.Sh SYNOPSIS
45.Bl -tag -width Ds -compact
46.It Pa /etc/ssh/sshd_config
47.El
48.Sh DESCRIPTION
49.Nm sshd
50reads configuration data from
51.Pa /etc/ssh/sshd_config
52(or the file specified with
53.Fl f
54on the command line).
55The file contains keyword-argument pairs, one per line.
56Lines starting with
57.Ql #
58and empty lines are interpreted as comments.
59.Pp
60The possible
61keywords and their meanings are as follows (note that
62keywords are case-insensitive and arguments are case-sensitive):
63.Bl -tag -width Ds
884dc78b 64.It Cm AllowGroups
65This keyword can be followed by a list of group name patterns, separated
66by spaces.
67If specified, login is allowed only for users whose primary
68group or supplementary group list matches one of the patterns.
69.Ql \&*
70and
7cac2b65 71.Ql \&?
884dc78b 72can be used as
73wildcards in the patterns.
74Only group names are valid; a numerical group ID is not recognized.
75By default, login is allowed for all groups.
76.Pp
77.It Cm AllowTcpForwarding
78Specifies whether TCP forwarding is permitted.
79The default is
80.Dq yes .
81Note that disabling TCP forwarding does not improve security unless
82users are also denied shell access, as they can always install their
83own forwarders.
84.Pp
85.It Cm AllowUsers
86This keyword can be followed by a list of user name patterns, separated
87by spaces.
bfe49944 88If specified, login is allowed only for user names that
884dc78b 89match one of the patterns.
90.Ql \&*
91and
7cac2b65 92.Ql \&?
884dc78b 93can be used as
94wildcards in the patterns.
95Only user names are valid; a numerical user ID is not recognized.
96By default, login is allowed for all users.
97If the pattern takes the form USER@HOST then USER and HOST
98are separately checked, restricting logins to particular
99users from particular hosts.
100.Pp
101.It Cm AuthorizedKeysFile
102Specifies the file that contains the public keys that can be used
103for user authentication.
104.Cm AuthorizedKeysFile
105may contain tokens of the form %T which are substituted during connection
7cac2b65 106set-up.
107The following tokens are defined: %% is replaced by a literal '%',
884dc78b 108%h is replaced by the home directory of the user being authenticated and
109%u is replaced by the username of that user.
110After expansion,
111.Cm AuthorizedKeysFile
112is taken to be an absolute path or one relative to the user's home
113directory.
114The default is
115.Dq .ssh/authorized_keys .
116.It Cm Banner
117In some jurisdictions, sending a warning message before authentication
118may be relevant for getting legal protection.
119The contents of the specified file are sent to the remote user before
120authentication is allowed.
121This option is only available for protocol version 2.
122By default, no banner is displayed.
123.Pp
124.It Cm ChallengeResponseAuthentication
125Specifies whether challenge response authentication is allowed.
126All authentication styles from
127.Xr login.conf 5
128are supported.
129The default is
130.Dq yes .
131.It Cm Ciphers
132Specifies the ciphers allowed for protocol version 2.
133Multiple ciphers must be comma-separated.
134The default is
135.Pp
136.Bd -literal
137 ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,
7cac2b65 138 aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr''
884dc78b 139.Ed
140.It Cm ClientAliveInterval
141Sets a timeout interval in seconds after which if no data has been received
142from the client,
143.Nm sshd
144will send a message through the encrypted
145channel to request a response from the client.
146The default
147is 0, indicating that these messages will not be sent to the client.
148This option applies to protocol version 2 only.
149.It Cm ClientAliveCountMax
150Sets the number of client alive messages (see above) which may be
151sent without
152.Nm sshd
7cac2b65 153receiving any messages back from the client.
154If this threshold is reached while client alive messages are being sent,
884dc78b 155.Nm sshd
7cac2b65 156will disconnect the client, terminating the session.
157It is important to note that the use of client alive messages is very
158different from
540d72c3 159.Cm TCPKeepAlive
7cac2b65 160(below).
161The client alive messages are sent through the encrypted channel
162and therefore will not be spoofable.
163The TCP keepalive option enabled by
540d72c3 164.Cm TCPKeepAlive
7cac2b65 165is spoofable.
166The client alive mechanism is valuable when the client or
884dc78b 167server depend on knowing when a connection has become inactive.
168.Pp
7cac2b65 169The default value is 3.
170If
884dc78b 171.Cm ClientAliveInterval
172(above) is set to 15, and
173.Cm ClientAliveCountMax
174is left at the default, unresponsive ssh clients
175will be disconnected after approximately 45 seconds.
176.It Cm Compression
177Specifies whether compression is allowed.
178The argument must be
179.Dq yes
180or
181.Dq no .
182The default is
183.Dq yes .
184.It Cm DenyGroups
185This keyword can be followed by a list of group name patterns, separated
186by spaces.
187Login is disallowed for users whose primary group or supplementary
188group list matches one of the patterns.
189.Ql \&*
190and
7cac2b65 191.Ql \&?
884dc78b 192can be used as
193wildcards in the patterns.
194Only group names are valid; a numerical group ID is not recognized.
195By default, login is allowed for all groups.
196.Pp
197.It Cm DenyUsers
198This keyword can be followed by a list of user name patterns, separated
199by spaces.
200Login is disallowed for user names that match one of the patterns.
201.Ql \&*
202and
7cac2b65 203.Ql \&?
884dc78b 204can be used as wildcards in the patterns.
205Only user names are valid; a numerical user ID is not recognized.
206By default, login is allowed for all users.
207If the pattern takes the form USER@HOST then USER and HOST
208are separately checked, restricting logins to particular
209users from particular hosts.
210.It Cm GatewayPorts
211Specifies whether remote hosts are allowed to connect to ports
212forwarded for the client.
213By default,
214.Nm sshd
bfe49944 215binds remote port forwardings to the loopback address.
216This prevents other remote hosts from connecting to forwarded ports.
884dc78b 217.Cm GatewayPorts
218can be used to specify that
219.Nm sshd
220should bind remote port forwardings to the wildcard address,
221thus allowing remote hosts to connect to forwarded ports.
222The argument must be
223.Dq yes
224or
225.Dq no .
226The default is
227.Dq no .
7cac2b65 228.It Cm GSSAPIAuthentication
229Specifies whether user authentication based on GSSAPI is allowed.
540d72c3 230The default is
c5448518 231.Dq yes .
7cac2b65 232Note that this option applies to protocol version 2 only.
94b7f692 233.It Cm GSSAPICleanupCredentials
7cac2b65 234Specifies whether to automatically destroy the user's credentials cache
235on logout.
236The default is
237.Dq yes .
238Note that this option applies to protocol version 2 only.
c5448518 239.It Cm GSSAPIKeyExchange
44a053a3 240Specifies whether key exchange based on GSSAPI may be used. When using
241GSSAPI key exchange the server need not have a host key.
242The default is
243.Dq yes .
c5448518 244Note that this option applies to protocol version 2 only.
245.It Cm GSSAPIUseSessionCredCache
44a053a3 246Specifies whether a unique credentials cache name should be generated per
247session for storing delegated credentials.
248The default is
249.Dq yes .
c5448518 250Note that this option applies to protocol version 2 only.
251.It Cm HostbasedAuthentication
252Specifies whether rhosts or /etc/hosts.equiv authentication together
253with successful public key client host authentication is allowed
254(hostbased authentication).
255This option is similar to
256.Cm RhostsRSAAuthentication
257and applies to protocol version 2 only.
52b36949 258The default is
c5448518 259.Dq no .
884dc78b 260.It Cm HostKey
261Specifies a file containing a private host key
262used by SSH.
263The default is
264.Pa /etc/ssh/ssh_host_key
265for protocol version 1, and
266.Pa /etc/ssh/ssh_host_rsa_key
267and
268.Pa /etc/ssh/ssh_host_dsa_key
269for protocol version 2.
270Note that
271.Nm sshd
272will refuse to use a file if it is group/world-accessible.
273It is possible to have multiple host key files.
274.Dq rsa1
275keys are used for version 1 and
276.Dq dsa
277or
278.Dq rsa
279are used for version 2 of the SSH protocol.
280.It Cm IgnoreRhosts
281Specifies that
282.Pa .rhosts
283and
284.Pa .shosts
285files will not be used in
884dc78b 286.Cm RhostsRSAAuthentication
287or
288.Cm HostbasedAuthentication .
289.Pp
290.Pa /etc/hosts.equiv
291and
292.Pa /etc/shosts.equiv
293are still used.
294The default is
295.Dq yes .
296.It Cm IgnoreUserKnownHosts
297Specifies whether
298.Nm sshd
299should ignore the user's
300.Pa $HOME/.ssh/known_hosts
301during
302.Cm RhostsRSAAuthentication
303or
304.Cm HostbasedAuthentication .
305The default is
306.Dq no .
884dc78b 307.It Cm KerberosAuthentication
7cac2b65 308Specifies whether the password provided by the user for
884dc78b 309.Cm PasswordAuthentication
7cac2b65 310will be validated through the Kerberos KDC.
884dc78b 311To use this option, the server needs a
312Kerberos servtab which allows the verification of the KDC's identity.
313Default is
314.Dq no .
315.It Cm KerberosOrLocalPasswd
316If set then if password authentication through Kerberos fails then
317the password will be validated via any additional local mechanism
318such as
319.Pa /etc/passwd .
320Default is
321.Dq yes .
884dc78b 322.It Cm KerberosTicketCleanup
323Specifies whether to automatically destroy the user's ticket cache
324file on logout.
325Default is
326.Dq yes .
327.It Cm KeyRegenerationInterval
328In protocol version 1, the ephemeral server key is automatically regenerated
329after this many seconds (if it has been used).
330The purpose of regeneration is to prevent
331decrypting captured sessions by later breaking into the machine and
332stealing the keys.
333The key is never stored anywhere.
334If the value is 0, the key is never regenerated.
335The default is 3600 (seconds).
336.It Cm ListenAddress
337Specifies the local addresses
338.Nm sshd
339should listen on.
340The following forms may be used:
341.Pp
342.Bl -item -offset indent -compact
343.It
344.Cm ListenAddress
345.Sm off
346.Ar host No | Ar IPv4_addr No | Ar IPv6_addr
347.Sm on
348.It
349.Cm ListenAddress
350.Sm off
351.Ar host No | Ar IPv4_addr No : Ar port
352.Sm on
353.It
354.Cm ListenAddress
355.Sm off
356.Oo
357.Ar host No | Ar IPv6_addr Oc : Ar port
358.Sm on
359.El
360.Pp
361If
362.Ar port
363is not specified,
364.Nm sshd
365will listen on the address and all prior
366.Cm Port
7cac2b65 367options specified.
368The default is to listen on all local addresses.
bfe49944 369Multiple
884dc78b 370.Cm ListenAddress
7cac2b65 371options are permitted.
372Additionally, any
884dc78b 373.Cm Port
374options must precede this option for non port qualified addresses.
375.It Cm LoginGraceTime
376The server disconnects after this time if the user has not
377successfully logged in.
378If the value is 0, there is no time limit.
d03f4262 379The default is 120 seconds.
884dc78b 380.It Cm LogLevel
381Gives the verbosity level that is used when logging messages from
382.Nm sshd .
383The possible values are:
384QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3.
bfe49944 385The default is INFO.
386DEBUG and DEBUG1 are equivalent.
387DEBUG2 and DEBUG3 each specify higher levels of debugging output.
388Logging with a DEBUG level violates the privacy of users and is not recommended.
884dc78b 389.It Cm MACs
390Specifies the available MAC (message authentication code) algorithms.
391The MAC algorithm is used in protocol version 2
392for data integrity protection.
393Multiple algorithms must be comma-separated.
394The default is
395.Dq hmac-md5,hmac-sha1,hmac-ripemd160,hmac-sha1-96,hmac-md5-96 .
396.It Cm MaxStartups
397Specifies the maximum number of concurrent unauthenticated connections to the
398.Nm sshd
399daemon.
400Additional connections will be dropped until authentication succeeds or the
401.Cm LoginGraceTime
402expires for a connection.
403The default is 10.
404.Pp
405Alternatively, random early drop can be enabled by specifying
406the three colon separated values
407.Dq start:rate:full
408(e.g., "10:30:60").
409.Nm sshd
410will refuse connection attempts with a probability of
411.Dq rate/100
412(30%)
413if there are currently
414.Dq start
415(10)
416unauthenticated connections.
417The probability increases linearly and all connection attempts
418are refused if the number of unauthenticated connections reaches
419.Dq full
420(60).
421.It Cm PasswordAuthentication
422Specifies whether password authentication is allowed.
423The default is
424.Dq yes .
425.It Cm PermitEmptyPasswords
426When password authentication is allowed, it specifies whether the
427server allows login to accounts with empty password strings.
428The default is
429.Dq no .
430.It Cm PermitRootLogin
431Specifies whether root can login using
432.Xr ssh 1 .
433The argument must be
434.Dq yes ,
435.Dq without-password ,
436.Dq forced-commands-only
437or
438.Dq no .
439The default is
440.Dq yes .
441.Pp
442If this option is set to
443.Dq without-password
444password authentication is disabled for root.
445.Pp
446If this option is set to
447.Dq forced-commands-only
448root login with public key authentication will be allowed,
449but only if the
450.Ar command
451option has been specified
452(which may be useful for taking remote backups even if root login is
7cac2b65 453normally not allowed).
454All other authentication methods are disabled for root.
884dc78b 455.Pp
456If this option is set to
457.Dq no
458root is not allowed to login.
d03f4262 459.It Cm PermitUserEnvironment
460Specifies whether
461.Pa ~/.ssh/environment
462and
463.Cm environment=
464options in
465.Pa ~/.ssh/authorized_keys
466are processed by
467.Nm sshd .
468The default is
469.Dq no .
470Enabling environment processing may enable users to bypass access
471restrictions in some configurations using mechanisms such as
472.Ev LD_PRELOAD .
884dc78b 473.It Cm PidFile
276b07a3 474Specifies the file that contains the process ID of the
884dc78b 475.Nm sshd
476daemon.
477The default is
478.Pa /var/run/sshd.pid .
479.It Cm Port
480Specifies the port number that
481.Nm sshd
482listens on.
483The default is 22.
484Multiple options of this type are permitted.
485See also
486.Cm ListenAddress .
487.It Cm PrintLastLog
488Specifies whether
489.Nm sshd
490should print the date and time when the user last logged in.
491The default is
492.Dq yes .
493.It Cm PrintMotd
494Specifies whether
495.Nm sshd
496should print
497.Pa /etc/motd
498when a user logs in interactively.
499(On some systems it is also printed by the shell,
500.Pa /etc/profile ,
501or equivalent.)
502The default is
503.Dq yes .
504.It Cm Protocol
505Specifies the protocol versions
506.Nm sshd
d03f4262 507supports.
884dc78b 508The possible values are
509.Dq 1
510and
511.Dq 2 .
512Multiple versions must be comma-separated.
513The default is
514.Dq 2,1 .
d03f4262 515Note that the order of the protocol list does not indicate preference,
516because the client selects among multiple protocol versions offered
517by the server.
518Specifying
519.Dq 2,1
520is identical to
521.Dq 1,2 .
884dc78b 522.It Cm PubkeyAuthentication
523Specifies whether public key authentication is allowed.
524The default is
525.Dq yes .
526Note that this option applies to protocol version 2 only.
884dc78b 527.It Cm RhostsRSAAuthentication
528Specifies whether rhosts or /etc/hosts.equiv authentication together
529with successful RSA host authentication is allowed.
530The default is
531.Dq no .
532This option applies to protocol version 1 only.
533.It Cm RSAAuthentication
534Specifies whether pure RSA authentication is allowed.
535The default is
536.Dq yes .
537This option applies to protocol version 1 only.
538.It Cm ServerKeyBits
539Defines the number of bits in the ephemeral protocol version 1 server key.
540The minimum value is 512, and the default is 768.
541.It Cm StrictModes
542Specifies whether
543.Nm sshd
544should check file modes and ownership of the
545user's files and home directory before accepting login.
546This is normally desirable because novices sometimes accidentally leave their
547directory or files world-writable.
548The default is
549.Dq yes .
550.It Cm Subsystem
551Configures an external subsystem (e.g., file transfer daemon).
552Arguments should be a subsystem name and a command to execute upon subsystem
553request.
554The command
555.Xr sftp-server 8
556implements the
557.Dq sftp
558file transfer subsystem.
559By default no subsystems are defined.
560Note that this option applies to protocol version 2 only.
561.It Cm SyslogFacility
562Gives the facility code that is used when logging messages from
563.Nm sshd .
564The possible values are: DAEMON, USER, AUTH, LOCAL0, LOCAL1, LOCAL2,
565LOCAL3, LOCAL4, LOCAL5, LOCAL6, LOCAL7.
566The default is AUTH.
540d72c3 567.It Cm TCPKeepAlive
568Specifies whether the system should send TCP keepalive messages to the
569other side.
570If they are sent, death of the connection or crash of one
571of the machines will be properly noticed.
572However, this means that
573connections will die if the route is down temporarily, and some people
574find it annoying.
575On the other hand, if TCP keepalives are not sent,
576sessions may hang indefinitely on the server, leaving
577.Dq ghost
578users and consuming server resources.
579.Pp
580The default is
581.Dq yes
582(to send TCP keepalive messages), and the server will notice
583if the network goes down or the client host crashes.
584This avoids infinitely hanging sessions.
585.Pp
586To disable TCP keepalive messages, the value should be set to
587.Dq no .
7cac2b65 588.It Cm UseDNS
589Specifies whether
590.Nm sshd
591should lookup the remote host name and check that
592the resolved host name for the remote IP address maps back to the
593very same IP address.
594The default is
595.Dq yes .
884dc78b 596.It Cm UseLogin
597Specifies whether
598.Xr login 1
599is used for interactive login sessions.
600The default is
601.Dq no .
602Note that
603.Xr login 1
604is never used for remote command execution.
605Note also, that if this is enabled,
606.Cm X11Forwarding
607will be disabled because
608.Xr login 1
609does not know how to handle
610.Xr xauth 1
bfe49944 611cookies.
612If
884dc78b 613.Cm UsePrivilegeSeparation
614is specified, it will be disabled after authentication.
7cac2b65 615.It Cm UsePAM
540d72c3 616Enables PAM authentication (via challenge-response) and session set up.
617If you enable this, you should probably disable
7cac2b65 618.Cm PasswordAuthentication .
540d72c3 619If you enable
7cac2b65 620.CM UsePAM
540d72c3 621then you will not be able to run sshd as a non-root user. The default is
622.Dq no .
884dc78b 623.It Cm UsePrivilegeSeparation
624Specifies whether
625.Nm sshd
626separates privileges by creating an unprivileged child process
bfe49944 627to deal with incoming network traffic.
628After successful authentication, another process will be created that has
629the privilege of the authenticated user.
630The goal of privilege separation is to prevent privilege
884dc78b 631escalation by containing any corruption within the unprivileged processes.
632The default is
633.Dq yes .
884dc78b 634.It Cm X11DisplayOffset
635Specifies the first display number available for
636.Nm sshd Ns 's
637X11 forwarding.
638This prevents
639.Nm sshd
640from interfering with real X11 servers.
641The default is 10.
642.It Cm X11Forwarding
643Specifies whether X11 forwarding is permitted.
d03f4262 644The argument must be
645.Dq yes
646or
647.Dq no .
884dc78b 648The default is
649.Dq no .
d03f4262 650.Pp
651When X11 forwarding is enabled, there may be additional exposure to
652the server and to client displays if the
653.Nm sshd
654proxy display is configured to listen on the wildcard address (see
655.Cm X11UseLocalhost
656below), however this is not the default.
657Additionally, the authentication spoofing and authentication data
658verification and substitution occur on the client side.
659The security risk of using X11 forwarding is that the client's X11
660display server may be exposed to attack when the ssh client requests
661forwarding (see the warnings for
662.Cm ForwardX11
663in
7cac2b65 664.Xr ssh_config 5 ) .
d03f4262 665A system administrator may have a stance in which they want to
666protect clients that may expose themselves to attack by unwittingly
667requesting X11 forwarding, which can warrant a
668.Dq no
669setting.
670.Pp
671Note that disabling X11 forwarding does not prevent users from
672forwarding X11 traffic, as users can always install their own forwarders.
884dc78b 673X11 forwarding is automatically disabled if
674.Cm UseLogin
675is enabled.
676.It Cm X11UseLocalhost
677Specifies whether
678.Nm sshd
679should bind the X11 forwarding server to the loopback address or to
bfe49944 680the wildcard address.
681By default,
884dc78b 682.Nm sshd
683binds the forwarding server to the loopback address and sets the
684hostname part of the
685.Ev DISPLAY
686environment variable to
687.Dq localhost .
d03f4262 688This prevents remote hosts from connecting to the proxy display.
884dc78b 689However, some older X11 clients may not function with this
690configuration.
691.Cm X11UseLocalhost
692may be set to
693.Dq no
694to specify that the forwarding server should be bound to the wildcard
695address.
696The argument must be
697.Dq yes
698or
699.Dq no .
700The default is
701.Dq yes .
702.It Cm XAuthLocation
d03f4262 703Specifies the full pathname of the
884dc78b 704.Xr xauth 1
705program.
706The default is
707.Pa /usr/X11R6/bin/xauth .
708.El
709.Ss Time Formats
884dc78b 710.Nm sshd
711command-line arguments and configuration file options that specify time
712may be expressed using a sequence of the form:
713.Sm off
d03f4262 714.Ar time Op Ar qualifier ,
884dc78b 715.Sm on
716where
717.Ar time
718is a positive integer value and
719.Ar qualifier
720is one of the following:
721.Pp
722.Bl -tag -width Ds -compact -offset indent
723.It Cm <none>
724seconds
725.It Cm s | Cm S
726seconds
727.It Cm m | Cm M
728minutes
729.It Cm h | Cm H
730hours
731.It Cm d | Cm D
732days
733.It Cm w | Cm W
734weeks
735.El
736.Pp
737Each member of the sequence is added together to calculate
738the total time value.
739.Pp
740Time format examples:
741.Pp
742.Bl -tag -width Ds -compact -offset indent
743.It 600
744600 seconds (10 minutes)
745.It 10m
74610 minutes
747.It 1h30m
7481 hour 30 minutes (90 minutes)
749.El
750.Sh FILES
751.Bl -tag -width Ds
752.It Pa /etc/ssh/sshd_config
753Contains configuration data for
754.Nm sshd .
755This file should be writable by root only, but it is recommended
756(though not necessary) that it be world-readable.
757.El
7cac2b65 758.Sh SEE ALSO
759.Xr sshd 8
884dc78b 760.Sh AUTHORS
761OpenSSH is a derivative of the original and free
762ssh 1.2.12 release by Tatu Ylonen.
763Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos,
764Theo de Raadt and Dug Song
765removed many bugs, re-added newer features and
766created OpenSSH.
767Markus Friedl contributed the support for SSH
768protocol versions 1.5 and 2.0.
769Niels Provos and Markus Friedl contributed support
770for privilege separation.
This page took 0.352575 seconds and 5 git commands to generate.