]> andersk Git - gssapi-openssh.git/blame - openssh/sshd_config.5
OPENSSH_3_8_1P1_GSSAPI_20040629 merged to gpt-branch
[gssapi-openssh.git] / openssh / sshd_config.5
CommitLineData
ff2d7a98 1.\" -*- nroff -*-
2.\"
3.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5.\" All rights reserved
6.\"
7.\" As far as I am concerned, the code I have written for this software
8.\" can be used freely for any purpose. Any derived versions of this
9.\" software must be clearly marked as such, and if the derived work is
10.\" incompatible with the protocol description in the RFC file, it must be
11.\" called by a name other than "ssh" or "Secure Shell".
12.\"
13.\" Copyright (c) 1999,2000 Markus Friedl. All rights reserved.
14.\" Copyright (c) 1999 Aaron Campbell. All rights reserved.
15.\" Copyright (c) 1999 Theo de Raadt. All rights reserved.
16.\"
17.\" Redistribution and use in source and binary forms, with or without
18.\" modification, are permitted provided that the following conditions
19.\" are met:
20.\" 1. Redistributions of source code must retain the above copyright
21.\" notice, this list of conditions and the following disclaimer.
22.\" 2. Redistributions in binary form must reproduce the above copyright
23.\" notice, this list of conditions and the following disclaimer in the
24.\" documentation and/or other materials provided with the distribution.
25.\"
26.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
27.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
28.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
29.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
30.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
31.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
32.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
33.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\"
2a304a95 37.\" $OpenBSD: sshd_config.5,v 1.29 2004/03/08 10:18:57 dtucker Exp $
ff2d7a98 38.Dd September 25, 1999
39.Dt SSHD_CONFIG 5
40.Os
41.Sh NAME
42.Nm sshd_config
43.Nd OpenSSH SSH daemon configuration file
44.Sh SYNOPSIS
45.Bl -tag -width Ds -compact
46.It Pa /etc/ssh/sshd_config
47.El
48.Sh DESCRIPTION
49.Nm sshd
50reads configuration data from
51.Pa /etc/ssh/sshd_config
52(or the file specified with
53.Fl f
54on the command line).
55The file contains keyword-argument pairs, one per line.
56Lines starting with
57.Ql #
58and empty lines are interpreted as comments.
59.Pp
60The possible
61keywords and their meanings are as follows (note that
62keywords are case-insensitive and arguments are case-sensitive):
63.Bl -tag -width Ds
ff2d7a98 64.It Cm AllowGroups
65This keyword can be followed by a list of group name patterns, separated
66by spaces.
67If specified, login is allowed only for users whose primary
68group or supplementary group list matches one of the patterns.
69.Ql \&*
70and
70791e56 71.Ql \&?
ff2d7a98 72can be used as
73wildcards in the patterns.
74Only group names are valid; a numerical group ID is not recognized.
75By default, login is allowed for all groups.
76.Pp
77.It Cm AllowTcpForwarding
78Specifies whether TCP forwarding is permitted.
79The default is
80.Dq yes .
81Note that disabling TCP forwarding does not improve security unless
82users are also denied shell access, as they can always install their
83own forwarders.
84.Pp
85.It Cm AllowUsers
86This keyword can be followed by a list of user name patterns, separated
87by spaces.
1c14df9e 88If specified, login is allowed only for user names that
ff2d7a98 89match one of the patterns.
90.Ql \&*
91and
70791e56 92.Ql \&?
ff2d7a98 93can be used as
94wildcards in the patterns.
95Only user names are valid; a numerical user ID is not recognized.
96By default, login is allowed for all users.
97If the pattern takes the form USER@HOST then USER and HOST
98are separately checked, restricting logins to particular
99users from particular hosts.
100.Pp
101.It Cm AuthorizedKeysFile
102Specifies the file that contains the public keys that can be used
103for user authentication.
104.Cm AuthorizedKeysFile
105may contain tokens of the form %T which are substituted during connection
70791e56 106set-up.
107The following tokens are defined: %% is replaced by a literal '%',
ff2d7a98 108%h is replaced by the home directory of the user being authenticated and
109%u is replaced by the username of that user.
110After expansion,
111.Cm AuthorizedKeysFile
112is taken to be an absolute path or one relative to the user's home
113directory.
114The default is
115.Dq .ssh/authorized_keys .
116.It Cm Banner
117In some jurisdictions, sending a warning message before authentication
118may be relevant for getting legal protection.
119The contents of the specified file are sent to the remote user before
120authentication is allowed.
121This option is only available for protocol version 2.
122By default, no banner is displayed.
123.Pp
124.It Cm ChallengeResponseAuthentication
125Specifies whether challenge response authentication is allowed.
126All authentication styles from
127.Xr login.conf 5
128are supported.
129The default is
130.Dq yes .
131.It Cm Ciphers
132Specifies the ciphers allowed for protocol version 2.
133Multiple ciphers must be comma-separated.
134The default is
135.Pp
136.Bd -literal
137 ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,
70791e56 138 aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr''
ff2d7a98 139.Ed
140.It Cm ClientAliveInterval
141Sets a timeout interval in seconds after which if no data has been received
142from the client,
143.Nm sshd
144will send a message through the encrypted
145channel to request a response from the client.
146The default
147is 0, indicating that these messages will not be sent to the client.
148This option applies to protocol version 2 only.
149.It Cm ClientAliveCountMax
150Sets the number of client alive messages (see above) which may be
151sent without
152.Nm sshd
70791e56 153receiving any messages back from the client.
154If this threshold is reached while client alive messages are being sent,
ff2d7a98 155.Nm sshd
70791e56 156will disconnect the client, terminating the session.
157It is important to note that the use of client alive messages is very
158different from
416fd2a8 159.Cm TCPKeepAlive
70791e56 160(below).
161The client alive messages are sent through the encrypted channel
162and therefore will not be spoofable.
163The TCP keepalive option enabled by
416fd2a8 164.Cm TCPKeepAlive
70791e56 165is spoofable.
166The client alive mechanism is valuable when the client or
ff2d7a98 167server depend on knowing when a connection has become inactive.
168.Pp
70791e56 169The default value is 3.
170If
ff2d7a98 171.Cm ClientAliveInterval
172(above) is set to 15, and
173.Cm ClientAliveCountMax
174is left at the default, unresponsive ssh clients
175will be disconnected after approximately 45 seconds.
176.It Cm Compression
177Specifies whether compression is allowed.
178The argument must be
179.Dq yes
180or
181.Dq no .
182The default is
183.Dq yes .
184.It Cm DenyGroups
185This keyword can be followed by a list of group name patterns, separated
186by spaces.
187Login is disallowed for users whose primary group or supplementary
188group list matches one of the patterns.
189.Ql \&*
190and
70791e56 191.Ql \&?
ff2d7a98 192can be used as
193wildcards in the patterns.
194Only group names are valid; a numerical group ID is not recognized.
195By default, login is allowed for all groups.
196.Pp
197.It Cm DenyUsers
198This keyword can be followed by a list of user name patterns, separated
199by spaces.
200Login is disallowed for user names that match one of the patterns.
201.Ql \&*
202and
70791e56 203.Ql \&?
ff2d7a98 204can be used as wildcards in the patterns.
205Only user names are valid; a numerical user ID is not recognized.
206By default, login is allowed for all users.
207If the pattern takes the form USER@HOST then USER and HOST
208are separately checked, restricting logins to particular
209users from particular hosts.
210.It Cm GatewayPorts
211Specifies whether remote hosts are allowed to connect to ports
212forwarded for the client.
213By default,
214.Nm sshd
1c14df9e 215binds remote port forwardings to the loopback address.
216This prevents other remote hosts from connecting to forwarded ports.
ff2d7a98 217.Cm GatewayPorts
218can be used to specify that
219.Nm sshd
220should bind remote port forwardings to the wildcard address,
221thus allowing remote hosts to connect to forwarded ports.
222The argument must be
223.Dq yes
224or
225.Dq no .
226The default is
227.Dq no .
70791e56 228.It Cm GSSAPIAuthentication
229Specifies whether user authentication based on GSSAPI is allowed.
416fd2a8 230The default is
ff2d7a98 231.Dq yes .
70791e56 232Note that this option applies to protocol version 2 only.
416fd2a8 233.It Cm GSSAPICleanupCredentials
70791e56 234Specifies whether to automatically destroy the user's credentials cache
235on logout.
236The default is
237.Dq yes .
238Note that this option applies to protocol version 2 only.
239.It Cm GSSAPIKeyExchange
ff2d7a98 240Specifies whether key exchange based on GSSAPI may be used. When using
241GSSAPI key exchange the server need not have a host key.
242The default is
243.Dq yes .
70791e56 244Note that this option applies to protocol version 2 only.
245.It Cm GSSAPIUseSessionCredCache
ff2d7a98 246Specifies whether a unique credentials cache name should be generated per
247session for storing delegated credentials.
248The default is
249.Dq yes .
70791e56 250Note that this option applies to protocol version 2 only.
251.It Cm HostbasedAuthentication
252Specifies whether rhosts or /etc/hosts.equiv authentication together
253with successful public key client host authentication is allowed
254(hostbased authentication).
255This option is similar to
256.Cm RhostsRSAAuthentication
257and applies to protocol version 2 only.
c2397a66 258The default is
70791e56 259.Dq no .
ff2d7a98 260.It Cm HostKey
261Specifies a file containing a private host key
262used by SSH.
263The default is
264.Pa /etc/ssh/ssh_host_key
265for protocol version 1, and
266.Pa /etc/ssh/ssh_host_rsa_key
267and
268.Pa /etc/ssh/ssh_host_dsa_key
269for protocol version 2.
270Note that
271.Nm sshd
272will refuse to use a file if it is group/world-accessible.
273It is possible to have multiple host key files.
274.Dq rsa1
275keys are used for version 1 and
276.Dq dsa
277or
278.Dq rsa
279are used for version 2 of the SSH protocol.
280.It Cm IgnoreRhosts
281Specifies that
282.Pa .rhosts
283and
284.Pa .shosts
285files will not be used in
ff2d7a98 286.Cm RhostsRSAAuthentication
287or
288.Cm HostbasedAuthentication .
289.Pp
290.Pa /etc/hosts.equiv
291and
292.Pa /etc/shosts.equiv
293are still used.
294The default is
295.Dq yes .
296.It Cm IgnoreUserKnownHosts
297Specifies whether
298.Nm sshd
299should ignore the user's
300.Pa $HOME/.ssh/known_hosts
301during
302.Cm RhostsRSAAuthentication
303or
304.Cm HostbasedAuthentication .
305The default is
306.Dq no .
ff2d7a98 307.It Cm KerberosAuthentication
70791e56 308Specifies whether the password provided by the user for
ff2d7a98 309.Cm PasswordAuthentication
70791e56 310will be validated through the Kerberos KDC.
ff2d7a98 311To use this option, the server needs a
312Kerberos servtab which allows the verification of the KDC's identity.
313Default is
314.Dq no .
2a304a95 315.It Cm KerberosGetAFSToken
316If AFS is active and the user has a Kerberos 5 TGT, attempt to aquire
317an AFS token before accessing the user's home directory.
318Default is
319.Dq no .
ff2d7a98 320.It Cm KerberosOrLocalPasswd
321If set then if password authentication through Kerberos fails then
322the password will be validated via any additional local mechanism
323such as
324.Pa /etc/passwd .
325Default is
326.Dq yes .
ff2d7a98 327.It Cm KerberosTicketCleanup
328Specifies whether to automatically destroy the user's ticket cache
329file on logout.
330Default is
331.Dq yes .
332.It Cm KeyRegenerationInterval
333In protocol version 1, the ephemeral server key is automatically regenerated
334after this many seconds (if it has been used).
335The purpose of regeneration is to prevent
336decrypting captured sessions by later breaking into the machine and
337stealing the keys.
338The key is never stored anywhere.
339If the value is 0, the key is never regenerated.
340The default is 3600 (seconds).
341.It Cm ListenAddress
342Specifies the local addresses
343.Nm sshd
344should listen on.
345The following forms may be used:
346.Pp
347.Bl -item -offset indent -compact
348.It
349.Cm ListenAddress
350.Sm off
351.Ar host No | Ar IPv4_addr No | Ar IPv6_addr
352.Sm on
353.It
354.Cm ListenAddress
355.Sm off
356.Ar host No | Ar IPv4_addr No : Ar port
357.Sm on
358.It
359.Cm ListenAddress
360.Sm off
361.Oo
362.Ar host No | Ar IPv6_addr Oc : Ar port
363.Sm on
364.El
365.Pp
366If
367.Ar port
368is not specified,
369.Nm sshd
370will listen on the address and all prior
371.Cm Port
70791e56 372options specified.
373The default is to listen on all local addresses.
1c14df9e 374Multiple
ff2d7a98 375.Cm ListenAddress
70791e56 376options are permitted.
377Additionally, any
ff2d7a98 378.Cm Port
379options must precede this option for non port qualified addresses.
380.It Cm LoginGraceTime
381The server disconnects after this time if the user has not
382successfully logged in.
383If the value is 0, there is no time limit.
e54b3d7c 384The default is 120 seconds.
ff2d7a98 385.It Cm LogLevel
386Gives the verbosity level that is used when logging messages from
387.Nm sshd .
388The possible values are:
389QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3.
1c14df9e 390The default is INFO.
391DEBUG and DEBUG1 are equivalent.
392DEBUG2 and DEBUG3 each specify higher levels of debugging output.
393Logging with a DEBUG level violates the privacy of users and is not recommended.
ff2d7a98 394.It Cm MACs
395Specifies the available MAC (message authentication code) algorithms.
396The MAC algorithm is used in protocol version 2
397for data integrity protection.
398Multiple algorithms must be comma-separated.
399The default is
400.Dq hmac-md5,hmac-sha1,hmac-ripemd160,hmac-sha1-96,hmac-md5-96 .
401.It Cm MaxStartups
402Specifies the maximum number of concurrent unauthenticated connections to the
403.Nm sshd
404daemon.
405Additional connections will be dropped until authentication succeeds or the
406.Cm LoginGraceTime
407expires for a connection.
408The default is 10.
409.Pp
410Alternatively, random early drop can be enabled by specifying
411the three colon separated values
412.Dq start:rate:full
413(e.g., "10:30:60").
414.Nm sshd
415will refuse connection attempts with a probability of
416.Dq rate/100
417(30%)
418if there are currently
419.Dq start
420(10)
421unauthenticated connections.
422The probability increases linearly and all connection attempts
423are refused if the number of unauthenticated connections reaches
424.Dq full
425(60).
ff2d7a98 426.It Cm PasswordAuthentication
427Specifies whether password authentication is allowed.
428The default is
429.Dq yes .
430.It Cm PermitEmptyPasswords
431When password authentication is allowed, it specifies whether the
432server allows login to accounts with empty password strings.
433The default is
434.Dq no .
435.It Cm PermitRootLogin
436Specifies whether root can login using
437.Xr ssh 1 .
438The argument must be
439.Dq yes ,
440.Dq without-password ,
441.Dq forced-commands-only
442or
443.Dq no .
444The default is
445.Dq yes .
446.Pp
447If this option is set to
448.Dq without-password
2a304a95 449password authentication is disabled for root. Note that other authentication
450methods (e.g., keyboard-interactive/PAM) may still allow root to login using
451a password.
ff2d7a98 452.Pp
453If this option is set to
454.Dq forced-commands-only
455root login with public key authentication will be allowed,
456but only if the
457.Ar command
458option has been specified
459(which may be useful for taking remote backups even if root login is
70791e56 460normally not allowed).
461All other authentication methods are disabled for root.
ff2d7a98 462.Pp
463If this option is set to
464.Dq no
465root is not allowed to login.
e54b3d7c 466.It Cm PermitUserEnvironment
467Specifies whether
468.Pa ~/.ssh/environment
469and
470.Cm environment=
471options in
472.Pa ~/.ssh/authorized_keys
473are processed by
474.Nm sshd .
475The default is
476.Dq no .
477Enabling environment processing may enable users to bypass access
478restrictions in some configurations using mechanisms such as
479.Ev LD_PRELOAD .
ff2d7a98 480.It Cm PidFile
481Specifies the file that contains the process ID of the
482.Nm sshd
483daemon.
484The default is
485.Pa /var/run/sshd.pid .
486.It Cm Port
487Specifies the port number that
488.Nm sshd
489listens on.
490The default is 22.
491Multiple options of this type are permitted.
492See also
493.Cm ListenAddress .
494.It Cm PrintLastLog
495Specifies whether
496.Nm sshd
497should print the date and time when the user last logged in.
498The default is
499.Dq yes .
500.It Cm PrintMotd
501Specifies whether
502.Nm sshd
503should print
504.Pa /etc/motd
505when a user logs in interactively.
506(On some systems it is also printed by the shell,
507.Pa /etc/profile ,
508or equivalent.)
509The default is
510.Dq yes .
511.It Cm Protocol
512Specifies the protocol versions
513.Nm sshd
e54b3d7c 514supports.
ff2d7a98 515The possible values are
516.Dq 1
517and
518.Dq 2 .
519Multiple versions must be comma-separated.
520The default is
521.Dq 2,1 .
e54b3d7c 522Note that the order of the protocol list does not indicate preference,
523because the client selects among multiple protocol versions offered
524by the server.
525Specifying
526.Dq 2,1
527is identical to
528.Dq 1,2 .
ff2d7a98 529.It Cm PubkeyAuthentication
530Specifies whether public key authentication is allowed.
531The default is
532.Dq yes .
533Note that this option applies to protocol version 2 only.
ff2d7a98 534.It Cm RhostsRSAAuthentication
535Specifies whether rhosts or /etc/hosts.equiv authentication together
536with successful RSA host authentication is allowed.
537The default is
538.Dq no .
539This option applies to protocol version 1 only.
540.It Cm RSAAuthentication
541Specifies whether pure RSA authentication is allowed.
542The default is
543.Dq yes .
544This option applies to protocol version 1 only.
545.It Cm ServerKeyBits
546Defines the number of bits in the ephemeral protocol version 1 server key.
547The minimum value is 512, and the default is 768.
548.It Cm StrictModes
549Specifies whether
550.Nm sshd
551should check file modes and ownership of the
552user's files and home directory before accepting login.
553This is normally desirable because novices sometimes accidentally leave their
554directory or files world-writable.
555The default is
556.Dq yes .
557.It Cm Subsystem
558Configures an external subsystem (e.g., file transfer daemon).
559Arguments should be a subsystem name and a command to execute upon subsystem
560request.
561The command
562.Xr sftp-server 8
563implements the
564.Dq sftp
565file transfer subsystem.
566By default no subsystems are defined.
567Note that this option applies to protocol version 2 only.
568.It Cm SyslogFacility
569Gives the facility code that is used when logging messages from
570.Nm sshd .
571The possible values are: DAEMON, USER, AUTH, LOCAL0, LOCAL1, LOCAL2,
572LOCAL3, LOCAL4, LOCAL5, LOCAL6, LOCAL7.
573The default is AUTH.
416fd2a8 574.It Cm TCPKeepAlive
575Specifies whether the system should send TCP keepalive messages to the
576other side.
577If they are sent, death of the connection or crash of one
578of the machines will be properly noticed.
579However, this means that
580connections will die if the route is down temporarily, and some people
581find it annoying.
582On the other hand, if TCP keepalives are not sent,
583sessions may hang indefinitely on the server, leaving
584.Dq ghost
585users and consuming server resources.
586.Pp
587The default is
588.Dq yes
589(to send TCP keepalive messages), and the server will notice
590if the network goes down or the client host crashes.
591This avoids infinitely hanging sessions.
592.Pp
593To disable TCP keepalive messages, the value should be set to
594.Dq no .
70791e56 595.It Cm UseDNS
596Specifies whether
597.Nm sshd
598should lookup the remote host name and check that
599the resolved host name for the remote IP address maps back to the
600very same IP address.
601The default is
602.Dq yes .
ff2d7a98 603.It Cm UseLogin
604Specifies whether
605.Xr login 1
606is used for interactive login sessions.
607The default is
608.Dq no .
609Note that
610.Xr login 1
611is never used for remote command execution.
612Note also, that if this is enabled,
613.Cm X11Forwarding
614will be disabled because
615.Xr login 1
616does not know how to handle
617.Xr xauth 1
1c14df9e 618cookies.
619If
ff2d7a98 620.Cm UsePrivilegeSeparation
621is specified, it will be disabled after authentication.
70791e56 622.It Cm UsePAM
416fd2a8 623Enables PAM authentication (via challenge-response) and session set up.
624If you enable this, you should probably disable
70791e56 625.Cm PasswordAuthentication .
416fd2a8 626If you enable
70791e56 627.CM UsePAM
416fd2a8 628then you will not be able to run sshd as a non-root user. The default is
629.Dq no .
ff2d7a98 630.It Cm UsePrivilegeSeparation
631Specifies whether
632.Nm sshd
633separates privileges by creating an unprivileged child process
1c14df9e 634to deal with incoming network traffic.
635After successful authentication, another process will be created that has
636the privilege of the authenticated user.
637The goal of privilege separation is to prevent privilege
ff2d7a98 638escalation by containing any corruption within the unprivileged processes.
639The default is
640.Dq yes .
ff2d7a98 641.It Cm X11DisplayOffset
642Specifies the first display number available for
643.Nm sshd Ns 's
644X11 forwarding.
645This prevents
646.Nm sshd
647from interfering with real X11 servers.
648The default is 10.
649.It Cm X11Forwarding
650Specifies whether X11 forwarding is permitted.
e54b3d7c 651The argument must be
652.Dq yes
653or
654.Dq no .
ff2d7a98 655The default is
656.Dq no .
e54b3d7c 657.Pp
658When X11 forwarding is enabled, there may be additional exposure to
659the server and to client displays if the
660.Nm sshd
661proxy display is configured to listen on the wildcard address (see
662.Cm X11UseLocalhost
663below), however this is not the default.
664Additionally, the authentication spoofing and authentication data
665verification and substitution occur on the client side.
666The security risk of using X11 forwarding is that the client's X11
667display server may be exposed to attack when the ssh client requests
668forwarding (see the warnings for
669.Cm ForwardX11
670in
70791e56 671.Xr ssh_config 5 ) .
e54b3d7c 672A system administrator may have a stance in which they want to
673protect clients that may expose themselves to attack by unwittingly
674requesting X11 forwarding, which can warrant a
675.Dq no
676setting.
677.Pp
678Note that disabling X11 forwarding does not prevent users from
679forwarding X11 traffic, as users can always install their own forwarders.
ff2d7a98 680X11 forwarding is automatically disabled if
681.Cm UseLogin
682is enabled.
683.It Cm X11UseLocalhost
684Specifies whether
685.Nm sshd
686should bind the X11 forwarding server to the loopback address or to
1c14df9e 687the wildcard address.
688By default,
ff2d7a98 689.Nm sshd
690binds the forwarding server to the loopback address and sets the
691hostname part of the
692.Ev DISPLAY
693environment variable to
694.Dq localhost .
e54b3d7c 695This prevents remote hosts from connecting to the proxy display.
ff2d7a98 696However, some older X11 clients may not function with this
697configuration.
698.Cm X11UseLocalhost
699may be set to
700.Dq no
701to specify that the forwarding server should be bound to the wildcard
702address.
703The argument must be
704.Dq yes
705or
706.Dq no .
707The default is
708.Dq yes .
709.It Cm XAuthLocation
e54b3d7c 710Specifies the full pathname of the
ff2d7a98 711.Xr xauth 1
712program.
713The default is
714.Pa /usr/X11R6/bin/xauth .
715.El
716.Ss Time Formats
ff2d7a98 717.Nm sshd
718command-line arguments and configuration file options that specify time
719may be expressed using a sequence of the form:
720.Sm off
e54b3d7c 721.Ar time Op Ar qualifier ,
ff2d7a98 722.Sm on
723where
724.Ar time
725is a positive integer value and
726.Ar qualifier
727is one of the following:
728.Pp
729.Bl -tag -width Ds -compact -offset indent
730.It Cm <none>
731seconds
732.It Cm s | Cm S
733seconds
734.It Cm m | Cm M
735minutes
736.It Cm h | Cm H
737hours
738.It Cm d | Cm D
739days
740.It Cm w | Cm W
741weeks
742.El
743.Pp
744Each member of the sequence is added together to calculate
745the total time value.
746.Pp
747Time format examples:
748.Pp
749.Bl -tag -width Ds -compact -offset indent
750.It 600
751600 seconds (10 minutes)
752.It 10m
75310 minutes
754.It 1h30m
7551 hour 30 minutes (90 minutes)
756.El
757.Sh FILES
758.Bl -tag -width Ds
759.It Pa /etc/ssh/sshd_config
760Contains configuration data for
761.Nm sshd .
762This file should be writable by root only, but it is recommended
763(though not necessary) that it be world-readable.
764.El
70791e56 765.Sh SEE ALSO
766.Xr sshd 8
ff2d7a98 767.Sh AUTHORS
768OpenSSH is a derivative of the original and free
769ssh 1.2.12 release by Tatu Ylonen.
770Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos,
771Theo de Raadt and Dug Song
772removed many bugs, re-added newer features and
773created OpenSSH.
774Markus Friedl contributed the support for SSH
775protocol versions 1.5 and 2.0.
776Niels Provos and Markus Friedl contributed support
777for privilege separation.
This page took 0.163566 seconds and 5 git commands to generate.