]> andersk Git - gssapi-openssh.git/blame - openssh/sshd_config.5
update for 3.1 release
[gssapi-openssh.git] / openssh / sshd_config.5
CommitLineData
ff2d7a98 1.\" -*- nroff -*-
2.\"
3.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5.\" All rights reserved
6.\"
7.\" As far as I am concerned, the code I have written for this software
8.\" can be used freely for any purpose. Any derived versions of this
9.\" software must be clearly marked as such, and if the derived work is
10.\" incompatible with the protocol description in the RFC file, it must be
11.\" called by a name other than "ssh" or "Secure Shell".
12.\"
13.\" Copyright (c) 1999,2000 Markus Friedl. All rights reserved.
14.\" Copyright (c) 1999 Aaron Campbell. All rights reserved.
15.\" Copyright (c) 1999 Theo de Raadt. All rights reserved.
16.\"
17.\" Redistribution and use in source and binary forms, with or without
18.\" modification, are permitted provided that the following conditions
19.\" are met:
20.\" 1. Redistributions of source code must retain the above copyright
21.\" notice, this list of conditions and the following disclaimer.
22.\" 2. Redistributions in binary form must reproduce the above copyright
23.\" notice, this list of conditions and the following disclaimer in the
24.\" documentation and/or other materials provided with the distribution.
25.\"
26.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
27.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
28.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
29.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
30.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
31.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
32.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
33.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\"
416fd2a8 37.\" $OpenBSD: sshd_config.5,v 1.28 2004/02/17 19:35:21 jmc Exp $
ff2d7a98 38.Dd September 25, 1999
39.Dt SSHD_CONFIG 5
40.Os
41.Sh NAME
42.Nm sshd_config
43.Nd OpenSSH SSH daemon configuration file
44.Sh SYNOPSIS
45.Bl -tag -width Ds -compact
46.It Pa /etc/ssh/sshd_config
47.El
48.Sh DESCRIPTION
49.Nm sshd
50reads configuration data from
51.Pa /etc/ssh/sshd_config
52(or the file specified with
53.Fl f
54on the command line).
55The file contains keyword-argument pairs, one per line.
56Lines starting with
57.Ql #
58and empty lines are interpreted as comments.
59.Pp
60The possible
61keywords and their meanings are as follows (note that
62keywords are case-insensitive and arguments are case-sensitive):
63.Bl -tag -width Ds
ff2d7a98 64.It Cm AllowGroups
65This keyword can be followed by a list of group name patterns, separated
66by spaces.
67If specified, login is allowed only for users whose primary
68group or supplementary group list matches one of the patterns.
69.Ql \&*
70and
70791e56 71.Ql \&?
ff2d7a98 72can be used as
73wildcards in the patterns.
74Only group names are valid; a numerical group ID is not recognized.
75By default, login is allowed for all groups.
76.Pp
77.It Cm AllowTcpForwarding
78Specifies whether TCP forwarding is permitted.
79The default is
80.Dq yes .
81Note that disabling TCP forwarding does not improve security unless
82users are also denied shell access, as they can always install their
83own forwarders.
84.Pp
85.It Cm AllowUsers
86This keyword can be followed by a list of user name patterns, separated
87by spaces.
1c14df9e 88If specified, login is allowed only for user names that
ff2d7a98 89match one of the patterns.
90.Ql \&*
91and
70791e56 92.Ql \&?
ff2d7a98 93can be used as
94wildcards in the patterns.
95Only user names are valid; a numerical user ID is not recognized.
96By default, login is allowed for all users.
97If the pattern takes the form USER@HOST then USER and HOST
98are separately checked, restricting logins to particular
99users from particular hosts.
100.Pp
101.It Cm AuthorizedKeysFile
102Specifies the file that contains the public keys that can be used
103for user authentication.
104.Cm AuthorizedKeysFile
105may contain tokens of the form %T which are substituted during connection
70791e56 106set-up.
107The following tokens are defined: %% is replaced by a literal '%',
ff2d7a98 108%h is replaced by the home directory of the user being authenticated and
109%u is replaced by the username of that user.
110After expansion,
111.Cm AuthorizedKeysFile
112is taken to be an absolute path or one relative to the user's home
113directory.
114The default is
115.Dq .ssh/authorized_keys .
116.It Cm Banner
117In some jurisdictions, sending a warning message before authentication
118may be relevant for getting legal protection.
119The contents of the specified file are sent to the remote user before
120authentication is allowed.
121This option is only available for protocol version 2.
122By default, no banner is displayed.
123.Pp
124.It Cm ChallengeResponseAuthentication
125Specifies whether challenge response authentication is allowed.
126All authentication styles from
127.Xr login.conf 5
128are supported.
129The default is
130.Dq yes .
131.It Cm Ciphers
132Specifies the ciphers allowed for protocol version 2.
133Multiple ciphers must be comma-separated.
134The default is
135.Pp
136.Bd -literal
137 ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,
70791e56 138 aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr''
ff2d7a98 139.Ed
140.It Cm ClientAliveInterval
141Sets a timeout interval in seconds after which if no data has been received
142from the client,
143.Nm sshd
144will send a message through the encrypted
145channel to request a response from the client.
146The default
147is 0, indicating that these messages will not be sent to the client.
148This option applies to protocol version 2 only.
149.It Cm ClientAliveCountMax
150Sets the number of client alive messages (see above) which may be
151sent without
152.Nm sshd
70791e56 153receiving any messages back from the client.
154If this threshold is reached while client alive messages are being sent,
ff2d7a98 155.Nm sshd
70791e56 156will disconnect the client, terminating the session.
157It is important to note that the use of client alive messages is very
158different from
416fd2a8 159.Cm TCPKeepAlive
70791e56 160(below).
161The client alive messages are sent through the encrypted channel
162and therefore will not be spoofable.
163The TCP keepalive option enabled by
416fd2a8 164.Cm TCPKeepAlive
70791e56 165is spoofable.
166The client alive mechanism is valuable when the client or
ff2d7a98 167server depend on knowing when a connection has become inactive.
168.Pp
70791e56 169The default value is 3.
170If
ff2d7a98 171.Cm ClientAliveInterval
172(above) is set to 15, and
173.Cm ClientAliveCountMax
174is left at the default, unresponsive ssh clients
175will be disconnected after approximately 45 seconds.
176.It Cm Compression
177Specifies whether compression is allowed.
178The argument must be
179.Dq yes
180or
181.Dq no .
182The default is
183.Dq yes .
184.It Cm DenyGroups
185This keyword can be followed by a list of group name patterns, separated
186by spaces.
187Login is disallowed for users whose primary group or supplementary
188group list matches one of the patterns.
189.Ql \&*
190and
70791e56 191.Ql \&?
ff2d7a98 192can be used as
193wildcards in the patterns.
194Only group names are valid; a numerical group ID is not recognized.
195By default, login is allowed for all groups.
196.Pp
197.It Cm DenyUsers
198This keyword can be followed by a list of user name patterns, separated
199by spaces.
200Login is disallowed for user names that match one of the patterns.
201.Ql \&*
202and
70791e56 203.Ql \&?
ff2d7a98 204can be used as wildcards in the patterns.
205Only user names are valid; a numerical user ID is not recognized.
206By default, login is allowed for all users.
207If the pattern takes the form USER@HOST then USER and HOST
208are separately checked, restricting logins to particular
209users from particular hosts.
210.It Cm GatewayPorts
211Specifies whether remote hosts are allowed to connect to ports
212forwarded for the client.
213By default,
214.Nm sshd
1c14df9e 215binds remote port forwardings to the loopback address.
216This prevents other remote hosts from connecting to forwarded ports.
ff2d7a98 217.Cm GatewayPorts
218can be used to specify that
219.Nm sshd
220should bind remote port forwardings to the wildcard address,
221thus allowing remote hosts to connect to forwarded ports.
222The argument must be
223.Dq yes
224or
225.Dq no .
226The default is
227.Dq no .
70791e56 228.It Cm GSSAPIAuthentication
229Specifies whether user authentication based on GSSAPI is allowed.
416fd2a8 230The default is
ff2d7a98 231.Dq yes .
70791e56 232Note that this option applies to protocol version 2 only.
416fd2a8 233.It Cm GSSAPICleanupCredentials
70791e56 234Specifies whether to automatically destroy the user's credentials cache
235on logout.
236The default is
237.Dq yes .
238Note that this option applies to protocol version 2 only.
239.It Cm GSSAPIKeyExchange
ff2d7a98 240Specifies whether key exchange based on GSSAPI may be used. When using
241GSSAPI key exchange the server need not have a host key.
242The default is
243.Dq yes .
70791e56 244Note that this option applies to protocol version 2 only.
245.It Cm GSSAPIUseSessionCredCache
ff2d7a98 246Specifies whether a unique credentials cache name should be generated per
247session for storing delegated credentials.
248The default is
249.Dq yes .
70791e56 250Note that this option applies to protocol version 2 only.
251.It Cm HostbasedAuthentication
252Specifies whether rhosts or /etc/hosts.equiv authentication together
253with successful public key client host authentication is allowed
254(hostbased authentication).
255This option is similar to
256.Cm RhostsRSAAuthentication
257and applies to protocol version 2 only.
c2397a66 258The default is
70791e56 259.Dq no .
ff2d7a98 260.It Cm HostKey
261Specifies a file containing a private host key
262used by SSH.
263The default is
264.Pa /etc/ssh/ssh_host_key
265for protocol version 1, and
266.Pa /etc/ssh/ssh_host_rsa_key
267and
268.Pa /etc/ssh/ssh_host_dsa_key
269for protocol version 2.
270Note that
271.Nm sshd
272will refuse to use a file if it is group/world-accessible.
273It is possible to have multiple host key files.
274.Dq rsa1
275keys are used for version 1 and
276.Dq dsa
277or
278.Dq rsa
279are used for version 2 of the SSH protocol.
280.It Cm IgnoreRhosts
281Specifies that
282.Pa .rhosts
283and
284.Pa .shosts
285files will not be used in
ff2d7a98 286.Cm RhostsRSAAuthentication
287or
288.Cm HostbasedAuthentication .
289.Pp
290.Pa /etc/hosts.equiv
291and
292.Pa /etc/shosts.equiv
293are still used.
294The default is
295.Dq yes .
296.It Cm IgnoreUserKnownHosts
297Specifies whether
298.Nm sshd
299should ignore the user's
300.Pa $HOME/.ssh/known_hosts
301during
302.Cm RhostsRSAAuthentication
303or
304.Cm HostbasedAuthentication .
305The default is
306.Dq no .
ff2d7a98 307.It Cm KerberosAuthentication
70791e56 308Specifies whether the password provided by the user for
ff2d7a98 309.Cm PasswordAuthentication
70791e56 310will be validated through the Kerberos KDC.
ff2d7a98 311To use this option, the server needs a
312Kerberos servtab which allows the verification of the KDC's identity.
313Default is
314.Dq no .
315.It Cm KerberosOrLocalPasswd
316If set then if password authentication through Kerberos fails then
317the password will be validated via any additional local mechanism
318such as
319.Pa /etc/passwd .
320Default is
321.Dq yes .
ff2d7a98 322.It Cm KerberosTicketCleanup
323Specifies whether to automatically destroy the user's ticket cache
324file on logout.
325Default is
326.Dq yes .
327.It Cm KeyRegenerationInterval
328In protocol version 1, the ephemeral server key is automatically regenerated
329after this many seconds (if it has been used).
330The purpose of regeneration is to prevent
331decrypting captured sessions by later breaking into the machine and
332stealing the keys.
333The key is never stored anywhere.
334If the value is 0, the key is never regenerated.
335The default is 3600 (seconds).
336.It Cm ListenAddress
337Specifies the local addresses
338.Nm sshd
339should listen on.
340The following forms may be used:
341.Pp
342.Bl -item -offset indent -compact
343.It
344.Cm ListenAddress
345.Sm off
346.Ar host No | Ar IPv4_addr No | Ar IPv6_addr
347.Sm on
348.It
349.Cm ListenAddress
350.Sm off
351.Ar host No | Ar IPv4_addr No : Ar port
352.Sm on
353.It
354.Cm ListenAddress
355.Sm off
356.Oo
357.Ar host No | Ar IPv6_addr Oc : Ar port
358.Sm on
359.El
360.Pp
361If
362.Ar port
363is not specified,
364.Nm sshd
365will listen on the address and all prior
366.Cm Port
70791e56 367options specified.
368The default is to listen on all local addresses.
1c14df9e 369Multiple
ff2d7a98 370.Cm ListenAddress
70791e56 371options are permitted.
372Additionally, any
ff2d7a98 373.Cm Port
374options must precede this option for non port qualified addresses.
375.It Cm LoginGraceTime
376The server disconnects after this time if the user has not
377successfully logged in.
378If the value is 0, there is no time limit.
e54b3d7c 379The default is 120 seconds.
ff2d7a98 380.It Cm LogLevel
381Gives the verbosity level that is used when logging messages from
382.Nm sshd .
383The possible values are:
384QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3.
1c14df9e 385The default is INFO.
386DEBUG and DEBUG1 are equivalent.
387DEBUG2 and DEBUG3 each specify higher levels of debugging output.
388Logging with a DEBUG level violates the privacy of users and is not recommended.
ff2d7a98 389.It Cm MACs
390Specifies the available MAC (message authentication code) algorithms.
391The MAC algorithm is used in protocol version 2
392for data integrity protection.
393Multiple algorithms must be comma-separated.
394The default is
395.Dq hmac-md5,hmac-sha1,hmac-ripemd160,hmac-sha1-96,hmac-md5-96 .
396.It Cm MaxStartups
397Specifies the maximum number of concurrent unauthenticated connections to the
398.Nm sshd
399daemon.
400Additional connections will be dropped until authentication succeeds or the
401.Cm LoginGraceTime
402expires for a connection.
403The default is 10.
404.Pp
405Alternatively, random early drop can be enabled by specifying
406the three colon separated values
407.Dq start:rate:full
408(e.g., "10:30:60").
409.Nm sshd
410will refuse connection attempts with a probability of
411.Dq rate/100
412(30%)
413if there are currently
414.Dq start
415(10)
416unauthenticated connections.
417The probability increases linearly and all connection attempts
418are refused if the number of unauthenticated connections reaches
419.Dq full
420(60).
ff2d7a98 421.It Cm PasswordAuthentication
422Specifies whether password authentication is allowed.
423The default is
424.Dq yes .
425.It Cm PermitEmptyPasswords
426When password authentication is allowed, it specifies whether the
427server allows login to accounts with empty password strings.
428The default is
429.Dq no .
430.It Cm PermitRootLogin
431Specifies whether root can login using
432.Xr ssh 1 .
433The argument must be
434.Dq yes ,
435.Dq without-password ,
436.Dq forced-commands-only
437or
438.Dq no .
439The default is
440.Dq yes .
441.Pp
442If this option is set to
443.Dq without-password
444password authentication is disabled for root.
445.Pp
446If this option is set to
447.Dq forced-commands-only
448root login with public key authentication will be allowed,
449but only if the
450.Ar command
451option has been specified
452(which may be useful for taking remote backups even if root login is
70791e56 453normally not allowed).
454All other authentication methods are disabled for root.
ff2d7a98 455.Pp
456If this option is set to
457.Dq no
458root is not allowed to login.
e54b3d7c 459.It Cm PermitUserEnvironment
460Specifies whether
461.Pa ~/.ssh/environment
462and
463.Cm environment=
464options in
465.Pa ~/.ssh/authorized_keys
466are processed by
467.Nm sshd .
468The default is
469.Dq no .
470Enabling environment processing may enable users to bypass access
471restrictions in some configurations using mechanisms such as
472.Ev LD_PRELOAD .
ff2d7a98 473.It Cm PidFile
474Specifies the file that contains the process ID of the
475.Nm sshd
476daemon.
477The default is
478.Pa /var/run/sshd.pid .
479.It Cm Port
480Specifies the port number that
481.Nm sshd
482listens on.
483The default is 22.
484Multiple options of this type are permitted.
485See also
486.Cm ListenAddress .
487.It Cm PrintLastLog
488Specifies whether
489.Nm sshd
490should print the date and time when the user last logged in.
491The default is
492.Dq yes .
493.It Cm PrintMotd
494Specifies whether
495.Nm sshd
496should print
497.Pa /etc/motd
498when a user logs in interactively.
499(On some systems it is also printed by the shell,
500.Pa /etc/profile ,
501or equivalent.)
502The default is
503.Dq yes .
504.It Cm Protocol
505Specifies the protocol versions
506.Nm sshd
e54b3d7c 507supports.
ff2d7a98 508The possible values are
509.Dq 1
510and
511.Dq 2 .
512Multiple versions must be comma-separated.
513The default is
514.Dq 2,1 .
e54b3d7c 515Note that the order of the protocol list does not indicate preference,
516because the client selects among multiple protocol versions offered
517by the server.
518Specifying
519.Dq 2,1
520is identical to
521.Dq 1,2 .
ff2d7a98 522.It Cm PubkeyAuthentication
523Specifies whether public key authentication is allowed.
524The default is
525.Dq yes .
526Note that this option applies to protocol version 2 only.
ff2d7a98 527.It Cm RhostsRSAAuthentication
528Specifies whether rhosts or /etc/hosts.equiv authentication together
529with successful RSA host authentication is allowed.
530The default is
531.Dq no .
532This option applies to protocol version 1 only.
533.It Cm RSAAuthentication
534Specifies whether pure RSA authentication is allowed.
535The default is
536.Dq yes .
537This option applies to protocol version 1 only.
538.It Cm ServerKeyBits
539Defines the number of bits in the ephemeral protocol version 1 server key.
540The minimum value is 512, and the default is 768.
541.It Cm StrictModes
542Specifies whether
543.Nm sshd
544should check file modes and ownership of the
545user's files and home directory before accepting login.
546This is normally desirable because novices sometimes accidentally leave their
547directory or files world-writable.
548The default is
549.Dq yes .
550.It Cm Subsystem
551Configures an external subsystem (e.g., file transfer daemon).
552Arguments should be a subsystem name and a command to execute upon subsystem
553request.
554The command
555.Xr sftp-server 8
556implements the
557.Dq sftp
558file transfer subsystem.
559By default no subsystems are defined.
560Note that this option applies to protocol version 2 only.
561.It Cm SyslogFacility
562Gives the facility code that is used when logging messages from
563.Nm sshd .
564The possible values are: DAEMON, USER, AUTH, LOCAL0, LOCAL1, LOCAL2,
565LOCAL3, LOCAL4, LOCAL5, LOCAL6, LOCAL7.
566The default is AUTH.
416fd2a8 567.It Cm TCPKeepAlive
568Specifies whether the system should send TCP keepalive messages to the
569other side.
570If they are sent, death of the connection or crash of one
571of the machines will be properly noticed.
572However, this means that
573connections will die if the route is down temporarily, and some people
574find it annoying.
575On the other hand, if TCP keepalives are not sent,
576sessions may hang indefinitely on the server, leaving
577.Dq ghost
578users and consuming server resources.
579.Pp
580The default is
581.Dq yes
582(to send TCP keepalive messages), and the server will notice
583if the network goes down or the client host crashes.
584This avoids infinitely hanging sessions.
585.Pp
586To disable TCP keepalive messages, the value should be set to
587.Dq no .
70791e56 588.It Cm UseDNS
589Specifies whether
590.Nm sshd
591should lookup the remote host name and check that
592the resolved host name for the remote IP address maps back to the
593very same IP address.
594The default is
595.Dq yes .
ff2d7a98 596.It Cm UseLogin
597Specifies whether
598.Xr login 1
599is used for interactive login sessions.
600The default is
601.Dq no .
602Note that
603.Xr login 1
604is never used for remote command execution.
605Note also, that if this is enabled,
606.Cm X11Forwarding
607will be disabled because
608.Xr login 1
609does not know how to handle
610.Xr xauth 1
1c14df9e 611cookies.
612If
ff2d7a98 613.Cm UsePrivilegeSeparation
614is specified, it will be disabled after authentication.
70791e56 615.It Cm UsePAM
416fd2a8 616Enables PAM authentication (via challenge-response) and session set up.
617If you enable this, you should probably disable
70791e56 618.Cm PasswordAuthentication .
416fd2a8 619If you enable
70791e56 620.CM UsePAM
416fd2a8 621then you will not be able to run sshd as a non-root user. The default is
622.Dq no .
ff2d7a98 623.It Cm UsePrivilegeSeparation
624Specifies whether
625.Nm sshd
626separates privileges by creating an unprivileged child process
1c14df9e 627to deal with incoming network traffic.
628After successful authentication, another process will be created that has
629the privilege of the authenticated user.
630The goal of privilege separation is to prevent privilege
ff2d7a98 631escalation by containing any corruption within the unprivileged processes.
632The default is
633.Dq yes .
ff2d7a98 634.It Cm X11DisplayOffset
635Specifies the first display number available for
636.Nm sshd Ns 's
637X11 forwarding.
638This prevents
639.Nm sshd
640from interfering with real X11 servers.
641The default is 10.
642.It Cm X11Forwarding
643Specifies whether X11 forwarding is permitted.
e54b3d7c 644The argument must be
645.Dq yes
646or
647.Dq no .
ff2d7a98 648The default is
649.Dq no .
e54b3d7c 650.Pp
651When X11 forwarding is enabled, there may be additional exposure to
652the server and to client displays if the
653.Nm sshd
654proxy display is configured to listen on the wildcard address (see
655.Cm X11UseLocalhost
656below), however this is not the default.
657Additionally, the authentication spoofing and authentication data
658verification and substitution occur on the client side.
659The security risk of using X11 forwarding is that the client's X11
660display server may be exposed to attack when the ssh client requests
661forwarding (see the warnings for
662.Cm ForwardX11
663in
70791e56 664.Xr ssh_config 5 ) .
e54b3d7c 665A system administrator may have a stance in which they want to
666protect clients that may expose themselves to attack by unwittingly
667requesting X11 forwarding, which can warrant a
668.Dq no
669setting.
670.Pp
671Note that disabling X11 forwarding does not prevent users from
672forwarding X11 traffic, as users can always install their own forwarders.
ff2d7a98 673X11 forwarding is automatically disabled if
674.Cm UseLogin
675is enabled.
676.It Cm X11UseLocalhost
677Specifies whether
678.Nm sshd
679should bind the X11 forwarding server to the loopback address or to
1c14df9e 680the wildcard address.
681By default,
ff2d7a98 682.Nm sshd
683binds the forwarding server to the loopback address and sets the
684hostname part of the
685.Ev DISPLAY
686environment variable to
687.Dq localhost .
e54b3d7c 688This prevents remote hosts from connecting to the proxy display.
ff2d7a98 689However, some older X11 clients may not function with this
690configuration.
691.Cm X11UseLocalhost
692may be set to
693.Dq no
694to specify that the forwarding server should be bound to the wildcard
695address.
696The argument must be
697.Dq yes
698or
699.Dq no .
700The default is
701.Dq yes .
702.It Cm XAuthLocation
e54b3d7c 703Specifies the full pathname of the
ff2d7a98 704.Xr xauth 1
705program.
706The default is
707.Pa /usr/X11R6/bin/xauth .
708.El
709.Ss Time Formats
ff2d7a98 710.Nm sshd
711command-line arguments and configuration file options that specify time
712may be expressed using a sequence of the form:
713.Sm off
e54b3d7c 714.Ar time Op Ar qualifier ,
ff2d7a98 715.Sm on
716where
717.Ar time
718is a positive integer value and
719.Ar qualifier
720is one of the following:
721.Pp
722.Bl -tag -width Ds -compact -offset indent
723.It Cm <none>
724seconds
725.It Cm s | Cm S
726seconds
727.It Cm m | Cm M
728minutes
729.It Cm h | Cm H
730hours
731.It Cm d | Cm D
732days
733.It Cm w | Cm W
734weeks
735.El
736.Pp
737Each member of the sequence is added together to calculate
738the total time value.
739.Pp
740Time format examples:
741.Pp
742.Bl -tag -width Ds -compact -offset indent
743.It 600
744600 seconds (10 minutes)
745.It 10m
74610 minutes
747.It 1h30m
7481 hour 30 minutes (90 minutes)
749.El
750.Sh FILES
751.Bl -tag -width Ds
752.It Pa /etc/ssh/sshd_config
753Contains configuration data for
754.Nm sshd .
755This file should be writable by root only, but it is recommended
756(though not necessary) that it be world-readable.
757.El
70791e56 758.Sh SEE ALSO
759.Xr sshd 8
ff2d7a98 760.Sh AUTHORS
761OpenSSH is a derivative of the original and free
762ssh 1.2.12 release by Tatu Ylonen.
763Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos,
764Theo de Raadt and Dug Song
765removed many bugs, re-added newer features and
766created OpenSSH.
767Markus Friedl contributed the support for SSH
768protocol versions 1.5 and 2.0.
769Niels Provos and Markus Friedl contributed support
770for privilege separation.
This page took 0.156878 seconds and 5 git commands to generate.