]> andersk Git - gssapi-openssh.git/blame - openssh/sshd_config.5
NCSA_GSSAPI_20040713
[gssapi-openssh.git] / openssh / sshd_config.5
CommitLineData
884dc78b 1.\" -*- nroff -*-
2.\"
3.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5.\" All rights reserved
6.\"
7.\" As far as I am concerned, the code I have written for this software
8.\" can be used freely for any purpose. Any derived versions of this
9.\" software must be clearly marked as such, and if the derived work is
10.\" incompatible with the protocol description in the RFC file, it must be
11.\" called by a name other than "ssh" or "Secure Shell".
12.\"
13.\" Copyright (c) 1999,2000 Markus Friedl. All rights reserved.
14.\" Copyright (c) 1999 Aaron Campbell. All rights reserved.
15.\" Copyright (c) 1999 Theo de Raadt. All rights reserved.
16.\"
17.\" Redistribution and use in source and binary forms, with or without
18.\" modification, are permitted provided that the following conditions
19.\" are met:
20.\" 1. Redistributions of source code must retain the above copyright
21.\" notice, this list of conditions and the following disclaimer.
22.\" 2. Redistributions in binary form must reproduce the above copyright
23.\" notice, this list of conditions and the following disclaimer in the
24.\" documentation and/or other materials provided with the distribution.
25.\"
26.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
27.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
28.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
29.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
30.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
31.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
32.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
33.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\"
12a403af 37.\" $OpenBSD: sshd_config.5,v 1.29 2004/03/08 10:18:57 dtucker Exp $
884dc78b 38.Dd September 25, 1999
39.Dt SSHD_CONFIG 5
40.Os
41.Sh NAME
42.Nm sshd_config
43.Nd OpenSSH SSH daemon configuration file
44.Sh SYNOPSIS
45.Bl -tag -width Ds -compact
46.It Pa /etc/ssh/sshd_config
47.El
48.Sh DESCRIPTION
49.Nm sshd
50reads configuration data from
51.Pa /etc/ssh/sshd_config
52(or the file specified with
53.Fl f
54on the command line).
55The file contains keyword-argument pairs, one per line.
56Lines starting with
57.Ql #
58and empty lines are interpreted as comments.
59.Pp
60The possible
61keywords and their meanings are as follows (note that
62keywords are case-insensitive and arguments are case-sensitive):
63.Bl -tag -width Ds
884dc78b 64.It Cm AllowGroups
65This keyword can be followed by a list of group name patterns, separated
66by spaces.
67If specified, login is allowed only for users whose primary
68group or supplementary group list matches one of the patterns.
69.Ql \&*
70and
7cac2b65 71.Ql \&?
884dc78b 72can be used as
73wildcards in the patterns.
74Only group names are valid; a numerical group ID is not recognized.
75By default, login is allowed for all groups.
76.Pp
77.It Cm AllowTcpForwarding
78Specifies whether TCP forwarding is permitted.
79The default is
80.Dq yes .
81Note that disabling TCP forwarding does not improve security unless
82users are also denied shell access, as they can always install their
83own forwarders.
84.Pp
85.It Cm AllowUsers
86This keyword can be followed by a list of user name patterns, separated
87by spaces.
bfe49944 88If specified, login is allowed only for user names that
884dc78b 89match one of the patterns.
90.Ql \&*
91and
7cac2b65 92.Ql \&?
884dc78b 93can be used as
94wildcards in the patterns.
95Only user names are valid; a numerical user ID is not recognized.
96By default, login is allowed for all users.
97If the pattern takes the form USER@HOST then USER and HOST
98are separately checked, restricting logins to particular
99users from particular hosts.
100.Pp
101.It Cm AuthorizedKeysFile
102Specifies the file that contains the public keys that can be used
103for user authentication.
104.Cm AuthorizedKeysFile
105may contain tokens of the form %T which are substituted during connection
7cac2b65 106set-up.
107The following tokens are defined: %% is replaced by a literal '%',
884dc78b 108%h is replaced by the home directory of the user being authenticated and
109%u is replaced by the username of that user.
110After expansion,
111.Cm AuthorizedKeysFile
112is taken to be an absolute path or one relative to the user's home
113directory.
114The default is
115.Dq .ssh/authorized_keys .
116.It Cm Banner
117In some jurisdictions, sending a warning message before authentication
118may be relevant for getting legal protection.
119The contents of the specified file are sent to the remote user before
120authentication is allowed.
121This option is only available for protocol version 2.
122By default, no banner is displayed.
123.Pp
124.It Cm ChallengeResponseAuthentication
125Specifies whether challenge response authentication is allowed.
126All authentication styles from
127.Xr login.conf 5
128are supported.
129The default is
130.Dq yes .
131.It Cm Ciphers
132Specifies the ciphers allowed for protocol version 2.
133Multiple ciphers must be comma-separated.
134The default is
135.Pp
136.Bd -literal
137 ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,
7cac2b65 138 aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr''
884dc78b 139.Ed
140.It Cm ClientAliveInterval
141Sets a timeout interval in seconds after which if no data has been received
142from the client,
143.Nm sshd
144will send a message through the encrypted
145channel to request a response from the client.
146The default
147is 0, indicating that these messages will not be sent to the client.
148This option applies to protocol version 2 only.
149.It Cm ClientAliveCountMax
150Sets the number of client alive messages (see above) which may be
151sent without
152.Nm sshd
7cac2b65 153receiving any messages back from the client.
154If this threshold is reached while client alive messages are being sent,
884dc78b 155.Nm sshd
7cac2b65 156will disconnect the client, terminating the session.
157It is important to note that the use of client alive messages is very
158different from
540d72c3 159.Cm TCPKeepAlive
7cac2b65 160(below).
161The client alive messages are sent through the encrypted channel
162and therefore will not be spoofable.
163The TCP keepalive option enabled by
540d72c3 164.Cm TCPKeepAlive
7cac2b65 165is spoofable.
166The client alive mechanism is valuable when the client or
884dc78b 167server depend on knowing when a connection has become inactive.
168.Pp
7cac2b65 169The default value is 3.
170If
884dc78b 171.Cm ClientAliveInterval
172(above) is set to 15, and
173.Cm ClientAliveCountMax
174is left at the default, unresponsive ssh clients
175will be disconnected after approximately 45 seconds.
176.It Cm Compression
177Specifies whether compression is allowed.
178The argument must be
179.Dq yes
180or
181.Dq no .
182The default is
183.Dq yes .
184.It Cm DenyGroups
185This keyword can be followed by a list of group name patterns, separated
186by spaces.
187Login is disallowed for users whose primary group or supplementary
188group list matches one of the patterns.
189.Ql \&*
190and
7cac2b65 191.Ql \&?
884dc78b 192can be used as
193wildcards in the patterns.
194Only group names are valid; a numerical group ID is not recognized.
195By default, login is allowed for all groups.
196.Pp
197.It Cm DenyUsers
198This keyword can be followed by a list of user name patterns, separated
199by spaces.
200Login is disallowed for user names that match one of the patterns.
201.Ql \&*
202and
7cac2b65 203.Ql \&?
884dc78b 204can be used as wildcards in the patterns.
205Only user names are valid; a numerical user ID is not recognized.
206By default, login is allowed for all users.
207If the pattern takes the form USER@HOST then USER and HOST
208are separately checked, restricting logins to particular
209users from particular hosts.
210.It Cm GatewayPorts
211Specifies whether remote hosts are allowed to connect to ports
212forwarded for the client.
213By default,
214.Nm sshd
bfe49944 215binds remote port forwardings to the loopback address.
216This prevents other remote hosts from connecting to forwarded ports.
884dc78b 217.Cm GatewayPorts
218can be used to specify that
219.Nm sshd
220should bind remote port forwardings to the wildcard address,
221thus allowing remote hosts to connect to forwarded ports.
222The argument must be
223.Dq yes
224or
225.Dq no .
226The default is
227.Dq no .
7cac2b65 228.It Cm GSSAPIAuthentication
229Specifies whether user authentication based on GSSAPI is allowed.
540d72c3 230The default is
c5448518 231.Dq yes .
7cac2b65 232Note that this option applies to protocol version 2 only.
94b7f692 233.It Cm GSSAPICleanupCredentials
7cac2b65 234Specifies whether to automatically destroy the user's credentials cache
235on logout.
236The default is
237.Dq yes .
238Note that this option applies to protocol version 2 only.
c5448518 239.It Cm GSSAPIKeyExchange
44a053a3 240Specifies whether key exchange based on GSSAPI may be used. When using
241GSSAPI key exchange the server need not have a host key.
242The default is
243.Dq yes .
c5448518 244Note that this option applies to protocol version 2 only.
245.It Cm GSSAPIUseSessionCredCache
44a053a3 246Specifies whether a unique credentials cache name should be generated per
247session for storing delegated credentials.
248The default is
249.Dq yes .
c5448518 250Note that this option applies to protocol version 2 only.
251.It Cm HostbasedAuthentication
252Specifies whether rhosts or /etc/hosts.equiv authentication together
253with successful public key client host authentication is allowed
254(hostbased authentication).
255This option is similar to
256.Cm RhostsRSAAuthentication
257and applies to protocol version 2 only.
52b36949 258The default is
c5448518 259.Dq no .
884dc78b 260.It Cm HostKey
261Specifies a file containing a private host key
262used by SSH.
263The default is
264.Pa /etc/ssh/ssh_host_key
265for protocol version 1, and
266.Pa /etc/ssh/ssh_host_rsa_key
267and
268.Pa /etc/ssh/ssh_host_dsa_key
269for protocol version 2.
270Note that
271.Nm sshd
272will refuse to use a file if it is group/world-accessible.
273It is possible to have multiple host key files.
274.Dq rsa1
275keys are used for version 1 and
276.Dq dsa
277or
278.Dq rsa
279are used for version 2 of the SSH protocol.
280.It Cm IgnoreRhosts
281Specifies that
282.Pa .rhosts
283and
284.Pa .shosts
285files will not be used in
884dc78b 286.Cm RhostsRSAAuthentication
287or
288.Cm HostbasedAuthentication .
289.Pp
290.Pa /etc/hosts.equiv
291and
292.Pa /etc/shosts.equiv
293are still used.
294The default is
295.Dq yes .
296.It Cm IgnoreUserKnownHosts
297Specifies whether
298.Nm sshd
299should ignore the user's
300.Pa $HOME/.ssh/known_hosts
301during
302.Cm RhostsRSAAuthentication
303or
304.Cm HostbasedAuthentication .
305The default is
306.Dq no .
884dc78b 307.It Cm KerberosAuthentication
7cac2b65 308Specifies whether the password provided by the user for
884dc78b 309.Cm PasswordAuthentication
7cac2b65 310will be validated through the Kerberos KDC.
884dc78b 311To use this option, the server needs a
312Kerberos servtab which allows the verification of the KDC's identity.
313Default is
314.Dq no .
12a403af 315.It Cm KerberosGetAFSToken
316If AFS is active and the user has a Kerberos 5 TGT, attempt to aquire
317an AFS token before accessing the user's home directory.
318Default is
319.Dq no .
884dc78b 320.It Cm KerberosOrLocalPasswd
321If set then if password authentication through Kerberos fails then
322the password will be validated via any additional local mechanism
323such as
324.Pa /etc/passwd .
325Default is
326.Dq yes .
884dc78b 327.It Cm KerberosTicketCleanup
328Specifies whether to automatically destroy the user's ticket cache
329file on logout.
330Default is
331.Dq yes .
332.It Cm KeyRegenerationInterval
333In protocol version 1, the ephemeral server key is automatically regenerated
334after this many seconds (if it has been used).
335The purpose of regeneration is to prevent
336decrypting captured sessions by later breaking into the machine and
337stealing the keys.
338The key is never stored anywhere.
339If the value is 0, the key is never regenerated.
340The default is 3600 (seconds).
341.It Cm ListenAddress
342Specifies the local addresses
343.Nm sshd
344should listen on.
345The following forms may be used:
346.Pp
347.Bl -item -offset indent -compact
348.It
349.Cm ListenAddress
350.Sm off
351.Ar host No | Ar IPv4_addr No | Ar IPv6_addr
352.Sm on
353.It
354.Cm ListenAddress
355.Sm off
356.Ar host No | Ar IPv4_addr No : Ar port
357.Sm on
358.It
359.Cm ListenAddress
360.Sm off
361.Oo
362.Ar host No | Ar IPv6_addr Oc : Ar port
363.Sm on
364.El
365.Pp
366If
367.Ar port
368is not specified,
369.Nm sshd
370will listen on the address and all prior
371.Cm Port
7cac2b65 372options specified.
373The default is to listen on all local addresses.
bfe49944 374Multiple
884dc78b 375.Cm ListenAddress
7cac2b65 376options are permitted.
377Additionally, any
884dc78b 378.Cm Port
379options must precede this option for non port qualified addresses.
380.It Cm LoginGraceTime
381The server disconnects after this time if the user has not
382successfully logged in.
383If the value is 0, there is no time limit.
d03f4262 384The default is 120 seconds.
884dc78b 385.It Cm LogLevel
386Gives the verbosity level that is used when logging messages from
387.Nm sshd .
388The possible values are:
389QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3.
bfe49944 390The default is INFO.
391DEBUG and DEBUG1 are equivalent.
392DEBUG2 and DEBUG3 each specify higher levels of debugging output.
393Logging with a DEBUG level violates the privacy of users and is not recommended.
884dc78b 394.It Cm MACs
395Specifies the available MAC (message authentication code) algorithms.
396The MAC algorithm is used in protocol version 2
397for data integrity protection.
398Multiple algorithms must be comma-separated.
399The default is
400.Dq hmac-md5,hmac-sha1,hmac-ripemd160,hmac-sha1-96,hmac-md5-96 .
401.It Cm MaxStartups
402Specifies the maximum number of concurrent unauthenticated connections to the
403.Nm sshd
404daemon.
405Additional connections will be dropped until authentication succeeds or the
406.Cm LoginGraceTime
407expires for a connection.
408The default is 10.
409.Pp
410Alternatively, random early drop can be enabled by specifying
411the three colon separated values
412.Dq start:rate:full
413(e.g., "10:30:60").
414.Nm sshd
415will refuse connection attempts with a probability of
416.Dq rate/100
417(30%)
418if there are currently
419.Dq start
420(10)
421unauthenticated connections.
422The probability increases linearly and all connection attempts
423are refused if the number of unauthenticated connections reaches
424.Dq full
425(60).
426.It Cm PasswordAuthentication
427Specifies whether password authentication is allowed.
428The default is
429.Dq yes .
430.It Cm PermitEmptyPasswords
431When password authentication is allowed, it specifies whether the
432server allows login to accounts with empty password strings.
433The default is
434.Dq no .
435.It Cm PermitRootLogin
436Specifies whether root can login using
437.Xr ssh 1 .
438The argument must be
439.Dq yes ,
440.Dq without-password ,
441.Dq forced-commands-only
442or
443.Dq no .
444The default is
445.Dq yes .
446.Pp
447If this option is set to
448.Dq without-password
12a403af 449password authentication is disabled for root. Note that other authentication
450methods (e.g., keyboard-interactive/PAM) may still allow root to login using
451a password.
884dc78b 452.Pp
453If this option is set to
454.Dq forced-commands-only
455root login with public key authentication will be allowed,
456but only if the
457.Ar command
458option has been specified
459(which may be useful for taking remote backups even if root login is
7cac2b65 460normally not allowed).
461All other authentication methods are disabled for root.
884dc78b 462.Pp
463If this option is set to
464.Dq no
465root is not allowed to login.
d03f4262 466.It Cm PermitUserEnvironment
467Specifies whether
468.Pa ~/.ssh/environment
469and
470.Cm environment=
471options in
472.Pa ~/.ssh/authorized_keys
473are processed by
474.Nm sshd .
475The default is
476.Dq no .
477Enabling environment processing may enable users to bypass access
478restrictions in some configurations using mechanisms such as
479.Ev LD_PRELOAD .
884dc78b 480.It Cm PidFile
276b07a3 481Specifies the file that contains the process ID of the
884dc78b 482.Nm sshd
483daemon.
484The default is
485.Pa /var/run/sshd.pid .
486.It Cm Port
487Specifies the port number that
488.Nm sshd
489listens on.
490The default is 22.
491Multiple options of this type are permitted.
492See also
493.Cm ListenAddress .
494.It Cm PrintLastLog
495Specifies whether
496.Nm sshd
497should print the date and time when the user last logged in.
498The default is
499.Dq yes .
500.It Cm PrintMotd
501Specifies whether
502.Nm sshd
503should print
504.Pa /etc/motd
505when a user logs in interactively.
506(On some systems it is also printed by the shell,
507.Pa /etc/profile ,
508or equivalent.)
509The default is
510.Dq yes .
511.It Cm Protocol
512Specifies the protocol versions
513.Nm sshd
d03f4262 514supports.
884dc78b 515The possible values are
516.Dq 1
517and
518.Dq 2 .
519Multiple versions must be comma-separated.
520The default is
521.Dq 2,1 .
d03f4262 522Note that the order of the protocol list does not indicate preference,
523because the client selects among multiple protocol versions offered
524by the server.
525Specifying
526.Dq 2,1
527is identical to
528.Dq 1,2 .
884dc78b 529.It Cm PubkeyAuthentication
530Specifies whether public key authentication is allowed.
531The default is
532.Dq yes .
533Note that this option applies to protocol version 2 only.
884dc78b 534.It Cm RhostsRSAAuthentication
535Specifies whether rhosts or /etc/hosts.equiv authentication together
536with successful RSA host authentication is allowed.
537The default is
538.Dq no .
539This option applies to protocol version 1 only.
540.It Cm RSAAuthentication
541Specifies whether pure RSA authentication is allowed.
542The default is
543.Dq yes .
544This option applies to protocol version 1 only.
545.It Cm ServerKeyBits
546Defines the number of bits in the ephemeral protocol version 1 server key.
547The minimum value is 512, and the default is 768.
548.It Cm StrictModes
549Specifies whether
550.Nm sshd
551should check file modes and ownership of the
552user's files and home directory before accepting login.
553This is normally desirable because novices sometimes accidentally leave their
554directory or files world-writable.
555The default is
556.Dq yes .
557.It Cm Subsystem
558Configures an external subsystem (e.g., file transfer daemon).
559Arguments should be a subsystem name and a command to execute upon subsystem
560request.
561The command
562.Xr sftp-server 8
563implements the
564.Dq sftp
565file transfer subsystem.
566By default no subsystems are defined.
567Note that this option applies to protocol version 2 only.
568.It Cm SyslogFacility
569Gives the facility code that is used when logging messages from
570.Nm sshd .
571The possible values are: DAEMON, USER, AUTH, LOCAL0, LOCAL1, LOCAL2,
572LOCAL3, LOCAL4, LOCAL5, LOCAL6, LOCAL7.
573The default is AUTH.
540d72c3 574.It Cm TCPKeepAlive
575Specifies whether the system should send TCP keepalive messages to the
576other side.
577If they are sent, death of the connection or crash of one
578of the machines will be properly noticed.
579However, this means that
580connections will die if the route is down temporarily, and some people
581find it annoying.
582On the other hand, if TCP keepalives are not sent,
583sessions may hang indefinitely on the server, leaving
584.Dq ghost
585users and consuming server resources.
586.Pp
587The default is
588.Dq yes
589(to send TCP keepalive messages), and the server will notice
590if the network goes down or the client host crashes.
591This avoids infinitely hanging sessions.
592.Pp
593To disable TCP keepalive messages, the value should be set to
594.Dq no .
7cac2b65 595.It Cm UseDNS
596Specifies whether
597.Nm sshd
598should lookup the remote host name and check that
599the resolved host name for the remote IP address maps back to the
600very same IP address.
601The default is
602.Dq yes .
884dc78b 603.It Cm UseLogin
604Specifies whether
605.Xr login 1
606is used for interactive login sessions.
607The default is
608.Dq no .
609Note that
610.Xr login 1
611is never used for remote command execution.
612Note also, that if this is enabled,
613.Cm X11Forwarding
614will be disabled because
615.Xr login 1
616does not know how to handle
617.Xr xauth 1
bfe49944 618cookies.
619If
884dc78b 620.Cm UsePrivilegeSeparation
621is specified, it will be disabled after authentication.
7cac2b65 622.It Cm UsePAM
540d72c3 623Enables PAM authentication (via challenge-response) and session set up.
624If you enable this, you should probably disable
7cac2b65 625.Cm PasswordAuthentication .
540d72c3 626If you enable
7cac2b65 627.CM UsePAM
540d72c3 628then you will not be able to run sshd as a non-root user. The default is
629.Dq no .
884dc78b 630.It Cm UsePrivilegeSeparation
631Specifies whether
632.Nm sshd
633separates privileges by creating an unprivileged child process
bfe49944 634to deal with incoming network traffic.
635After successful authentication, another process will be created that has
636the privilege of the authenticated user.
637The goal of privilege separation is to prevent privilege
884dc78b 638escalation by containing any corruption within the unprivileged processes.
639The default is
640.Dq yes .
884dc78b 641.It Cm X11DisplayOffset
642Specifies the first display number available for
643.Nm sshd Ns 's
644X11 forwarding.
645This prevents
646.Nm sshd
647from interfering with real X11 servers.
648The default is 10.
649.It Cm X11Forwarding
650Specifies whether X11 forwarding is permitted.
d03f4262 651The argument must be
652.Dq yes
653or
654.Dq no .
884dc78b 655The default is
656.Dq no .
d03f4262 657.Pp
658When X11 forwarding is enabled, there may be additional exposure to
659the server and to client displays if the
660.Nm sshd
661proxy display is configured to listen on the wildcard address (see
662.Cm X11UseLocalhost
663below), however this is not the default.
664Additionally, the authentication spoofing and authentication data
665verification and substitution occur on the client side.
666The security risk of using X11 forwarding is that the client's X11
667display server may be exposed to attack when the ssh client requests
668forwarding (see the warnings for
669.Cm ForwardX11
670in
7cac2b65 671.Xr ssh_config 5 ) .
d03f4262 672A system administrator may have a stance in which they want to
673protect clients that may expose themselves to attack by unwittingly
674requesting X11 forwarding, which can warrant a
675.Dq no
676setting.
677.Pp
678Note that disabling X11 forwarding does not prevent users from
679forwarding X11 traffic, as users can always install their own forwarders.
884dc78b 680X11 forwarding is automatically disabled if
681.Cm UseLogin
682is enabled.
683.It Cm X11UseLocalhost
684Specifies whether
685.Nm sshd
686should bind the X11 forwarding server to the loopback address or to
bfe49944 687the wildcard address.
688By default,
884dc78b 689.Nm sshd
690binds the forwarding server to the loopback address and sets the
691hostname part of the
692.Ev DISPLAY
693environment variable to
694.Dq localhost .
d03f4262 695This prevents remote hosts from connecting to the proxy display.
884dc78b 696However, some older X11 clients may not function with this
697configuration.
698.Cm X11UseLocalhost
699may be set to
700.Dq no
701to specify that the forwarding server should be bound to the wildcard
702address.
703The argument must be
704.Dq yes
705or
706.Dq no .
707The default is
708.Dq yes .
709.It Cm XAuthLocation
d03f4262 710Specifies the full pathname of the
884dc78b 711.Xr xauth 1
712program.
713The default is
714.Pa /usr/X11R6/bin/xauth .
715.El
716.Ss Time Formats
884dc78b 717.Nm sshd
718command-line arguments and configuration file options that specify time
719may be expressed using a sequence of the form:
720.Sm off
d03f4262 721.Ar time Op Ar qualifier ,
884dc78b 722.Sm on
723where
724.Ar time
725is a positive integer value and
726.Ar qualifier
727is one of the following:
728.Pp
729.Bl -tag -width Ds -compact -offset indent
730.It Cm <none>
731seconds
732.It Cm s | Cm S
733seconds
734.It Cm m | Cm M
735minutes
736.It Cm h | Cm H
737hours
738.It Cm d | Cm D
739days
740.It Cm w | Cm W
741weeks
742.El
743.Pp
744Each member of the sequence is added together to calculate
745the total time value.
746.Pp
747Time format examples:
748.Pp
749.Bl -tag -width Ds -compact -offset indent
750.It 600
751600 seconds (10 minutes)
752.It 10m
75310 minutes
754.It 1h30m
7551 hour 30 minutes (90 minutes)
756.El
757.Sh FILES
758.Bl -tag -width Ds
759.It Pa /etc/ssh/sshd_config
760Contains configuration data for
761.Nm sshd .
762This file should be writable by root only, but it is recommended
763(though not necessary) that it be world-readable.
764.El
7cac2b65 765.Sh SEE ALSO
766.Xr sshd 8
884dc78b 767.Sh AUTHORS
768OpenSSH is a derivative of the original and free
769ssh 1.2.12 release by Tatu Ylonen.
770Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos,
771Theo de Raadt and Dug Song
772removed many bugs, re-added newer features and
773created OpenSSH.
774Markus Friedl contributed the support for SSH
775protocol versions 1.5 and 2.0.
776Niels Provos and Markus Friedl contributed support
777for privilege separation.
This page took 0.166184 seconds and 5 git commands to generate.