]> andersk Git - openssh.git/blame - ssh_config.5
- dtucker@cvs.openbsd.org 2004/06/13 14:01:42
[openssh.git] / ssh_config.5
CommitLineData
588df31a 1.\" -*- nroff -*-
2.\"
3.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5.\" All rights reserved
6.\"
7.\" As far as I am concerned, the code I have written for this software
8.\" can be used freely for any purpose. Any derived versions of this
9.\" software must be clearly marked as such, and if the derived work is
10.\" incompatible with the protocol description in the RFC file, it must be
11.\" called by a name other than "ssh" or "Secure Shell".
12.\"
13.\" Copyright (c) 1999,2000 Markus Friedl. All rights reserved.
14.\" Copyright (c) 1999 Aaron Campbell. All rights reserved.
15.\" Copyright (c) 1999 Theo de Raadt. All rights reserved.
16.\"
17.\" Redistribution and use in source and binary forms, with or without
18.\" modification, are permitted provided that the following conditions
19.\" are met:
20.\" 1. Redistributions of source code must retain the above copyright
21.\" notice, this list of conditions and the following disclaimer.
22.\" 2. Redistributions in binary form must reproduce the above copyright
23.\" notice, this list of conditions and the following disclaimer in the
24.\" documentation and/or other materials provided with the distribution.
25.\"
26.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
27.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
28.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
29.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
30.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
31.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
32.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
33.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\"
3b9baa7b 37.\" $OpenBSD: ssh_config.5,v 1.35 2004/06/13 14:01:42 dtucker Exp $
588df31a 38.Dd September 25, 1999
39.Dt SSH_CONFIG 5
40.Os
41.Sh NAME
42.Nm ssh_config
43.Nd OpenSSH SSH client configuration files
44.Sh SYNOPSIS
45.Bl -tag -width Ds -compact
46.It Pa $HOME/.ssh/config
47.It Pa /etc/ssh/ssh_config
48.El
49.Sh DESCRIPTION
50.Nm ssh
51obtains configuration data from the following sources in
52the following order:
4dcbbeea 53.Bl -enum -offset indent -compact
54.It
55command-line options
56.It
57user's configuration file
58.Pq Pa $HOME/.ssh/config
59.It
60system-wide configuration file
61.Pq Pa /etc/ssh/ssh_config
62.El
588df31a 63.Pp
64For each parameter, the first obtained value
65will be used.
66The configuration files contain sections bracketed by
67.Dq Host
68specifications, and that section is only applied for hosts that
69match one of the patterns given in the specification.
70The matched host name is the one given on the command line.
71.Pp
72Since the first obtained value for each parameter is used, more
73host-specific declarations should be given near the beginning of the
74file, and general defaults at the end.
75.Pp
76The configuration file has the following format:
77.Pp
78Empty lines and lines starting with
79.Ql #
80are comments.
81.Pp
82Otherwise a line is of the format
83.Dq keyword arguments .
84Configuration options may be separated by whitespace or
85optional whitespace and exactly one
86.Ql = ;
87the latter format is useful to avoid the need to quote whitespace
88when specifying configuration options using the
89.Nm ssh ,
90.Nm scp
91and
92.Nm sftp
93.Fl o
94option.
95.Pp
96The possible
97keywords and their meanings are as follows (note that
98keywords are case-insensitive and arguments are case-sensitive):
99.Bl -tag -width Ds
100.It Cm Host
101Restricts the following declarations (up to the next
102.Cm Host
103keyword) to be only for those hosts that match one of the patterns
104given after the keyword.
105.Ql \&*
106and
d0445371 107.Ql \&?
588df31a 108can be used as wildcards in the
109patterns.
110A single
111.Ql \&*
112as a pattern can be used to provide global
113defaults for all hosts.
114The host is the
115.Ar hostname
116argument given on the command line (i.e., the name is not converted to
117a canonicalized host name before matching).
f811e52a 118.It Cm AddressFamily
3cbc677d 119Specifies which address family to use when connecting.
120Valid arguments are
f811e52a 121.Dq any ,
122.Dq inet
123(Use IPv4 only) or
124.Dq inet6
125(Use IPv6 only.)
588df31a 126.It Cm BatchMode
127If set to
128.Dq yes ,
129passphrase/password querying will be disabled.
130This option is useful in scripts and other batch jobs where no user
131is present to supply the password.
132The argument must be
133.Dq yes
134or
135.Dq no .
136The default is
137.Dq no .
138.It Cm BindAddress
139Specify the interface to transmit from on machines with multiple
140interfaces or aliased addresses.
141Note that this option does not work if
142.Cm UsePrivilegedPort
143is set to
144.Dq yes .
145.It Cm ChallengeResponseAuthentication
146Specifies whether to use challenge response authentication.
147The argument to this keyword must be
148.Dq yes
149or
150.Dq no .
151The default is
152.Dq yes .
153.It Cm CheckHostIP
154If this flag is set to
155.Dq yes ,
156ssh will additionally check the host IP address in the
157.Pa known_hosts
158file.
159This allows ssh to detect if a host key changed due to DNS spoofing.
160If the option is set to
161.Dq no ,
162the check will not be executed.
163The default is
164.Dq yes .
165.It Cm Cipher
166Specifies the cipher to use for encrypting the session
167in protocol version 1.
168Currently,
169.Dq blowfish ,
170.Dq 3des ,
171and
172.Dq des
173are supported.
174.Ar des
175is only supported in the
176.Nm ssh
177client for interoperability with legacy protocol 1 implementations
178that do not support the
179.Ar 3des
a4e5acef 180cipher.
181Its use is strongly discouraged due to cryptographic weaknesses.
588df31a 182The default is
183.Dq 3des .
184.It Cm Ciphers
185Specifies the ciphers allowed for protocol version 2
186in order of preference.
187Multiple ciphers must be comma-separated.
3b9baa7b 188The supported ciphers are
189.Dq 3des-cbc ,
190.Dq aes128-cbc ,
191.Dq aes192-cbc ,
192.Dq aes256-cbc ,
193.Dq aes128-ctr ,
194.Dq aes192-ctr ,
195.Dq aes256-ctr ,
196.Dq arcfour ,
197.Dq blowfish-cbc ,
198and
199.Dq cast128-cbc .
588df31a 200The default is
588df31a 201.Bd -literal
202 ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,
203 aes192-cbc,aes256-cbc''
204.Ed
205.It Cm ClearAllForwardings
206Specifies that all local, remote and dynamic port forwardings
207specified in the configuration files or on the command line be
a4e5acef 208cleared.
209This option is primarily useful when used from the
588df31a 210.Nm ssh
211command line to clear port forwardings set in
212configuration files, and is automatically set by
213.Xr scp 1
214and
215.Xr sftp 1 .
216The argument must be
217.Dq yes
218or
219.Dq no .
220The default is
221.Dq no .
222.It Cm Compression
223Specifies whether to use compression.
224The argument must be
225.Dq yes
226or
227.Dq no .
228The default is
229.Dq no .
230.It Cm CompressionLevel
231Specifies the compression level to use if compression is enabled.
232The argument must be an integer from 1 (fast) to 9 (slow, best).
233The default level is 6, which is good for most applications.
234The meaning of the values is the same as in
235.Xr gzip 1 .
236Note that this option applies to protocol version 1 only.
237.It Cm ConnectionAttempts
238Specifies the number of tries (one per second) to make before exiting.
239The argument must be an integer.
240This may be useful in scripts if the connection sometimes fails.
241The default is 1.
09ab3296 242.It Cm ConnectTimeout
243Specifies the timeout (in seconds) used when connecting to the ssh
3cbc677d 244server, instead of using the default system TCP timeout.
245This value is used only when the target is down or really unreachable,
246not when it refuses the connection.
588df31a 247.It Cm DynamicForward
248Specifies that a TCP/IP port on the local machine be forwarded
249over the secure channel, and the application
250protocol is then used to determine where to connect to from the
a4e5acef 251remote machine.
252The argument must be a port number.
f49658f5 253Currently the SOCKS4 and SOCKS5 protocols are supported, and
588df31a 254.Nm ssh
f49658f5 255will act as a SOCKS server.
588df31a 256Multiple forwardings may be specified, and
a4e5acef 257additional forwardings can be given on the command line.
258Only the superuser can forward privileged ports.
f0677b69 259.It Cm EnableSSHKeysign
260Setting this option to
261.Dq yes
262in the global client configuration file
263.Pa /etc/ssh/ssh_config
264enables the use of the helper program
265.Xr ssh-keysign 8
266during
267.Cm HostbasedAuthentication .
268The argument must be
269.Dq yes
270or
271.Dq no .
272The default is
273.Dq no .
246bb171 274This option should be placed in the non-hostspecific section.
f0677b69 275See
276.Xr ssh-keysign 8
277for more information.
588df31a 278.It Cm EscapeChar
279Sets the escape character (default:
280.Ql ~ ) .
281The escape character can also
282be set on the command line.
283The argument should be a single character,
284.Ql ^
285followed by a letter, or
286.Dq none
287to disable the escape
288character entirely (making the connection transparent for binary
289data).
290.It Cm ForwardAgent
291Specifies whether the connection to the authentication agent (if any)
292will be forwarded to the remote machine.
293The argument must be
294.Dq yes
295or
296.Dq no .
297The default is
298.Dq no .
dbcdea68 299.Pp
a4e5acef 300Agent forwarding should be enabled with caution.
301Users with the ability to bypass file permissions on the remote host
302(for the agent's Unix-domain socket)
303can access the local agent through the forwarded connection.
304An attacker cannot obtain key material from the agent,
dbcdea68 305however they can perform operations on the keys that enable them to
306authenticate using the identities loaded into the agent.
588df31a 307.It Cm ForwardX11
308Specifies whether X11 connections will be automatically redirected
309over the secure channel and
310.Ev DISPLAY
311set.
312The argument must be
313.Dq yes
314or
315.Dq no .
316The default is
317.Dq no .
dbcdea68 318.Pp
a4e5acef 319X11 forwarding should be enabled with caution.
320Users with the ability to bypass file permissions on the remote host
d73a67d7 321(for the user's X11 authorization database)
a4e5acef 322can access the local X11 display through the forwarded connection.
d73a67d7 323An attacker may then be able to perform activities such as keystroke monitoring
324if the
325.Cm ForwardX11Trusted
326option is also enabled.
327.It Cm ForwardX11Trusted
b2e90ab5 328If this option is set to
d73a67d7 329.Dq yes
330then remote X11 clients will have full access to the original X11 display.
331If this option is set to
332.Dq no
333then remote X11 clients will be considered untrusted and prevented
334from stealing or tampering with data belonging to trusted X11
335clients.
336.Pp
337The default is
338.Dq no .
339.Pp
340See the X11 SECURITY extension specification for full details on
341the restrictions imposed on untrusted clients.
588df31a 342.It Cm GatewayPorts
343Specifies whether remote hosts are allowed to connect to local
344forwarded ports.
345By default,
346.Nm ssh
a4e5acef 347binds local port forwardings to the loopback address.
348This prevents other remote hosts from connecting to forwarded ports.
588df31a 349.Cm GatewayPorts
350can be used to specify that
351.Nm ssh
352should bind local port forwardings to the wildcard address,
353thus allowing remote hosts to connect to forwarded ports.
354The argument must be
355.Dq yes
356or
357.Dq no .
358The default is
359.Dq no .
360.It Cm GlobalKnownHostsFile
361Specifies a file to use for the global
362host key database instead of
363.Pa /etc/ssh/ssh_known_hosts .
7364bd04 364.It Cm GSSAPIAuthentication
e8dd24a8 365Specifies whether user authentication based on GSSAPI is allowed.
d0445371 366The default is
2ecb78df 367.Dq no .
7364bd04 368Note that this option applies to protocol version 2 only.
369.It Cm GSSAPIDelegateCredentials
370Forward (delegate) credentials to the server.
371The default is
372.Dq no .
373Note that this option applies to protocol version 2 only.
588df31a 374.It Cm HostbasedAuthentication
375Specifies whether to try rhosts based authentication with public key
376authentication.
377The argument must be
378.Dq yes
379or
380.Dq no .
381The default is
382.Dq no .
383This option applies to protocol version 2 only and
384is similar to
385.Cm RhostsRSAAuthentication .
386.It Cm HostKeyAlgorithms
387Specifies the protocol version 2 host key algorithms
388that the client wants to use in order of preference.
389The default for this option is:
390.Dq ssh-rsa,ssh-dss .
391.It Cm HostKeyAlias
392Specifies an alias that should be used instead of the
393real host name when looking up or saving the host key
394in the host key database files.
395This option is useful for tunneling ssh connections
396or for multiple servers running on a single host.
397.It Cm HostName
398Specifies the real host name to log into.
399This can be used to specify nicknames or abbreviations for hosts.
400Default is the name given on the command line.
401Numeric IP addresses are also permitted (both on the command line and in
402.Cm HostName
403specifications).
404.It Cm IdentityFile
405Specifies a file from which the user's RSA or DSA authentication identity
3cbc677d 406is read.
407The default is
588df31a 408.Pa $HOME/.ssh/identity
409for protocol version 1, and
410.Pa $HOME/.ssh/id_rsa
411and
412.Pa $HOME/.ssh/id_dsa
413for protocol version 2.
414Additionally, any identities represented by the authentication agent
415will be used for authentication.
416The file name may use the tilde
417syntax to refer to a user's home directory.
418It is possible to have
419multiple identity files specified in configuration files; all these
420identities will be tried in sequence.
3a065ed0 421.It Cm IdentitiesOnly
422Specifies that
423.Nm ssh
424should only use the authentication identity files configured in the
1e9b1b82 425.Nm
3a065ed0 426files,
427even if the
428.Nm ssh-agent
429offers more identities.
430The argument to this keyword must be
431.Dq yes
432or
433.Dq no .
434This option is intented for situations where
435.Nm ssh-agent
436offers many different identities.
437The default is
438.Dq no .
588df31a 439.It Cm LocalForward
440Specifies that a TCP/IP port on the local machine be forwarded over
441the secure channel to the specified host and port from the remote machine.
442The first argument must be a port number, and the second must be
443.Ar host:port .
444IPv6 addresses can be specified with an alternative syntax:
445.Ar host/port .
446Multiple forwardings may be specified, and additional
447forwardings can be given on the command line.
448Only the superuser can forward privileged ports.
449.It Cm LogLevel
450Gives the verbosity level that is used when logging messages from
451.Nm ssh .
452The possible values are:
453QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3.
a4e5acef 454The default is INFO.
455DEBUG and DEBUG1 are equivalent.
456DEBUG2 and DEBUG3 each specify higher levels of verbose output.
588df31a 457.It Cm MACs
458Specifies the MAC (message authentication code) algorithms
459in order of preference.
460The MAC algorithm is used in protocol version 2
461for data integrity protection.
462Multiple algorithms must be comma-separated.
463The default is
464.Dq hmac-md5,hmac-sha1,hmac-ripemd160,hmac-sha1-96,hmac-md5-96 .
465.It Cm NoHostAuthenticationForLocalhost
466This option can be used if the home directory is shared across machines.
467In this case localhost will refer to a different machine on each of
468the machines and the user will get many warnings about changed host keys.
469However, this option disables host authentication for localhost.
470The argument to this keyword must be
471.Dq yes
472or
473.Dq no .
474The default is to check the host key for localhost.
475.It Cm NumberOfPasswordPrompts
476Specifies the number of password prompts before giving up.
477The argument to this keyword must be an integer.
478Default is 3.
479.It Cm PasswordAuthentication
480Specifies whether to use password authentication.
481The argument to this keyword must be
482.Dq yes
483or
484.Dq no .
485The default is
486.Dq yes .
487.It Cm Port
488Specifies the port number to connect on the remote host.
489Default is 22.
490.It Cm PreferredAuthentications
491Specifies the order in which the client should try protocol 2
3cbc677d 492authentication methods.
493This allows a client to prefer one method (e.g.
588df31a 494.Cm keyboard-interactive )
495over another method (e.g.
496.Cm password )
497The default for this option is:
498.Dq hostbased,publickey,keyboard-interactive,password .
499.It Cm Protocol
500Specifies the protocol versions
501.Nm ssh
502should support in order of preference.
503The possible values are
504.Dq 1
505and
506.Dq 2 .
507Multiple versions must be comma-separated.
508The default is
509.Dq 2,1 .
510This means that
511.Nm ssh
512tries version 2 and falls back to version 1
513if version 2 is not available.
514.It Cm ProxyCommand
515Specifies the command to use to connect to the server.
516The command
517string extends to the end of the line, and is executed with
518.Pa /bin/sh .
519In the command string,
520.Ql %h
521will be substituted by the host name to
522connect and
523.Ql %p
524by the port.
525The command can be basically anything,
526and should read from its standard input and write to its standard output.
527It should eventually connect an
528.Xr sshd 8
529server running on some machine, or execute
530.Ic sshd -i
531somewhere.
532Host key management will be done using the
533HostName of the host being connected (defaulting to the name typed by
534the user).
a4e5acef 535Setting the command to
536.Dq none
f78bde70 537disables this option entirely.
588df31a 538Note that
539.Cm CheckHostIP
540is not available for connects with a proxy command.
541.Pp
542.It Cm PubkeyAuthentication
543Specifies whether to try public key authentication.
544The argument to this keyword must be
545.Dq yes
546or
547.Dq no .
548The default is
549.Dq yes .
550This option applies to protocol version 2 only.
551.It Cm RemoteForward
552Specifies that a TCP/IP port on the remote machine be forwarded over
553the secure channel to the specified host and port from the local machine.
554The first argument must be a port number, and the second must be
555.Ar host:port .
556IPv6 addresses can be specified with an alternative syntax:
557.Ar host/port .
558Multiple forwardings may be specified, and additional
559forwardings can be given on the command line.
560Only the superuser can forward privileged ports.
588df31a 561.It Cm RhostsRSAAuthentication
562Specifies whether to try rhosts based authentication with RSA host
563authentication.
564The argument must be
565.Dq yes
566or
567.Dq no .
568The default is
569.Dq no .
570This option applies to protocol version 1 only and requires
571.Nm ssh
572to be setuid root.
573.It Cm RSAAuthentication
574Specifies whether to try RSA authentication.
575The argument to this keyword must be
576.Dq yes
577or
578.Dq no .
579RSA authentication will only be
580attempted if the identity file exists, or an authentication agent is
581running.
582The default is
583.Dq yes .
584Note that this option applies to protocol version 1 only.
61a2c1da 585.It Cm SendEnv
586Specifies what variables from the local
587.Xr environ 7
588should be sent to the server.
589Note that environment passing is only supported for protocol 2, the
b8b9f2e6 590server must also support it, and the server must be configured to
591accept these environment variables.
61a2c1da 592Refer to
593.Cm AcceptEnv
594in
595.Xr sshd_config 5
596for how to configure the server.
597Variables are specified by name, which may contain the wildcard characters
598.Ql \&*
599and
600.Ql \&? .
b8b9f2e6 601Multiple environment variables may be separated by whitespace or spread
61a2c1da 602across multiple
603.Cm SendEnv
604directives.
605The default is not to send any environment variables.
5d8d32a3 606.It Cm ServerAliveInterval
607Sets a timeout interval in seconds after which if no data has been received
608from the server,
609.Nm ssh
610will send a message through the encrypted
611channel to request a response from the server.
612The default
613is 0, indicating that these messages will not be sent to the server.
614This option applies to protocol version 2 only.
615.It Cm ServerAliveCountMax
616Sets the number of server alive messages (see above) which may be
617sent without
618.Nm ssh
619receiving any messages back from the server.
620If this threshold is reached while server alive messages are being sent,
621.Nm ssh
622will disconnect from the server, terminating the session.
623It is important to note that the use of server alive messages is very
624different from
625.Cm TCPKeepAlive
626(below).
627The server alive messages are sent through the encrypted channel
628and therefore will not be spoofable.
629The TCP keepalive option enabled by
630.Cm TCPKeepAlive
631is spoofable.
632The server alive mechanism is valuable when the client or
633server depend on knowing when a connection has become inactive.
634.Pp
635The default value is 3.
636If, for example,
637.Cm ServerAliveInterval
638(above) is set to 15, and
639.Cm ServerAliveCountMax
640is left at the default, if the server becomes unresponsive ssh
641will disconnect after approximately 45 seconds.
588df31a 642.It Cm SmartcardDevice
3cbc677d 643Specifies which smartcard device to use.
644The argument to this keyword is the device
588df31a 645.Nm ssh
646should use to communicate with a smartcard used for storing the user's
3cbc677d 647private RSA key.
648By default, no device is specified and smartcard support is not activated.
588df31a 649.It Cm StrictHostKeyChecking
650If this flag is set to
651.Dq yes ,
652.Nm ssh
653will never automatically add host keys to the
654.Pa $HOME/.ssh/known_hosts
655file, and refuses to connect to hosts whose host key has changed.
656This provides maximum protection against trojan horse attacks,
657however, can be annoying when the
658.Pa /etc/ssh/ssh_known_hosts
659file is poorly maintained, or connections to new hosts are
660frequently made.
661This option forces the user to manually
662add all new hosts.
663If this flag is set to
664.Dq no ,
665.Nm ssh
666will automatically add new host keys to the
667user known hosts files.
668If this flag is set to
669.Dq ask ,
670new host keys
671will be added to the user known host files only after the user
672has confirmed that is what they really want to do, and
673.Nm ssh
674will refuse to connect to hosts whose host key has changed.
675The host keys of
676known hosts will be verified automatically in all cases.
677The argument must be
678.Dq yes ,
679.Dq no
680or
681.Dq ask .
682The default is
683.Dq ask .
fd573618 684.It Cm TCPKeepAlive
685Specifies whether the system should send TCP keepalive messages to the
686other side.
687If they are sent, death of the connection or crash of one
688of the machines will be properly noticed.
689However, this means that
690connections will die if the route is down temporarily, and some people
691find it annoying.
692.Pp
693The default is
694.Dq yes
695(to send TCP keepalive messages), and the client will notice
696if the network goes down or the remote host dies.
697This is important in scripts, and many users want it too.
698.Pp
699To disable TCP keepalive messages, the value should be set to
700.Dq no .
588df31a 701.It Cm UsePrivilegedPort
702Specifies whether to use a privileged port for outgoing connections.
703The argument must be
704.Dq yes
705or
706.Dq no .
707The default is
708.Dq no .
878b8992 709If set to
710.Dq yes
711.Nm ssh
712must be setuid root.
588df31a 713Note that this option must be set to
714.Dq yes
0598d99d 715for
588df31a 716.Cm RhostsRSAAuthentication
0598d99d 717with older servers.
588df31a 718.It Cm User
719Specifies the user to log in as.
720This can be useful when a different user name is used on different machines.
721This saves the trouble of
722having to remember to give the user name on the command line.
723.It Cm UserKnownHostsFile
724Specifies a file to use for the user
725host key database instead of
726.Pa $HOME/.ssh/known_hosts .
21289cd0 727.It Cm VerifyHostKeyDNS
728Specifies whether to verify the remote key using DNS and SSHFP resource
729records.
0161a13d 730If this option is set to
731.Dq yes ,
dd376e92 732the client will implicitly trust keys that match a secure fingerprint
0161a13d 733from DNS.
734Insecure fingerprints will be handled as if this option was set to
735.Dq ask .
736If this option is set to
737.Dq ask ,
738information on fingerprint match will be displayed, but the user will still
739need to confirm new host keys according to the
740.Cm StrictHostKeyChecking
741option.
742The argument must be
743.Dq yes ,
744.Dq no
dd376e92 745or
746.Dq ask .
21289cd0 747The default is
748.Dq no .
0f92946c 749Note that this option applies to protocol version 2 only.
588df31a 750.It Cm XAuthLocation
57ff5eeb 751Specifies the full pathname of the
588df31a 752.Xr xauth 1
753program.
754The default is
755.Pa /usr/X11R6/bin/xauth .
756.El
757.Sh FILES
758.Bl -tag -width Ds
759.It Pa $HOME/.ssh/config
760This is the per-user configuration file.
761The format of this file is described above.
762This file is used by the
763.Nm ssh
764client.
e1520719 765Because of the potential for abuse, this file must have strict permissions:
766read/write for the user, and not accessible by others.
588df31a 767.It Pa /etc/ssh/ssh_config
768Systemwide configuration file.
769This file provides defaults for those
770values that are not specified in the user's configuration file, and
771for those users who do not have a configuration file.
772This file must be world-readable.
773.El
be193d89 774.Sh SEE ALSO
775.Xr ssh 1
588df31a 776.Sh AUTHORS
777OpenSSH is a derivative of the original and free
778ssh 1.2.12 release by Tatu Ylonen.
779Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos,
780Theo de Raadt and Dug Song
781removed many bugs, re-added newer features and
782created OpenSSH.
783Markus Friedl contributed the support for SSH
784protocol versions 1.5 and 2.0.
This page took 3.259398 seconds and 5 git commands to generate.