summaryrefslogtreecommitdiff
path: root/usr/src/man/man1/ssh.sunssh.1
diff options
context:
space:
mode:
Diffstat (limited to 'usr/src/man/man1/ssh.sunssh.1')
-rw-r--r--usr/src/man/man1/ssh.sunssh.1979
1 files changed, 0 insertions, 979 deletions
diff --git a/usr/src/man/man1/ssh.sunssh.1 b/usr/src/man/man1/ssh.sunssh.1
deleted file mode 100644
index 88d8c56fdc..0000000000
--- a/usr/src/man/man1/ssh.sunssh.1
+++ /dev/null
@@ -1,979 +0,0 @@
-'\" te
-.\" To view license terms, attribution, and copyright for OpenSSH, the default path is /var/sadm/pkg/SUNWsshdr/install/copyright. If the Solaris operating environment has been installed anywhere other than the default, modify the specified path to access the file at
-.\" the installed location.
-.\" Portions Copyright (c) 2009, Sun Microsystems, Inc. All Rights Reserved.
-.TH SSH 1 "May 20, 2009"
-.SH NAME
-ssh \- secure shell client (remote login program)
-.SH SYNOPSIS
-.LP
-.nf
-\fBssh\fR [\fB-l\fR \fIlogin_name\fR] \fIhostname\fR | \fIuser@hostname\fR [ \fIcommand\fR]
-.fi
-
-.LP
-.nf
-\fBssh\fR [\fB-afgknqstvxACNTX1246\fR] [\fB-b\fR \fIbind_address\fR] [\fB-m\fR \fImac_spec\fR]
- [\fB-c\fR \fIcipher_spec\fR] [\fB-e\fR \fIescape_char\fR] [\fB-i\fR \fIidentity_file\fR]
- [\fB-l\fR \fIlogin_name\fR] [\fB-F\fR \fIconfigfile\fR] [\fB-o\fR \fIoption\fR] [\fB-p\fR \fIport\fR]
- [\fB-L\fR [\fIbind_address\fR\fB:\fR]\fIport\fR\fB:\fR\fIhost\fR\fB:\fR\fIhostport\fR]
- [\fB-R\fR [\fIbind_address\fR\fB:\fR]\fIport\fR\fB:\fR\fIhost\fR\fB:\fR\fIhostport\fR]
- [\fB-D\fR [\fIbind_address\fR\fB:\fR]\fIport\fR] \fIhostname\fR | \fIuser\fR\fB@\fR\fIhostname\fR [\fIcommand\fR]
-.fi
-
-.SH DESCRIPTION
-.LP
-\fBssh\fR (Secure Shell) is a program for logging into a remote machine and for
-executing commands on a remote machine. It is intended to replace \fBrlogin\fR
-and \fBrsh\fR, and to provide secure encrypted communications between two
-untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP
-ports can also be forwarded over the secure channel.
-.sp
-.LP
-\fBssh\fR connects and logs into the specified hostname. The user must prove
-his or her identity to the remote machine using one of several methods
-depending on the protocol version used:
-.SS "SSH Protocol Version 1"
-.LP
-First, if the machine the user logs in from is listed in \fB/etc/hosts.equiv\fR
-or \fB/etc/shosts.equiv\fR on the remote machine, and the user names are the
-same on both sides, the user is immediately permitted to log in. Second,
-if .\fBrhosts\fR or \fB\&.shosts\fR exists in the user's home directory on the
-remote machine and contains a line containing the name of the client machine
-and the name of the user on that machine, the user is permitted to log in. This
-form of authentication alone is normally not allowed by the server because it
-is not secure.
-.sp
-.LP
-The second (and primary) authentication method is the \fBrhosts\fR or
-\fBhosts.equiv\fR method combined with RSA-based host authentication. It means
-that if the login would be permitted by \fB$HOME/.rhosts\fR,
-\fB$HOME/.shosts\fR, \fB/etc/hosts.equiv\fR, or \fB/etc/shosts.equiv\fR, and if
-additionally the server can verify the client's host key (see
-\fB/etc/ssh_known_hosts\fR in the FILES section), only then is login permitted.
-This authentication method closes security holes due to \fBIP\fR spoofing,
-\fBDNS\fR spoofing, and routing spoofing.
-.sp
-.LP
-\fBNote to the administrator:\fR \fB/etc/hosts.equiv\fR, \fB$HOME/.rhosts\fR,
-and the rlogin/rsh protocol in general, are inherently insecure and should be
-disabled if security is desired.
-.sp
-.LP
-As a third authentication method, \fBssh\fR supports \fBRSA\fR-based
-authentication. The scheme is based on public-key cryptography. There are
-cryptosystems where encryption and decryption are done using separate keys, and
-it is not possible to derive the decryption key from the encryption key.
-\fBRSA\fR is one such system. The idea is that each user creates a
-public/private key pair for authentication purposes. The server knows the
-public key, and only the user knows the private key. The file
-\fB$HOME/.ssh/authorized_keys\fR lists the public keys that are permitted for
-logging in. When the user logs in, the \fBssh\fR program tells the server which
-key pair it would like to use for authentication. The server checks if this key
-is permitted, and if so, sends the user (actually the \fBssh\fR program running
-on behalf of the user) a challenge in the form of a random number, encrypted by
-the user's public key. The challenge can only be decrypted using the proper
-private key. The user's client then decrypts the challenge using the private
-key, proving that he or she knows the private key but without disclosing it to
-the server.
-.sp
-.LP
-\fBssh\fR implements the \fBRSA\fR authentication protocol automatically. The
-user creates his or her \fBRSA\fR key pair by running \fBssh-keygen\fR(1). This
-stores the private key in \fB$HOME/.ssh/identity\fR and the public key in
-\fB$HOME/.ssh/identity.pub\fR in the user's home directory. The user should
-then copy the \fBidentity.pub\fR to \fB$HOME/.ssh/authorized_keys\fR in his or
-her home directory on the remote machine (the \fBauthorized_keys\fR file
-corresponds to the conventional \fB$HOME/.rhosts\fR file, and has one key per
-line, though the lines can be very long). After this, the user can log in
-without giving the password. \fBRSA\fR authentication is much more secure than
-\fBrhosts\fR authentication.
-.sp
-.LP
-The most convenient way to use \fBRSA\fR authentication can be with an
-authentication agent. See \fBssh-agent\fR(1) for more information.
-.sp
-.LP
-If other authentication methods fail, \fBssh\fR prompts the user for a
-password. The password is sent to the remote host for checking. However, since
-all communications are encrypted, the password cannot be seen by someone
-listening on the network.
-.SS "SSH Protocol Version 2"
-.LP
-The SSH version 2 protocol supports multiple user authentication methods, some
-of which are similar to those available with the SSH protocol version 1. These
-authentication mechanisms are negotiated by the client and server, with the
-client trying methods in the order specified in the
-\fBPreferredAuthentications\fR client configuration option. The server decides
-when enough authentication methods have passed successfully so as to complete
-the authentication phase of the protocol.
-.sp
-.LP
-When a user connects by using protocol version 2, similar authentication
-methods are available. Using the default values for
-\fBPreferredAuthentications\fR, the client tries to authenticate first by using
-the hostbased method. If this method fails, public key authentication is
-attempted. Finally, if this method fails, keyboard-interactive and password
-authentication are tried.
-.sp
-.LP
-The public key method is similar to \fBRSA\fR authentication described in the
-previous section and allows the \fBRSA\fR or \fBDSA\fR algorithm to be used:
-The client uses his or her private key, \fB$HOME/.ssh/id_dsa\fR or
-\fB$HOME/.ssh/id_rsa\fR, to sign the session identifier and sends the result to
-the server. The server checks whether the matching public key is listed in
-\fB$HOME/.ssh/authorized_keys\fR and grants access if both the key is found and
-the signature is correct. The session identifier is derived from a shared
-Diffie-Hellman value and is only known to the client and the server.
-.sp
-.LP
-If public key authentication fails or is not available, a password can be sent
-encrypted to the remote host for proving the user's identity, or an extended
-prompt/reply protocol can be engaged.
-.sp
-.LP
-Additionally, \fBssh\fR supports hostbased or challenge response
-authentication.
-.sp
-.LP
-Protocol 2 provides additional mechanisms for confidentiality (the traffic is
-encrypted using 3DES, Blowfish, CAST128 or Arcfour) and integrity
-(\fBhmac-sha1\fR, \fBhmac-md5\fR). Protocol 1 lacks a strong mechanism for
-ensuring the integrity of the connection.
-.SS "Login Session and Remote Execution"
-.LP
-When the user's identity has been accepted by the server, the server either
-executes the specified command, or logs into the machine and gives the user a
-normal shell on the remote machine. All communication with the remote command
-or shell is automatically encrypted.
-.sp
-.LP
-If a pseudo-terminal has been allocated (normal login session), the user can
-use the escape characters noted below. If a pseudo-terminal has been allocated
-(normal login session), the user can disconnect with \fB~.\fR, and suspend
-\fBssh\fR with \fB~^Z\fR. All forwarded connections can be listed with
-\fB~#\fR. If the session blocks waiting for forwarded X11 or TCP/IP connections
-to terminate, \fBssh\fR can be backgrounded with \fB~&\fR, although this should
-not be used while the user shell is active, as it can cause the shell to hang.
-All available escapes can be listed with \fB~?\fR.
-.sp
-.LP
-A single tilde character can be sent as \fB~~\fR, or by following the tilde
-with a character other than those described above. The escape character must
-always follow a newline to be interpreted as special. The escape character can
-be changed in configuration files or on the command line.
-.sp
-.LP
-If no pseudo tty has been allocated, the session is transparent and can be used
-to reliably transfer binary data. On most systems, setting the escape character
-to "\fBnone\fR" also makes the session transparent even if a tty is used.
-.sp
-.LP
-The session terminates when the command or shell on the remote machine exits
-and all X11 and TCP/IP connections have been closed. The exit status of the
-remote program is returned as the exit status of \fBssh\fR.
-.SS "Escape Characters"
-.LP
-When a pseudo-terminal has been requested, \fBssh\fR supports a number of
-functions through the use of an escape character.
-.sp
-.LP
-A single tilde character can be sent as \fB~~\fR or by following the tilde with
-a character other than those described below. The escape character must always
-follow a newline to be interpreted as special. The escape character can be
-changed in configuration files using the \fBEscapeChar\fR configuration
-directive or on the command line by the \fB-e\fR option.
-.sp
-.LP
-The supported escapes, assuming the default \fB~\fR, are:
-.sp
-.ne 2
-.na
-\fB\fB~.\fR\fR
-.ad
-.RS 7n
-Disconnect.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB~^Z\fR\fR
-.ad
-.RS 7n
-Background \fBssh\fR.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB~#\fR\fR
-.ad
-.RS 7n
-List forwarded connections.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB~&\fR\fR
-.ad
-.RS 7n
-Background \fBssh\fR at logout when waiting for forwarded connection / X11
-sessions to terminate.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB~?\fR\fR
-.ad
-.RS 7n
-Display a list of escape characters.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB~B\fR\fR
-.ad
-.RS 7n
-Send a break to the remote system. Only useful for SSH protocol version 2 and
-if the peer supports it.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB~C\fR\fR
-.ad
-.RS 7n
-Open command line. Only useful for adding port forwardings using the \fB-L\fR
-and \fB-R\fR options).
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB~R\fR\fR
-.ad
-.RS 7n
-Request rekeying of the connection. Only useful for SSH protocol version 2 and
-if the peer supports it.
-.RE
-
-.SS "X11 and TCP Forwarding"
-.LP
-If the \fBForwardX11\fR variable is set to ``\fByes\fR'' (or, see the
-description of the \fB-X\fR and \fB-x\fR options described later) and the user
-is using X11 (the \fBDISPLAY\fR environment variable is set), the connection to
-the X11 display is automatically forwarded to the remote side in such a way
-that any X11 programs started from the shell (or command) goes through the
-encrypted channel, and the connection to the real X server is made from the
-local machine. The user should not manually set \fBDISPLAY\fR. Forwarding of
-X11 connections can be configured on the command line or in configuration
-files.
-.sp
-.LP
-The \fBDISPLAY\fR value set by \fBssh\fR points to the server machine, but with
-a display number greater than zero. This is normal behavior, because \fBssh\fR
-creates a "proxy" X11 server on the server machine for forwarding the
-connections over the encrypted channel.
-.sp
-.LP
-\fBssh\fR also automatically sets up \fBXauthority\fR data on the server
-machine. For this purpose, it generates a random authorization cookie, store it
-in \fBXauthority\fR on the server, and verify that any forwarded connections
-carry this cookie and replace it by the real cookie when the connection is
-opened. The real authentication cookie is never sent to the server machine (and
-no cookies are sent in the plain).
-.sp
-.LP
-If the \fBForwardAgent\fR variable is set to "\fByes\fR" (or, see the
-description of the \fB-A\fR and \fB-a\fR options described later) and the user
-is using an authentication agent, the connection to the agent is automatically
-forwarded to the remote side.
-.sp
-.LP
-Forwarding of arbitrary TCP/IP connections over the secure channel can be
-specified either on the command line or in a configuration file. One possible
-application of TCP/IP forwarding is a secure connection to an electronic purse.
-Another possible application is firewall traversal.
-.SS "Server Authentication"
-.LP
-\fBssh\fR automatically maintains and checks a database containing
-identifications for all hosts it has ever been used with. Host keys are stored
-in \fB$HOME/.ssh/known_hosts\fR in the user's home directory. Additionally, the
-file \fB/etc/ssh_known_hosts\fR is automatically checked for known hosts. The
-behavior of \fBssh\fR with respect to unknown host keys is controlled by the
-\fBStrictHostKeyChecking\fR parameter. If a host's identification ever changes,
-\fBssh\fR warns about this and disables password authentication to prevent a
-trojan horse from getting the user's password. Another purpose of this
-mechanism is to prevent attacks by intermediaries which could otherwise be used
-to circumvent the encryption. The \fBStrictHostKeyChecking\fR option can be
-used to prevent logins to machines whose host key is not known or has changed.
-.sp
-.LP
-However, when using key exchange protected by GSS-API, the server can advertise
-a host key. The client automatically adds this host key to its known hosts
-file, \fB$HOME/.ssh/known_hosts\fR, regardless of the setting of the
-\fBStrictHostKeyChecking\fR option, unless the advertised host key collides
-with an existing known hosts entry.
-.sp
-.LP
-When the user's GSS-API credentials expire, the client continues to be able to
-rekey the session using the server's public host key to protect the key
-exchanges.
-.SS "GSS-API User and Server Authentication"
-.LP
-\fBssh\fR uses the user's GSS-API credentials to authenticate the client to the
-server wherever possible, if \fBGssKeyEx\fR and/or \fBGssAuthentication\fR are
-set.
-.sp
-.LP
-With \fBGssKeyEx\fR, one can have an SSHv2 server that has no host public keys,
-so that only \fBGssKeyEx\fR can be used. With such servers, rekeying fails if
-the client's credentials are expired.
-.sp
-.LP
-GSS-API user authentication has the disadvantage that it does not obviate the
-need for SSH host keys, but its failure does not impact rekeying. \fBssh\fR can
-try other authentication methods (such as public key, password, and so on) if
-GSS-API authentication fails.
-.sp
-.LP
-Delegation of GSS-API credentials can be quite useful, but is not without
-danger. As with passwords, users should not delegate GSS credentials to
-untrusted servers, since a compromised server can use a user's delegated GSS
-credentials to impersonate the user.
-.sp
-.LP
-GSS-API user authorization is covered in \fBgss_auth_rules\fR(5).
-.sp
-.LP
-Rekeying can be used to redelegate credentials when \fBGssKeyEx\fR is
-"\fByes\fR". (See \fB~R\fR under \fBEscape Characters\fR above.)
-.SH OPTIONS
-.LP
-The following options are supported:
-.sp
-.ne 2
-.na
-\fB\fB-1\fR\fR
-.ad
-.sp .6
-.RS 4n
-Forces \fBssh\fR to try protocol version 1 only.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-2\fR\fR
-.ad
-.sp .6
-.RS 4n
-Forces \fBssh\fR to try protocol version 2 only.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-4\fR\fR
-.ad
-.sp .6
-.RS 4n
-Forces \fBssh\fR to use IPv4 addresses only.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-6\fR\fR
-.ad
-.sp .6
-.RS 4n
-Forces \fBssh\fR to use IPv6 addresses only.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-a\fR\fR
-.ad
-.sp .6
-.RS 4n
-Disables forwarding of the authentication agent connection.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-A\fR\fR
-.ad
-.sp .6
-.RS 4n
-Enables forwarding of the authentication agent connection. This can also be
-specified on a per-host basis in a configuration file.
-.sp
-Agent forwarding should be enabled with caution. Users with the ability to
-bypass file permissions on the remote host (for the agent's UNIX-domain socket)
-can access the local agent through the forwarded connection. An attacker cannot
-obtain key material from the agent. However, the attacker can perform
-operations on the keys that enable the attacker to authenticate using the
-identities loaded into the agent.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-b\fR \fIbind_address\fR\fR
-.ad
-.sp .6
-.RS 4n
-Specifies the interface to transmit from on machines with multiple interfaces
-or aliased addresses.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-c\fR \fIcipher_spec\fR\fR
-.ad
-.sp .6
-.RS 4n
-Selects the cipher specification for encrypting the session.
-.sp
-For protocol version 1, \fIcipher_spec\fR is a single cipher. See the
-\fBCipher\fR option in \fBssh_config\fR(4) for more information.
-.sp
-For protocol version 2, \fIcipher_spec\fR is a comma-separated list of ciphers
-listed in order of preference. See the \fICiphers\fR option in
-\fBssh_config\fR(4) for more information.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-C\fR\fR
-.ad
-.sp .6
-.RS 4n
-Requests compression of all data (including stdin, stdout, stderr, and data for
-forwarded X11 and TCP/IP connections). The compression algorithm is the same
-used by \fBgzip\fR(1). The \fBgzip\fR man page is available in the
-\fBSUNWsfman\fR package. The "level" can be controlled by the
-\fBCompressionLevel\fR option (see \fBssh_config\fR(4)). Compression is
-desirable on modem lines and other slow connections, but only slows down things
-on fast networks. The default value can be set on a host-by-host basis in the
-configuration files. See the \fBCompression\fR option in \fBssh_config\fR(4).
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-D\fR [\fIbind_address\fR\fB:\fR]\fIport\fR\fR
-.ad
-.sp .6
-.RS 4n
-Specifies a local \fBdynamic\fR application-level port forwarding. This works
-by allocating a socket to listen to port on the local side, optionally bound to
-the specified \fIbind_address\fR. Whenever a connection is made to this port,
-the connection is forwarded over the secure channel. The application protocol
-is then used to determine where to connect to from the remote machine.
-Currently, the \fBSOCKS4\fR and \fBSOCKS5\fR protocols are supported and
-\fBssh\fR acts as a SOCKS server. Only a user with enough privileges can
-forward privileged ports. Dynamic port forwardings can also be specified in the
-configuration file.
-.sp
-IPv6 addresses can be specified with an alternative syntax:
-\fB[\fR\fIbind_address\fR\fB/]\fR\fIport\fR or by enclosing the address in
-square brackets. By default, the local port is bound in accordance with the
-\fBGatewayPorts\fR setting. However, an explicit \fIbind_address\fR can be used
-to bind the connection to a specific address. The \fIbind_address\fR of
-\fBlocalhost\fR indicates that the listening port be bound for local use only,
-while an empty address or \fB*\fR indicates that the port should be available
-from all interfaces.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-e\fR \fIch\fR | ^\fIch\fR | none\fR
-.ad
-.sp .6
-.RS 4n
-Sets the escape character for sessions with a pty (default: `\fB~\fR'). The
-escape character is only recognized at the beginning of a line. The escape
-character followed by a dot (\fB\&.\fR) closes the connection. If followed by
-CTRL-z, the escape character suspends the connection. If followed by itself,
-the escape character sends itself once. Setting the character to \fBnone\fR
-disables any escapes and makes the session fully transparent.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-f\fR\fR
-.ad
-.sp .6
-.RS 4n
-Requests \fBssh\fR to go to background just before command execution. This is
-useful if \fBssh\fR is going to ask for passwords or passphrases, but the user
-wants it in the background. This implies the \fB-n\fR option. The recommended
-way to start X11 programs at a remote site is with something like \fBssh\fR
-\fB-f\fR \fIhost\fR \fIxterm\fR.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-F\fR \fIconfigfile\fR\fR
-.ad
-.sp .6
-.RS 4n
-Specifies an alternative per-user configuration file. If a configuration file
-is specified on the command line, the system-wide configuration file,
-\fB/etc/ssh_config\fR, is ignored. The default for the per-user configuration
-file is \fB$HOME/.ssh/config\fR.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-g\fR\fR
-.ad
-.sp .6
-.RS 4n
-Allows remote hosts to connect to local forwarded ports.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-i\fR \fIidentity_file\fR\fR
-.ad
-.sp .6
-.RS 4n
-Selects a file from which the identity (private key) for \fBRSA\fR or \fBDSA\fR
-authentication is read. The default is \fB$HOME/.ssh/identity\fR for protocol
-version 1, and \fB$HOME/.ssh/id_rsa\fR and \fB$HOME/.ssh/id_dsa\fR for protocol
-version 2. Identity files can also be specified on a per-host basis in the
-configuration file. It is possible to have multiple \fB-i\fR options (and
-multiple identities specified in configuration files).
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-l\fR \fIlogin_name\fR\fR
-.ad
-.sp .6
-.RS 4n
-Specifies the user to log in as on the remote machine. This also can be
-specified on a per-host basis in the configuration file.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-L\fR [\fIbind_address:\fR]\fIport\fR:\fIhost\fR:\fIhostport\fR\fR
-.ad
-.sp .6
-.RS 4n
-Specifies that the specified port on the local (client) host is to be forwarded
-to the specified host and port on the remote side. This works by allocating a
-socket to listen to the port on the local side, optionally bound to the
-specified \fIbind_address\fR. Then, whenever a connection is made to this port,
-the connection is forwarded over the secure channel and a connection is made to
-host port \fIhostport\fR from the remote machine. Port forwardings can also be
-specified in the configuration file. Only a user with enough privileges can
-forward privileged ports. IPv6 addresses can be specified with an alternative
-syntax: \fB[\fR\fIbind_address\fR\fB/]\fR\fIport\fR\fB/\fR\fIhost\fR\fB/\fR\fIh
-ostport\fR or by enclosing the address in square brackets.
-.sp
-By default, the local port is bound in accordance with the \fBGatewayPorts\fR
-setting. However, an explicit \fIbind_address\fR can be used to bind the
-connection to a specific address. The \fIbind_address\fR of \fBlocalhost\fR
-indicates that the listening port be bound for local use only, while an empty
-address or \fB*\fR indicates that the port should be available from all
-interfaces.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-m\fR \fImac_spec\fR\fR
-.ad
-.sp .6
-.RS 4n
-Additionally, for protocol version 2 a comma-separated list of \fBMAC\fR
-(message authentication code) algorithms can be specified in order of
-preference. See the MACs keyword for more information.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-n\fR\fR
-.ad
-.sp .6
-.RS 4n
-Redirects \fBstdin\fR from \fB/dev/null\fR (actually, prevents reading from
-\fBstdin\fR). This must be used when \fBssh\fR is run in the background. A
-common trick is to use this to run X11 programs on a remote machine. For
-example,
-.sp
-.in +2
-.nf
-ssh -n shadows.cs.hut.fi emacs &
-.fi
-.in -2
-.sp
-
-starts an \fBemacs\fR on \fBshadows.cs.hut.fi\fR, and the X11 connection is
-automatically forwarded over an encrypted channel. The \fBssh\fR program is put
-in the background. This does not work if \fBssh\fR needs to ask for a password
-or passphrase. See also the \fB-f\fR option.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-N\fR\fR
-.ad
-.sp .6
-.RS 4n
-Does not execute a remote command. This is useful if you just want to forward
-ports (protocol version 2 only).
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-o\fR \fIoption\fR\fR
-.ad
-.sp .6
-.RS 4n
-Can be used to give options in the format used in the configuration file. This
-is useful for specifying options for which there is no separate command-line
-flag. The option has the same format as a line in the configuration file.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-p\fR \fIport\fR\fR
-.ad
-.sp .6
-.RS 4n
-Specifies the port to connect to on the remote host. This can be specified on a
-per-host basis in the configuration file.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-P\fR\fR
-.ad
-.sp .6
-.RS 4n
-Obsoleted option. SSHv1 connections from privileged ports are not supported.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-q\fR\fR
-.ad
-.sp .6
-.RS 4n
-Quiet mode. Causes all warning and diagnostic messages to be suppressed. Only
-fatal errors are displayed.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-R\fR [\fIbind_address\fR:]\fIport\fR:\fIhost\fR:\fIhostport\fR\fR
-.ad
-.sp .6
-.RS 4n
-Specifies that the specified port on the remote (server) host is to be
-forwarded to the specified host and port on the local side. This works by
-allocating a socket to listen to the port on the remote side. Then, whenever a
-connection is made to this port, the connection is forwarded over the secure
-channel and a connection is made to host port \fIhostport\fR from the local
-machine. Port forwardings can also be specified in the configuration file.
-Privileged ports can be forwarded only when logging in on the remote machine as
-a user with enough privileges.
-.sp
-IPv6 addresses can be specified by enclosing the address in square braces or
-using an alternative syntax: \fB[\fR\fIbind_address\fR\fB/]\fR\fIhost\fR\fB/\fR
-\fIport\fR\fB/\fR\fIhostport\fR.
-.sp
-By default, the listening socket on the server is bound to the loopback
-interface only. This can be overridden by specifying a \fIbind_address\fR. An
-empty \fIbind_address\fR, or the address \fB*\fR, indicates that the remote
-socket should listen on all interfaces. Specifying a remote \fIbind_address\fR
-only succeeds if the server's \fBGatewayPorts\fR option is enabled. See
-\fBsshd_config\fR(4).
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-s\fR\fR
-.ad
-.sp .6
-.RS 4n
-Can be used to request invocation of a subsystem on the remote system.
-Subsystems are a feature of the SSH2 protocol which facilitate the use of SSH
-as a secure transport for other applications, for example, \fBsftp\fR. The
-subsystem is specified as the remote command.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-t\fR\fR
-.ad
-.sp .6
-.RS 4n
-Forces pseudo-tty allocation. This can be used to execute arbitrary
-screen-based programs on a remote machine, which can be very useful, for
-example, when implementing menu services. Multiple \fB-t\fR options force
-allocation, even if \fBssh\fR has no local \fBtty\fR.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-T\fR\fR
-.ad
-.sp .6
-.RS 4n
-Disables pseudo-tty allocation (protocol version 2 only).
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-v\fR\fR
-.ad
-.sp .6
-.RS 4n
-Verbose mode. Causes \fBssh\fR to print debugging messages about its progress.
-This is helpful in debugging connection, authentication, and configuration
-problems. Multiple \fB-v\fR options increase the verbosity. Maximum is 3.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-x\fR\fR
-.ad
-.sp .6
-.RS 4n
-Disables X11 forwarding.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB-X\fR\fR
-.ad
-.sp .6
-.RS 4n
-Enables X11 forwarding. This can also be specified on a per-host basis in a
-configuration file.
-.sp
-X11 forwarding should be enabled with caution. Users with the ability to bypass
-file permissions on the remote host (for the user's X authorization database)
-can access the local X11 display through the forwarded connection. An attacker
-can then be able to perform activities such as keystroke monitoring.
-.sp
-For this reason, X11 forwarding might be subjected to X11 SECURITY extension
-restrictions. Refer to the \fBForwardX11Trusted\fR directive in
-\fBssh_config\fR(4) for more information.
-.sp
-If X11 forwarding is enabled, remote X11 clients is trusted by default. This
-means that they have full access to the original X11 display.
-.RE
-
-.SH ENVIRONMENT VARIABLES
-.LP
-\fBssh\fR normally sets the following environment variables:
-.sp
-.ne 2
-.na
-\fB\fBDISPLAY\fR\fR
-.ad
-.sp .6
-.RS 4n
-The \fBDISPLAY\fR variable must be set for X11 display forwarding to work.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fBSSH_ASKPASS\fR\fR
-.ad
-.sp .6
-.RS 4n
-If \fBssh\fR needs a passphrase, it reads the passphrase from the current
-terminal if it was run from a terminal. If \fBssh\fR does not have a terminal
-associated with it but \fBDISPLAY\fR and \fBSSH_ASKPASS\fR are set, it executes
-the program specified by \fBSSH_ASKPASS\fR and opens an X11 window to read the
-passphrase. This is particularly useful when calling \fBssh\fR from a .Xsession
-or related script. On some machines it might be necessary to redirect the input
-from \fB/dev/null\fR to make this work. The system is shipped with
-\fB/usr/lib/ssh/ssh-askpass\fR which is the default value for \fBSSH_ASKPASS\fR
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fBSSH_AUTH_SOCK\fR\fR
-.ad
-.sp .6
-.RS 4n
-Indicates the path of a unix-domain socket used to communicate with the agent.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fBSSH_LANGS\fR\fR
-.ad
-.sp .6
-.RS 4n
-A comma-separated list of IETF language tags (see RFC3066) indicating the
-languages that the user can read and write. Used for negotiation of the locale
-on the server.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fBLANG\fR, \fBLC_ALL\fR, \fBLC_COLLATE\fR, \fBLC_CTYPE\fR,\fR
-.ad
-.br
-.na
-\fB\fBLC_MESSAGES\fR, \fBLC_MONETARY\fR, \fBLC_NUMERIC\fR, \fBLC_TIME\fR\fR
-.ad
-.sp .6
-.RS 4n
-The values of these environment variables can be set in remote sessions
-according to the locale settings on the client side and availability of support
-for those locales on the server side. Environment Variable Passing (see \fIRFC
-4254\fR) is used for passing them over to the server side.
-.RE
-
-.sp
-.LP
-See the \fBENVIRONMENT VARIABLES\fR section in the \fBsshd\fR(1M) man page for
-more information on how locale setting can be further changed depending on
-server side configuration.
-.SH EXIT STATUS
-.LP
-The status of the remote program is returned as the exit status of \fBssh\fR.
-\fB255\fR is returned if an error occurred at anytime during the \fBssh\fR
-connection, including the initial key exchange.
-.SH FILES
-.ne 2
-.na
-\fB\fB$HOME/.ssh/known_hosts\fR\fR
-.ad
-.RS 26n
-Records host keys for all hosts the user has logged into that are not in
-\fB/etc/ssh/ssh_known_hosts\fR. See \fBsshd\fR(1M).
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB$HOME/.ssh/identity\fR\fR
-.ad
-.br
-.na
-\fB\fB$HOME/.ssh/id_dsa\fR\fR
-.ad
-.br
-.na
-\fB\fB$HOME/.ssh/id_ssa\fR\fR
-.ad
-.RS 26n
-Contains the authentication identity of the user. These files are for protocol
-1 \fBRSA\fR, protocol 2 \fBDSA\fR, and protocol 2 \fBRSA\fR, respectively.
-These files contain sensitive data and should be readable by the user but not
-accessible by others (read/write/execute). \fBssh\fR ignores a private key file
-if it is accessible by others. It is possible to specify a passphrase when
-generating the key. The passphrase is used to encrypt the sensitive part of
-this file using \fB3DES\fR.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB/etc/ssh/sshrc\fR\fR
-.ad
-.RS 26n
-Commands in this file are executed by \fBssh\fR when the user logs in just
-before the user's shell or command is started. See \fBsshd\fR(1M) for more
-information.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB$HOME/.ssh/rc\fR\fR
-.ad
-.RS 26n
-Commands in this file are executed by \fBssh\fR when the user logs in just
-before the user's shell or command is started. See \fBsshd\fR(1M) for more
-information.
-.RE
-
-.sp
-.ne 2
-.na
-\fB\fB$HOME/.ssh/environment\fR\fR
-.ad
-.RS 26n
-Contains additional definitions for environment variables. See ENVIRONMENT
-VARIABLES.
-.RE
-
-.SH ATTRIBUTES
-.LP
-See \fBattributes\fR(5) for descriptions of the following attributes:
-.sp
-
-.sp
-.TS
-box;
-c | c
-l | l .
-ATTRIBUTE TYPE ATTRIBUTE VALUE
-_
-Interface Stability See below.
-.TE
-
-.sp
-.LP
-The command line syntax is Committed. The remote locale selection through
-passing \fBLC_*\fR environment variables is Uncommitted.
-.SH SEE ALSO
-.LP
-\fBrlogin\fR(1), \fBrsh\fR(1), \fBscp\fR(1), \fBssh-add\fR(1),
-\fBssh-agent\fR(1), \fBssh-keygen\fR(1), \fBssh-http-proxy-connect\fR(1),
-\fBssh-socks5-proxy-connect\fR(1), \fBtelnet\fR(1), \fBsshd\fR(1M),
-\fBssh_config\fR(4), \fBsshd_config\fR(4), \fBattributes\fR(5),
-\fBgss_auth_rules\fR(5), \fBkerberos\fR(5), \fBprivileges\fR(5)
-.sp
-.LP
-\fIRFC 1928\fR
-.sp
-.LP
-\fIRFC 4254\fR