Lines Matching +full:background +full:- +full:layer

78 .Ux Ns -domain
108 .Bl -tag -width Ds -compact
121 .Xr ssh-agent 1 .
122 This can also be specified on a per-host basis in a configuration file.
127 .Ux Ns -domain
155 .Ux Ns -domain
161 The default value can be set on a host-by-host basis in the
170 is a comma-separated list of ciphers
186 application-level port forwarding.
230 followed by control-Z suspends the connection;
237 Specifies an alternative per-user configuration file.
239 the system-wide configuration file
242 The default for the per-user configuration file is
251 to go to background just before command execution.
255 wants it in the background.
260 .Ic ssh -f host xterm .
269 before placing itself in the background.
301 .Xr ssh-agent 1
312 a per-host basis in the configuration file.
323 .Pa -cert.pub
337 Note that configuration directives supplied on the command-line generally
344 Enables GSSAPI-based authentication and forwarding (delegation) of GSSAPI
411 This also may be specified on a per-host basis in the configuration file.
426 .Xr ssh-askpass 1
436 A comma-separated list of MAC (message authentication code) algorithms,
459 is run in the background.
462 .Ic ssh -n shadows.cs.hut.fi emacs &
467 program will be put in the background.
501 command-line flag.
505 .Bl -tag -width Ds -offset indent -compact
611 per-host basis in the configuration file.
617 .Ar cipher-auth
629 .Ar key-ca-sign
631 .Ar key-cert
633 .Ar key-plain
634 (non-certificate key types),
635 .Ar key-sig
637 .Ar protocol-version
727 .Ic -O forward ,
756 Disable pseudo-terminal allocation.
759 Force pseudo-terminal allocation.
761 screen-based programs on a remote machine, which can be very useful,
829 .Dq point-to-point .
837 This can also be specified on a per-host basis in a configuration file.
873 a per-user configuration file and a system-wide configuration file.
880 GSSAPI-based authentication,
881 host-based authentication,
883 keyboard-interactive authentication,
890 Host-based authentication works as follows:
895 on the remote machine, the user is non-root and the user names are
922 The scheme is based on public-key cryptography,
959 .Xr ssh-keygen 1 .
966 (authenticator-hosted ECDSA),
970 (authenticator-hosted Ed25519),
980 (authenticator-hosted ECDSA),
984 (authenticator-hosted Ed25519),
1008 .Xr ssh-keygen 1
1014 .Xr ssh-agent 1
1021 Keyboard-interactive authentication works as follows:
1025 Examples of keyboard-interactive authentication include
1030 .Pf non- Ox
1053 server spoofing or man-in-the-middle attacks,
1061 either executes the given command in a non-interactive session or,
1069 by default will only request a pseudo-terminal (pty) for interactive
1077 If a pseudo-terminal has been allocated, the
1080 If no pseudo-terminal has been allocated,
1089 When a pseudo-terminal has been requested,
1107 .Bl -tag -width Ds
1111 Background
1116 Background
1132 It also allows the cancellation of existing port-forwardings
1145 for dynamic port-forwardings.
1192 .Bd -literal -offset 4n
1193 $ ssh -f -L 6667:localhost:6667 server.example.com sleep 10
1194 $ irc -c '#users' pinky IRC/127.0.0.1
1271 .Xr ssh-keygen 1 :
1273 .Dl $ ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key
1278 .Xr ssh-keygen 1
1303 .Dl $ ssh-keygen -lv -f ~/.ssh/known_hosts
1318 .Bd -literal -offset indent
1319 $ ssh-keygen -r host.example.com.
1325 .Dl $ dig -t SSHFP host.example.com
1328 .Bd -literal -offset indent
1329 $ ssh -o "VerifyHostKeyDNS ask" host.example.com
1340 .Sh SSH-BASED VIRTUAL PRIVATE NETWORKS
1345 network pseudo-device,
1352 and at what level (layer 2 or 3 traffic).
1355 with remote network 10.0.99.0/24 using a point-to-point connection
1361 .Bd -literal -offset indent
1362 # ssh -f -w 0:1 192.168.1.15 true
1368 .Bd -literal -offset indent
1387 .Dq forced-commands-only :
1388 .Bd -literal -offset 2n
1389 tunnel="1",command="sh /etc/netstart tun1" ssh-rsa ... jane
1390 tunnel="2",command="sh /etc/netstart tun2" ssh-rsa ... john
1393 Since an SSH-based setup entails a fair amount of overhead,
1403 .Bl -tag -width "SSH_ORIGINAL_COMMAND"
1482 .Ux Ns -domain
1487 four space-separated values: client IP address, client port number,
1530 .Bl -tag -width Ds -compact
1532 This file is used for host-based authentication (see above).
1534 world-readable if the user's home directory is on an NFS partition,
1547 but allows host-based authentication without permitting login with
1551 This directory is the default location for all user-specific configuration
1567 This is the per-user configuration file.
1592 sensitive part of this file using AES-128.
1621 This file is for host-based authentication (see above).
1627 but allows host-based authentication without permitting login with
1641 and are used for host-based authentication.
1648 It should be world-readable.
1668 .Xr ssh-add 1 ,
1669 .Xr ssh-agent 1 ,
1670 .Xr ssh-keygen 1 ,
1671 .Xr ssh-keyscan 1 ,
1674 .Xr ssh-keysign 8 ,
1706 .%T The Secure Shell (SSH) Transport Layer Protocol
1747 .%T The Secure Shell (SSH) Transport Layer Encryption Modes
1754 .%T Improved Arcfour Modes for the Secure Shell (SSH) Transport Layer Protocol
1763 .%T Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol
1779 .%T Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer
1786 .%O International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99)
1787 .%T Hash Visualization: a New Technique to improve Real-World Security
1794 removed many bugs, re-added newer features and