Lines Matching +full:master +full:- +full:side

78 .Ux Ns -domain
108 .Bl -tag -width Ds -compact
121 .Xr ssh-agent 1 .
122 This can also be specified on a per-host basis in a configuration file.
127 .Ux Ns -domain
155 .Ux Ns -domain
161 The default value can be set on a host-by-host basis in the
170 is a comma-separated list of ciphers
186 application-level port forwarding.
189 on the local side, optionally bound to the specified
230 followed by control-Z suspends the connection;
237 Specifies an alternative per-user configuration file.
239 the system-wide configuration file
242 The default for the per-user configuration file is
260 .Ic ssh -f host xterm .
288 on the master process.
301 .Xr ssh-agent 1
311 a per-host basis in the configuration file.
322 .Pa -cert.pub
337 Note that configuration directives supplied on the command-line generally
344 Enables GSSAPI-based authentication and forwarding (delegation) of GSSAPI
374 on the remote side.
377 on the local side, optionally bound to the specified
411 This also may be specified on a per-host basis in the configuration file.
417 .Dq master
424 .Dq master
426 .Xr ssh-askpass 1
436 A comma-separated list of MAC (message authentication code) algorithms,
462 .Ic ssh -n shadows.cs.hut.fi emacs &
480 Control an active connection multiplexing master process.
485 argument is interpreted and passed to the master process.
488 (check that the master process is running),
494 (connect to a running multiplexing master in proxy mode),
496 (request the master to exit), and
498 (request the master to stop accepting further multiplexing requests).
503 command-line flag.
507 .Bl -tag -width Ds -offset indent -compact
613 per-host basis in the configuration file.
619 .Ar cipher-auth
631 .Ar key-ca-sign
633 .Ar key-cert
635 .Ar key-plain
636 (non-certificate key types),
637 .Ar key-sig
639 .Ar protocol-version
683 (server) host are to be forwarded to the local side.
687 or to a Unix socket on the remote side.
729 .Ic -O forward ,
758 Disable pseudo-terminal allocation.
761 Force pseudo-terminal allocation.
763 screen-based programs on a remote machine, which can be very useful,
831 .Dq point-to-point .
839 This can also be specified on a per-host basis in a configuration file.
875 a per-user configuration file and a system-wide configuration file.
882 GSSAPI-based authentication,
883 host-based authentication,
885 keyboard-interactive authentication,
892 Host-based authentication works as follows:
897 on the remote machine, the user is non-root and the user names are
924 The scheme is based on public-key cryptography,
958 .Xr ssh-keygen 1 .
963 (authenticator-hosted ECDSA),
967 (authenticator-hosted Ed25519),
975 (authenticator-hosted ECDSA),
979 (authenticator-hosted Ed25519),
1003 .Xr ssh-keygen 1
1009 .Xr ssh-agent 1
1016 Keyboard-interactive authentication works as follows:
1020 Examples of keyboard-interactive authentication include
1025 .Pf non- Ox
1048 server spoofing or man-in-the-middle attacks,
1056 either executes the given command in a non-interactive session or,
1064 by default will only request a pseudo-terminal (pty) for interactive
1072 If a pseudo-terminal has been allocated, the
1075 If no pseudo-terminal has been allocated,
1084 When a pseudo-terminal has been requested,
1102 .Bl -tag -width Ds
1127 It also allows the cancellation of existing port-forwardings
1140 for dynamic port-forwardings.
1187 .Bd -literal -offset 4n
1188 $ ssh -f -L 6667:localhost:6667 server.example.com sleep 10
1189 $ irc -c '#users' pinky IRC/127.0.0.1
1218 automatically forwarded to the remote side in such a way that any X11
1258 is automatically forwarded to the remote side.
1266 .Xr ssh-keygen 1 :
1268 .Dl $ ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key
1273 .Xr ssh-keygen 1
1298 .Dl $ ssh-keygen -lv -f ~/.ssh/known_hosts
1313 .Bd -literal -offset indent
1314 $ ssh-keygen -r host.example.com.
1320 .Dl $ dig -t SSHFP host.example.com
1323 .Bd -literal -offset indent
1324 $ ssh -o "VerifyHostKeyDNS ask" host.example.com
1335 .Sh SSH-BASED VIRTUAL PRIVATE NETWORKS
1340 network pseudo-device,
1350 with remote network 10.0.99.0/24 using a point-to-point connection
1356 .Bd -literal -offset indent
1357 # ssh -f -w 0:1 192.168.1.15 true
1363 .Bd -literal -offset indent
1382 .Dq forced-commands-only :
1383 .Bd -literal -offset 2n
1384 tunnel="1",command="sh /etc/netstart tun1" ssh-rsa ... jane
1385 tunnel="2",command="sh /etc/netstart tun2" ssh-rsa ... john
1388 Since an SSH-based setup entails a fair amount of overhead,
1398 .Bl -tag -width "SSH_ORIGINAL_COMMAND"
1477 .Ux Ns -domain
1482 four space-separated values: client IP address, client port number,
1525 .Bl -tag -width Ds -compact
1527 This file is used for host-based authentication (see above).
1529 world-readable if the user's home directory is on an NFS partition,
1542 but allows host-based authentication without permitting login with
1546 This directory is the default location for all user-specific configuration
1562 This is the per-user configuration file.
1586 sensitive part of this file using AES-128.
1614 This file is for host-based authentication (see above).
1620 but allows host-based authentication without permitting login with
1632 and are used for host-based authentication.
1639 It should be world-readable.
1659 .Xr ssh-add 1 ,
1660 .Xr ssh-agent 1 ,
1661 .Xr ssh-keygen 1 ,
1662 .Xr ssh-keyscan 1 ,
1665 .Xr ssh-keysign 8 ,
1754 .%T Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol
1777 .%O International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99)
1778 .%T Hash Visualization: a New Technique to improve Real-World Security
1785 removed many bugs, re-added newer features and