Lines Matching +full:per +full:- +full:port +full:- +full:set
49 .Op Fl D Oo Ar bind_address : Oc Ns Ar port
62 .Op Fl p Ar port
65 .Op Fl W Ar host : Ns Ar port
78 .Ux Ns -domain
90 .No ssh:// Oo user @ Oc hostname Op : port .
108 .Bl -tag -width Ds -compact
121 .Xr ssh-agent 1 .
122 This can also be specified on a per-host basis in a configuration file.
127 .Ux Ns -domain
155 .Ux Ns -domain
161 The default value can be set on a host-by-host basis in the
170 is a comma-separated list of ciphers
181 .Ar port
186 application-level port forwarding.
188 .Ar port
191 Whenever a connection is made to this port, the
199 Dynamic port forwardings can also be specified in the configuration file.
203 By default, the local port is bound in accordance with the
213 indicates that the listening port be bound for local use only, while an
216 indicates that the port should be available from all interfaces.
230 followed by control-Z suspends the connection;
237 Specifies an alternative per-user configuration file.
239 the system-wide configuration file
242 The default for the per-user configuration file is
244 If set to
260 .Ic ssh -f host xterm .
264 configuration option is set to
268 will wait for all remote port forwards to be successfully established
301 .Xr ssh-agent 1
312 a per-host basis in the configuration file.
323 .Pa -cert.pub
337 Note that configuration directives supplied on the command-line generally
344 Enables GSSAPI-based authentication and forwarding (delegation) of GSSAPI
353 .Ar port : host : hostport
359 .Ar port : remote_socket
372 Specifies that connections to the given TCP port or Unix socket on the local
373 (client) host are to be forwarded to the given host and port, or Unix socket,
376 .Ar port
380 Whenever a connection is made to the local port or socket, the
384 port
390 Port forwardings can also be specified in the configuration file.
394 By default, the local port is bound in accordance with the
404 indicates that the listening port be bound for local use only, while an
407 indicates that the port should be available from all interfaces.
411 This also may be specified on a per-host basis in the configuration file.
426 .Xr ssh-askpass 1
436 A comma-separated list of MAC (message authentication code) algorithms,
462 .Ic ssh -n shadows.cs.hut.fi emacs &
501 command-line flag.
505 .Bl -tag -width Ds -offset indent -compact
566 .It Port
608 .It Fl p Ar port
609 Port to connect to on the remote host.
611 per-host basis in the configuration file.
617 .Ar cipher-auth
629 .Ar key-ca-sign
631 .Ar key-cert
633 .Ar key-plain
634 (non-certificate key types),
635 .Ar key-sig
637 .Ar protocol-version
655 .Ar port : host : hostport
661 .Ar port : local_socket
677 .Ar port
680 Specifies that connections to the given TCP port or Unix socket on the remote
684 .Ar port
686 Whenever a connection is made to this port or Unix socket, the
690 port
699 Port forwardings can also be specified in the configuration file.
721 .Ar port
724 the listen port will be dynamically allocated on the server and reported
727 .Ic -O forward ,
728 the allocated port will be printed to the standard output.
756 Disable pseudo-terminal allocation.
759 Force pseudo-terminal allocation.
761 screen-based programs on a remote machine, which can be very useful,
784 .It Fl W Ar host : Ns Ar port
788 .Ar port
828 directive is unset, it will be set to the default tunnel mode, which is
829 .Dq point-to-point .
837 This can also be specified on a per-host basis in a configuration file.
873 a per-user configuration file and a system-wide configuration file.
880 GSSAPI-based authentication,
881 host-based authentication,
883 keyboard-interactive authentication,
890 Host-based authentication works as follows:
895 on the remote machine, the user is non-root and the user names are
922 The scheme is based on public-key cryptography,
959 .Xr ssh-keygen 1 .
966 (authenticator-hosted ECDSA),
970 (authenticator-hosted Ed25519),
980 (authenticator-hosted ECDSA),
984 (authenticator-hosted Ed25519),
1003 instead of a set of public/private keys,
1008 .Xr ssh-keygen 1
1014 .Xr ssh-agent 1
1021 Keyboard-interactive authentication works as follows:
1025 Examples of keyboard-interactive authentication include
1030 .Pf non- Ox
1053 server spoofing or man-in-the-middle attacks,
1061 either executes the given command in a non-interactive session or,
1069 by default will only request a pseudo-terminal (pty) for interactive
1077 If a pseudo-terminal has been allocated, the
1080 If no pseudo-terminal has been allocated,
1089 When a pseudo-terminal has been requested,
1107 .Bl -tag -width Ds
1126 Currently this allows the addition of port forwardings using the
1132 It also allows the cancellation of existing port-forwardings
1135 .Fl KL Oo Ar bind_address : Oc Ar port
1139 .Fl KR Oo Ar bind_address : Oc Ar port
1143 .Fl KD Oo Ar bind_address : Oc Ar port
1145 for dynamic port-forwardings.
1191 using the standard IRC port, 6667:
1192 .Bd -literal -offset 4n
1193 $ ssh -f -L 6667:localhost:6667 server.example.com sleep 10
1194 $ irc -c '#users' pinky IRC/127.0.0.1
1212 variable is set to
1222 environment variable is set), the connection to the X11 display is
1227 The user should not manually set
1234 value set by
1245 will also automatically set up Xauthority data on the server machine.
1255 variable is set to
1271 .Xr ssh-keygen 1 :
1273 .Dl $ ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key
1278 .Xr ssh-keygen 1
1303 .Dl $ ssh-keygen -lv -f ~/.ssh/known_hosts
1318 .Bd -literal -offset indent
1319 $ ssh-keygen -r host.example.com.
1325 .Dl $ dig -t SSHFP host.example.com
1328 .Bd -literal -offset indent
1329 $ ssh -o "VerifyHostKeyDNS ask" host.example.com
1340 .Sh SSH-BASED VIRTUAL PRIVATE NETWORKS
1345 network pseudo-device,
1355 with remote network 10.0.99.0/24 using a point-to-point connection
1361 .Bd -literal -offset indent
1362 # ssh -f -w 0:1 192.168.1.15 true
1368 .Bd -literal -offset indent
1386 is set to
1387 .Dq forced-commands-only :
1388 .Bd -literal -offset 2n
1389 tunnel="1",command="sh /etc/netstart tun1" ssh-rsa ... jane
1390 tunnel="2",command="sh /etc/netstart tun2" ssh-rsa ... john
1393 Since an SSH-based setup entails a fair amount of overhead,
1402 will normally set the following environment variables:
1403 .Bl -tag -width "SSH_ORIGINAL_COMMAND"
1408 It is automatically set by
1420 The user should normally not set
1449 are set, it will execute the program specified by
1463 If this variable is set to
1468 If it is set to
1474 Finally, if the variable is set to
1479 is set.
1482 .Ux Ns -domain
1487 four space-separated values: client IP address, client port number,
1488 server IP address, and server port number.
1494 This is set to the name of the tty (path to the device) associated
1497 this variable is not set.
1499 Optionally set by
1504 Optionally set by
1510 This variable is set to indicate the present time zone if it
1511 was set when the daemon was started (i.e. the daemon passes the value
1530 .Bl -tag -width Ds -compact
1532 This file is used for host-based authentication (see above).
1534 world-readable if the user's home directory is on an NFS partition,
1547 but allows host-based authentication without permitting login with
1551 This directory is the default location for all user-specific configuration
1567 This is the per-user configuration file.
1592 sensitive part of this file using AES-128.
1621 This file is for host-based authentication (see above).
1627 but allows host-based authentication without permitting login with
1641 and are used for host-based authentication.
1648 It should be world-readable.
1668 .Xr ssh-add 1 ,
1669 .Xr ssh-agent 1 ,
1670 .Xr ssh-keygen 1 ,
1671 .Xr ssh-keyscan 1 ,
1674 .Xr ssh-keysign 8 ,
1763 .%T Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol
1786 .%O International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99)
1787 .%T Hash Visualization: a New Technique to improve Real-World Security
1794 removed many bugs, re-added newer features and