summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/ssh-agent.c
diff options
context:
space:
mode:
authordjm <djm@openbsd.org>2016-11-30 03:00:05 +0000
committerdjm <djm@openbsd.org>2016-11-30 03:00:05 +0000
commitbba1ec4c1e326f67b2ff84f542d993f520876a57 (patch)
tree65bb07513f7119074cb5427ff19aad4398768069 /usr.bin/ssh/ssh-agent.c
parentWhen a forced-command appears in both a certificate and an (diff)
downloadwireguard-openbsd-bba1ec4c1e326f67b2ff84f542d993f520876a57.tar.xz
wireguard-openbsd-bba1ec4c1e326f67b2ff84f542d993f520876a57.zip
Add a sshd_config DisableForwaring option that disables X11, agent,
TCP, tunnel and Unix domain socket forwarding, as well as anything else we might implement in the future. This, like the 'restrict' authorized_keys flag, is intended to be a simple and future-proof way of restricting an account. Suggested as a complement to 'restrict' by Jann Horn; ok markus@
Diffstat (limited to 'usr.bin/ssh/ssh-agent.c')
0 files changed, 0 insertions, 0 deletions