summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/ssh_config (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Remove obsolete "Protocol" from commented out examples.dtucker2019-02-041-2/+1
| | | | Patch from samy.mahmoudi at gmail com.
* As promised in last release announcement: remove support fordjm2017-05-071-3/+3
| | | | Blowfish, RC4 and CAST ciphers. ok markus@ deraadt@
* more protocol 1 bits removed; ok djmjmc2017-05-031-3/+1
|
* remove SSHv1 configuration options and man pages bitsdjm2017-04-301-3/+1
| | | | ok markus@
* set ssh(1) protocol version to 2 only.sobrado2016-02-201-2/+2
| | | | ok djm@
* add missing ~/.ssh/id_ecdsa and ~/.ssh/id_ed25519 to IdentityFile.sobrado2016-02-201-1/+3
| | | | ok djm@
* Remove gssapi config parts from ssh_config, as was already done for sshd_config.sthen2013-09-161-3/+1
| | | | Req by/ok ajacoutot@
* Add an optional second argument to RekeyLimit in the client to allowdtucker2013-05-161-1/+2
| | | | | rekeying based on elapsed time in addition to amount of traffic. with djm@ jmc@, ok djm
* Add a 'netcat mode' (ssh -W). This connects stdio on the client to a singledtucker2010-01-111-1/+2
| | | | | | port forward on the server. This allows, for example, using ssh as a ProxyCommand to route connections via intermediate servers. bz #1618, man page help from jmc@, ok markus@
* sync with revised default ciphers; pointed out by dkrause@djm2009-02-171-2/+2
|
* Add VisualHostKey to example file, ok djm@grunk2008-07-251-1/+2
|
* Add a "MACs" line after "Ciphers" with the default MAC algorithms,pvalchev2007-06-081-1/+2
| | | | | to ease people who want to tweak both (eg. for performance reasons). ok deraadt@ djm@ dtucker@
* Add GSSAPIAuthentication and GSSAPIDelegateCredentials to examples in sampledtucker2006-05-291-1/+3
| | | | ssh_config. ok markus@
* Add support for tun(4) forwarding over OpenSSH, based on an idea andreyk2005-12-061-1/+4
| | | | | | | | | | | | initial channel code bits by markus@. This is a simple and easy way to use OpenSSH for ad hoc virtual private network connections, e.g. administrative tunnels or secure wireless access. It's based on a new ssh channel and works similar to the existing TCP forwarding support, except that it depends on the tun(4) network interface on both ends of the connection for layer 2 or layer 3 tunneling. This diff also adds support for LocalCommand in the ssh(1) client. ok djm@, markus@, jmc@ (manpages), tested and discussed with others
* Make it clear that the example entries in ssh_config are only some of thedtucker2005-01-281-2/+4
| | | | | commonly-used options and refer the user to ssh_config(5) for more details; ok djm@
* remove RhostsAuthentication; suggested by djm@ before; ok djm@, deraadt@,markus2003-08-131-2/+1
| | | | fgsch@, miod@, henning@, jakob@ and others
* add AddressFamily option to ssh_config (like -4, -6 on commandline).djm2003-05-161-1/+2
| | | | Portable bug #534; ok markus@
* add a ConnectTimeout option to ssh, based on patch fromdjm2003-05-151-1/+2
| | | | Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
* re-enable ssh-keysign's sbit, but make ssh-keysign read /etc/ssh/ssh_configmarkus2002-07-031-1/+2
| | | | | and exit if HostbasedAuthentication is disabled globally. based on discussions with deraadt, itojun and sommerfeld; ok itojun@
* refer to config file man pagestevesk2002-06-201-5/+5
|
* update defaults for RhostsRSAAuthentication and RhostsAuthenticationstevesk2002-06-101-3/+3
| | | | here too (all options commented out with default value).
* remove FallBackToRsh/UseRshmarkus2002-06-081-3/+1
|
* correct some commented defaults. add Ciphers default. ok markus@stevesk2002-01-161-5/+6
|
* grammar in commentstevesk2002-01-031-4/+5
|
* id_rsa1/2 -> id_rsa; ok markus@todd2001-04-031-3/+2
|
* default to SSH2, now that m68k runs fastderaadt2001-03-101-2/+2
|
* point at sshd(8) and ssh(1)deraadt2001-02-021-4/+4
|
* $OpenBSD$niklas2001-01-291-0/+2
|
* add support for RSA to SSH2. please test.markus2000-11-121-5/+8
| | | | | | | | | | | | | | | there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication.
* disable FallBackToRsh by defaultderaadt2000-07-111-1/+1
|
* show 'Protocol' as an example, ok markus@todd2000-04-171-0/+1
|
* idea does not existderaadt1999-10-271-1/+1
|
* document CheckHostIPprovos1999-10-031-0/+1
|
* distribution targetderaadt1999-09-261-0/+29