comparison dropbear.8 @ 546:568638be7203 agent-client

propagate from branch 'au.asn.ucc.matt.dropbear' (head 899a8851a5edf840b2f7925bcc26ffe99dcac54d) to branch 'au.asn.ucc.matt.dropbear.cli-agent' (head 6bbab8364de17bd9ecb1dee5ffb796e48c0380d2)
author Matt Johnston <matt@ucc.asn.au>
date Wed, 01 Jul 2009 04:16:32 +0000
parents fe30d2a2d626
children 6f472dc54da7
comparison
equal deleted inserted replaced
500:d588e3ea557a 546:568638be7203
22 .TP 22 .TP
23 .B \-d \fIdsskey 23 .B \-d \fIdsskey
24 dsskeyfile. 24 dsskeyfile.
25 Use the contents of the file 25 Use the contents of the file
26 .I dsskey 26 .I dsskey
27 for the dss host key (default: /etc/dropbear/dropbear_dss_host_key). 27 for the DSS host key (default: /etc/dropbear/dropbear_dss_host_key).
28 Note that
29 some SSH implementations
30 use the term "DSA" rather than "DSS", they mean the same thing.
28 This file is generated with 31 This file is generated with
29 .BR dropbearkey (8). 32 .BR dropbearkey (8).
30 .TP 33 .TP
31 .B \-r \fIrsakey 34 .B \-r \fIrsakey
32 rsakeyfile. 35 rsakeyfile.
92 Ensure that traffic is transmitted at a certain interval in seconds. This is 95 Ensure that traffic is transmitted at a certain interval in seconds. This is
93 useful for working around firewalls or routers that drop connections after 96 useful for working around firewalls or routers that drop connections after
94 a certain period of inactivity. The trade-off is that a session may be 97 a certain period of inactivity. The trade-off is that a session may be
95 closed if there is a temporary lapse of network connectivity. A setting 98 closed if there is a temporary lapse of network connectivity. A setting
96 if 0 disables keepalives. 99 if 0 disables keepalives.
100 .TP
101 .B \-I \fIidle_timeout
102 Disconnect the session if no traffic is transmitted or received for \fIidle_timeout\fR seconds.
103 .SH FILES
104
105 .TP
106 Authorized Keys
107
108 ~/.ssh/authorized_keys can be set up to allow remote login with a RSA or DSS
109 key. Each line is of the form
110 .TP
111 [restrictions] ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIgAsp... [comment]
112
113 and can be extracted from a Dropbear private host key with "dropbearkey -y". This is the same format as used by OpenSSH, though the restrictions are a subset (keys with unknown restrictions are ignored).
114 Restrictions are comma separated, with double quotes around spaces in arguments.
115 Available restrictions are:
116
117 .TP
118 .B no-port-forwarding
119 Don't allow port forwarding for this connection
120
121 .TP
122 .B no-agent-forwarding
123 Don't allow agent forwarding for this connection
124
125 .TP
126 .B no-X11-forwarding
127 Don't allow X11 forwarding for this connection
128
129 .TP
130 .B no-pty
131 Disable PTY allocation. Note that a user can still obtain most of the
132 same functionality with other means even if no-pty is set.
133
134 .TP
135 .B command="\fIforced_command\fR"
136 Disregard the command provided by the user and always run \fIforced_command\fR.
137
138 The authorized_keys file and its containing ~/.ssh directory must only be
139 writable by the user, otherwise Dropbear will not allow a login using public
140 key authentication.
141
142 .TP
143 Host Key Files
144
145 Host key files are read at startup from a standard location, by default
146 /etc/dropbear/dropbear_dss_host_key and /etc/dropbear/dropbear_rsa_host_key
147 or specified on the commandline with -d or -r. These are of the form generated
148 by dropbearkey.
149
150 .TP
151 Message Of The Day
152
153 By default the file /etc/motd will be printed for any login shell (unless
154 disabled at compile-time). This can also be disabled per-user
155 by creating a file ~/.hushlogin .
156
97 .SH AUTHOR 157 .SH AUTHOR
98 Matt Johnston ([email protected]). 158 Matt Johnston ([email protected]).
99 .br 159 .br
100 Gerrit Pape ([email protected]) wrote this manual page. 160 Gerrit Pape ([email protected]) wrote this manual page.
101 .SH SEE ALSO 161 .SH SEE ALSO