• Home
  • Raw
  • Download

Lines Matching full:be

7 .\" can be used freely for any purpose.  Any derived versions of this
8 .\" software must be clearly marked as such, and if the derived work is
9 .\" incompatible with the protocol description in the RFC file, it must be
28 .\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
63 will be used.
74 host-specific declarations should be given near the beginning of the
81 Arguments may optionally be enclosed in double quotes
84 Configuration options may be separated by whitespace or
105 keyword) to be only for those hosts that match one of the patterns
107 If more than one pattern is provided, they should be separated by whitespace.
110 as a pattern can be used to provide global
119 A pattern entry may be negated by prefixing it with an exclamation mark
136 keyword) to be used only when the conditions following the
155 Other criteria may be combined arbitrarily.
161 Criteria may be negated by prepending an exclamation mark
170 This may be useful to specify conditions that work with canonical host
176 Commands containing whitespace characters must be quoted.
183 The other keywords' criteria must be single entries or comma-separated
205 (this keyword may be useful in system-wide
209 Specifies whether keys should be automatically added to a running
226 each use of the key must be confirmed, as if the
233 The argument must be
252 passphrase/password querying will be disabled.
255 The argument must be
285 is enabled and the target hostname cannot be found in any of the domains
323 Specifies rules to determine whether CNAMEs should be followed when
338 to be canonicalized to names in the
345 A corresponding private key must be provided separately in order
366 configuration files; these certificates will be tried in sequence.
373 The argument to this keyword must be
393 the check will not be executed.
413 Multiple ciphers must be comma-separated.
416 character, then the specified ciphers will be appended to the default set
420 character, then the specified ciphers (including wildcards) will be removed
450 The list of available ciphers may also be obtained using
454 specified in the configuration files or on the command line be
463 The argument must be
470 The argument must be
477 The argument must be an integer from 1 (fast) to 9 (slow, best).
484 The argument must be an integer.
485 This may be useful in scripts if the connection sometimes fails.
519 cannot be opened,
526 display and agent forwarded will be the one belonging to the master
555 at least %h, %p, and %r (or alternatively %C) and be placed in a directory
566 then the master connection will not be placed into the background,
580 Specifies that a TCP port on the local machine be forwarded
585 The argument must be
589 IPv6 addresses can be specified by enclosing addresses in square brackets.
595 may be used to bind the connection to a specific address.
600 indicates that the listening port be bound for local use only, while an
603 indicates that the port should be available from all interfaces.
608 Multiple forwardings may be specified, and
609 additional forwardings can be given on the command line.
620 The argument must be
625 This option should be placed in the non-hostspecific section.
634 The argument should be a single character,
653 The argument must be
667 will be forwarded to the remote machine.
668 The argument must be
674 Agent forwarding should be enabled with caution.
682 Specifies whether X11 connections will be automatically redirected
686 The argument must be
692 X11 forwarding should be enabled with caution.
696 An attacker may then be able to perform activities such as keystroke monitoring
708 after this time will be refused.
719 remote X11 clients will be considered untrusted and prevented
724 token used for the session will be set to expire after 20 minutes.
725 Remote clients will be refused access after this time.
737 can be used to specify that ssh
740 The argument must be
764 These hashed names may be used normally by
773 will not be converted automatically,
774 but may be manually hashed using
779 The argument must be
785 Specifies the key types that will be used for hostbased authentication
789 character, then the specified key types will be appended to the default set
793 character, then the specified key types (including wildcards) will be removed
810 may be used to list supported key types.
816 character, then the specified key types will be appended to the default set
820 character, then the specified key types (including wildcards) will be removed
836 The list of available key types may also be obtained using
839 Specifies an alias that should be used instead of the
846 This can be used to specify nicknames or abbreviations for hosts.
871 The argument to this keyword must be
885 environment variable and can be used to select a specific agent.
891 is specified, the location of the socket will be read from the
914 will be used for authentication unless
935 identities will be tried in sequence.
942 may be used in conjunction with
946 may also be used in conjunction with
951 Specifies a pattern-list of unknown options to be ignored if they are
953 This may be used to suppress errors if
959 be listed early in the configuration file as it will not be applied
963 Multiple pathnames may be specified and each pathname may contain
968 Files without absolute paths are assumed to be in
1019 The argument to this keyword must be
1026 Multiple method names must be comma-separated.
1030 it may be zero or more of:
1037 Multiple algorithms must be comma-separated.
1040 character, then the specified methods will be appended to the default set
1044 character, then the specified methods (including wildcards) will be removed
1055 The list of available key exchange algorithms may also be obtained using
1072 It should not be used for interactive commands.
1078 Specifies that a TCP port on the local machine be forwarded over
1080 The first argument must be
1084 and the second argument must be
1086 IPv6 addresses can be specified by enclosing addresses in square brackets.
1087 Multiple forwardings may be specified, and additional forwardings can be
1095 may be used to bind the connection to a specific address.
1100 indicates that the listening port be bound for local use only, while an
1103 indicates that the port should be available from all interfaces.
1116 Multiple algorithms must be comma-separated.
1119 character, then the specified algorithms will be appended to the default set
1123 character, then the specified algorithms (including wildcards) will be removed
1140 The list of available MAC algorithms may also be obtained using
1143 This option can be used if the home directory is shared across machines.
1147 The argument to this keyword must be
1154 The argument to this keyword must be an integer.
1158 The argument to this keyword must be
1170 The argument must be
1200 Multiple versions must be comma-separated.
1208 not be used.
1223 The command can be basically anything,
1230 Host key management will be done using the
1257 Multiple proxies may be separated by comma characters and will be visited
1281 Specifies the key types that will be used for public key authentication
1285 character, then the key types after it will be appended to the default
1289 character, then the specified key types (including wildcards) will be removed
1302 The list of available key types may also be obtained using
1306 The argument to this keyword must be
1312 Specifies the maximum amount of data that may be transmitted before the
1338 Specifies that a TCP port on the remote machine be forwarded over
1340 The first argument must be
1344 and the second argument must be
1346 IPv6 addresses can be specified by enclosing addresses in square brackets.
1347 Multiple forwardings may be specified, and additional
1348 forwardings can be given on the command line.
1349 Privileged ports can be forwarded only when
1355 the listen port will be dynamically allocated on the server and reported
1375 The argument may be one of:
1392 Keys listed in this file will be refused for host authentication.
1394 then host authentication will be refused for all hosts.
1395 Keys may be specified as a text file, listing one public key per line, or as
1403 The argument must be
1410 to be setuid root.
1413 The argument to this keyword must be
1418 RSA authentication will only be
1425 should be sent to the server.
1426 The server must also support it, and the server must be configured to
1438 Multiple environment variables may be separated by whitespace or spread
1448 Sets the number of server alive messages (see below) which may be
1459 and therefore will not be spoofable.
1480 is 0, indicating that these messages will not be sent to the server.
1499 will be unable to forward the port to the Unix-domain socket file.
1502 The argument must be
1515 though it can be annoying when the
1529 will be added to the user known host files only after the user
1533 known hosts will be verified automatically in all cases.
1538 of the machines will be properly noticed.
1549 To disable TCP keepalive messages, the value should be set to
1555 The argument must be
1576 The argument must be
1580 The devices may be specified by numerical ID or the keyword
1595 The argument must be
1612 and will be disabled if it is enabled.
1621 The argument must be
1629 must be setuid root.
1630 Note that this option must be set to
1637 This can be useful when a different user name is used on different machines.
1653 Insecure fingerprints will be handled as if this option was set to
1657 information on fingerprint match will be displayed, but the user will still
1678 only the fingerprint string will be printed for unknown host keys.
1698 the following pattern could be used:
1710 Patterns within pattern-lists may be negated
1714 to allow a key to be used from anywhere within an organization
1718 the following entry (in authorized_keys) could be used:
1786 This file must be world-readable.