View | Details | Raw Unified | Return to bug 1295 | Differences between
and this patch

Collapse All | Expand All

(-)/home/lb/net/src/openssh-4.3p2/buildpkg.sh (+562 lines)
Line 0 Link Here
1
#!/bin/sh
2
#
3
# Fake Root Solaris/SVR4/SVR5 Build System - Prototype
4
#
5
# The following code has been provide under Public Domain License.  I really
6
# don't care what you use it for.  Just as long as you don't complain to me
7
# nor my employer if you break it. - Ben Lindstrom (mouring@eviladmin.org)
8
#
9
umask 022
10
#
11
# Options for building the package
12
# You can create a openssh-config.local with your customized options
13
#
14
REMOVE_FAKE_ROOT_WHEN_DONE=yes
15
#
16
# uncommenting TEST_DIR and using
17
# configure --prefix=/var/tmp --with-privsep-path=/var/tmp/empty
18
# and
19
# PKGNAME=tOpenSSH should allow testing a package without interfering
20
# with a real OpenSSH package on a system. This is not needed on systems
21
# that support the -R option to pkgadd.
22
#TEST_DIR=/var/tmp	# leave commented out for production build
23
PKGNAME=OpenSSH
24
# revisions within the same version (REV=a)
25
#REV=
26
SYSVINIT_NAME=opensshd
27
MAKE=${MAKE:="make"}
28
SSHDUID=67	# Default privsep uid
29
SSHDGID=67	# Default privsep gid
30
# uncomment these next three as needed
31
#PERMIT_ROOT_LOGIN=no
32
#X11_FORWARDING=yes
33
#USR_LOCAL_IS_SYMLINK=yes
34
# System V init run levels
35
SYSVINITSTART=S98
36
SYSVINITSTOPT=K30
37
# We will source these if they exist
38
POST_MAKE_INSTALL_FIXES=./pkg_post_make_install_fixes.sh
39
POST_PROTOTYPE_EDITS=./pkg-post-prototype-edit.sh
40
# We'll be one level deeper looking for these
41
PKG_PREINSTALL_LOCAL=../pkg-preinstall.local
42
PKG_POSTINSTALL_LOCAL=../pkg-postinstall.local
43
PKG_PREREMOVE_LOCAL=../pkg-preremove.local
44
PKG_POSTREMOVE_LOCAL=../pkg-postremove.local
45
PKG_REQUEST_LOCAL=../pkg-request.local
46
# end of sourced files
47
#
48
OPENSSHD=opensshd.init
49
50
PATH_GROUPADD_PROG=/usr/sbin/groupadd
51
PATH_USERADD_PROG=/usr/sbin/useradd
52
PATH_PASSWD_PROG=/usr/bin/passwd
53
#
54
# list of system directories we do NOT want to change owner/group/perms
55
# when installing our package
56
SYSTEM_DIR="/etc	\
57
/etc/init.d		\
58
/etc/rcS.d		\
59
/etc/rc0.d		\
60
/etc/rc1.d		\
61
/etc/rc2.d		\
62
/etc/opt		\
63
/opt			\
64
/opt/bin		\
65
/usr			\
66
/usr/bin		\
67
/usr/lib		\
68
/usr/sbin		\
69
/usr/share		\
70
/usr/share/man		\
71
/usr/share/man/man1	\
72
/usr/share/man/man8	\
73
/usr/local		\
74
/usr/local/bin		\
75
/usr/local/etc		\
76
/usr/local/libexec	\
77
/usr/local/man		\
78
/usr/local/man/man1	\
79
/usr/local/man/man8	\
80
/usr/local/sbin		\
81
/usr/local/share	\
82
/var			\
83
/var/opt		\
84
/var/run		\
85
/var/tmp		\
86
/tmp"
87
88
# We may need to build as root so we make sure PATH is set up
89
# only set the path if it's not set already
90
[ -d /opt/bin ]  &&  {
91
	echo $PATH | grep ":/opt/bin"  > /dev/null 2>&1
92
	[ $? -ne 0 ] && PATH=$PATH:/opt/bin
93
}
94
[ -d /usr/local/bin ]  &&  {
95
	echo $PATH | grep ":/usr/local/bin"  > /dev/null 2>&1
96
	[ $? -ne 0 ] && PATH=$PATH:/usr/local/bin
97
}
98
[ -d /usr/ccs/bin ]  &&  {
99
	echo $PATH | grep ":/usr/ccs/bin"  > /dev/null 2>&1
100
	[ $? -ne 0 ] && PATH=$PATH:/usr/ccs/bin
101
}
102
export PATH
103
#
104
105
[ -f Makefile ]  ||  {
106
	echo "Please run this script from your build directory"
107
	exit 1
108
}
109
110
# we will look for openssh-config.local to override the above options
111
[ -s ./openssh-config.local ]  &&  . ./openssh-config.local
112
113
START=`pwd`
114
FAKE_ROOT=$START/pkg
115
116
## Fill in some details, like prefix and sysconfdir
117
for confvar in prefix exec_prefix bindir sbindir libexecdir datadir mandir sysconfdir piddir srcdir
118
do
119
	eval $confvar=`grep "^$confvar=" Makefile | cut -d = -f 2`
120
done
121
122
123
## Collect value of privsep user
124
for confvar in SSH_PRIVSEP_USER
125
do
126
	eval $confvar=`awk '/#define[ \t]'$confvar'/{print $3}' config.h`
127
done
128
129
## Set privsep defaults if not defined
130
if [ -z "$SSH_PRIVSEP_USER" ]
131
then
132
	SSH_PRIVSEP_USER=sshd
133
fi
134
135
## Extract common info requires for the 'info' part of the package.
136
VERSION=`./ssh -V 2>&1 | sed -e 's/,.*//'`
137
138
ARCH=`uname -m`
139
DEF_MSG="\n"
140
OS_VER=`uname -v`
141
SCRIPT_SHELL=/sbin/sh
142
UNAME_S=`uname -s`
143
case ${UNAME_S} in
144
	SunOS)	UNAME_S=Solaris
145
		ARCH=`uname -p`
146
		RCS_D=yes
147
		DEF_MSG="(default: n)"
148
		;;
149
	SCO_SV)	UNAME_S=OpenServer
150
		OS_VER=`uname -X | grep Release | sed -e 's/^Rel.*3.2v//'`
151
		SCRIPT_SHELL=/bin/sh
152
		RC1_D=no
153
		DEF_MSG="(default: n)"
154
		;;
155
esac
156
157
case `basename $0` in
158
	buildpkg.sh)
159
## Start by faking root install
160
echo "Faking root install..."
161
[ -d $FAKE_ROOT ]  &&  rm -fr $FAKE_ROOT
162
mkdir $FAKE_ROOT
163
${MAKE} install-nokeys DESTDIR=$FAKE_ROOT
164
if [ $? -gt 0 ]
165
then
166
	echo "Fake root install failed, stopping."
167
	exit 1
168
fi
169
170
## Setup our run level stuff while we are at it.
171
mkdir -p $FAKE_ROOT${TEST_DIR}/etc/init.d
172
173
cp ${OPENSSHD} $FAKE_ROOT${TEST_DIR}/etc/init.d/${SYSVINIT_NAME}
174
chmod 744 $FAKE_ROOT${TEST_DIR}/etc/init.d/${SYSVINIT_NAME}
175
176
[ "${PERMIT_ROOT_LOGIN}" = no ]  &&  \
177
	perl -p -i -e "s/#PermitRootLogin yes/PermitRootLogin no/" \
178
		$FAKE_ROOT/${sysconfdir}/sshd_config
179
[ "${X11_FORWARDING}" = yes ]  &&  \
180
	perl -p -i -e "s/#X11Forwarding no/X11Forwarding yes/" \
181
		$FAKE_ROOT/${sysconfdir}/sshd_config
182
# fix PrintMotd
183
perl -p -i -e "s/#PrintMotd yes/PrintMotd no/" \
184
	$FAKE_ROOT/${sysconfdir}/sshd_config
185
186
# We don't want to overwrite config files on multiple installs
187
mv $FAKE_ROOT/${sysconfdir}/ssh_config $FAKE_ROOT/${sysconfdir}/ssh_config.default
188
mv $FAKE_ROOT/${sysconfdir}/sshd_config $FAKE_ROOT/${sysconfdir}/sshd_config.default
189
[ -f $FAKE_ROOT/${sysconfdir}/ssh_prng_cmds ]  &&  \
190
mv $FAKE_ROOT/${sysconfdir}/ssh_prng_cmds $FAKE_ROOT/${sysconfdir}/ssh_prng_cmds.default
191
192
# local tweeks here
193
[ -s "${POST_MAKE_INSTALL_FIXES}" ]  &&  . ${POST_MAKE_INSTALL_FIXES}
194
195
cd $FAKE_ROOT
196
197
## Ok, this is outright wrong, but it will work.  I'm tired of pkgmk
198
## whining.
199
for i in *; do
200
  PROTO_ARGS="$PROTO_ARGS $i=/$i";
201
done
202
203
## Build info file
204
echo "Building pkginfo file..."
205
cat > pkginfo << _EOF
206
PKG=$PKGNAME
207
NAME="OpenSSH Portable for ${UNAME_S}"
208
DESC="Secure Shell remote access utility; replaces telnet and rlogin/rsh."
209
VENDOR="OpenSSH Portable Team - http://www.openssh.com/portable.html"
210
ARCH=$ARCH
211
VERSION=$VERSION$REV
212
CATEGORY="Security,application"
213
BASEDIR=/
214
CLASSES="none"
215
PSTAMP="${UNAME_S} ${OS_VER} ${ARCH} `date '+%d%b%Y %H:%M'`"
216
_EOF
217
218
## Build empty depend file that may get updated by $POST_PROTOTYPE_EDITS
219
echo "Building depend file..."
220
touch depend
221
222
## Build space file
223
echo "Building space file..."
224
cat > space << _EOF
225
# extra space required by start/stop links added by installf in postinstall
226
$TEST_DIR/etc/rc0.d/${SYSVINITSTOPT}${SYSVINIT_NAME} 0 1
227
$TEST_DIR/etc/rc2.d/${SYSVINITSTART}${SYSVINIT_NAME} 0 1
228
_EOF
229
[ "$RC1_D" = no ]  ||  \
230
echo "$TEST_DIR/etc/rc1.d/${SYSVINITSTOPT}${SYSVINIT_NAME} 0 1" >> space
231
[ "$RCS_D" = yes ]  &&  \
232
echo "$TEST_DIR/etc/rcS.d/${SYSVINITSTOPT}${SYSVINIT_NAME} 0 1" >> space
233
234
## Build preinstall file
235
echo "Building preinstall file..."
236
cat > preinstall << _EOF
237
#! ${SCRIPT_SHELL}
238
#
239
_EOF
240
241
# local preinstall changes here
242
[ -s "${PKG_PREINSTALL_LOCAL}" ]  &&  . ${PKG_PREINSTALL_LOCAL}
243
244
cat >> preinstall << _EOF
245
#
246
[ "\${PRE_INS_STOP}" = "yes" ]  &&  ${TEST_DIR}/etc/init.d/${SYSVINIT_NAME} stop
247
exit 0
248
_EOF
249
250
## Build postinstall file
251
echo "Building postinstall file..."
252
cat > postinstall << _EOF
253
#! ${SCRIPT_SHELL}
254
#
255
[ -f \${PKG_INSTALL_ROOT}${sysconfdir}/ssh_config ]  ||  \\
256
	cp -p \${PKG_INSTALL_ROOT}${sysconfdir}/ssh_config.default \\
257
		\${PKG_INSTALL_ROOT}${sysconfdir}/ssh_config
258
[ -f \${PKG_INSTALL_ROOT}${sysconfdir}/sshd_config ]  ||  \\
259
	cp -p \${PKG_INSTALL_ROOT}${sysconfdir}/sshd_config.default \\
260
		\${PKG_INSTALL_ROOT}${sysconfdir}/sshd_config
261
[ -f \${PKG_INSTALL_ROOT}${sysconfdir}/ssh_prng_cmds.default ]  &&  {
262
	[ -f \${PKG_INSTALL_ROOT}${sysconfdir}/ssh_prng_cmds ]  ||  \\
263
	cp -p \${PKG_INSTALL_ROOT}${sysconfdir}/ssh_prng_cmds.default \\
264
		\${PKG_INSTALL_ROOT}${sysconfdir}/ssh_prng_cmds
265
}
266
267
# make rc?.d dirs only if we are doing a test install
268
[ -n "${TEST_DIR}" ]  &&  {
269
	[ "$RCS_D" = yes ]  &&  mkdir -p ${TEST_DIR}/etc/rcS.d
270
	mkdir -p ${TEST_DIR}/etc/rc0.d
271
	[ "$RC1_D" = no ]  ||  mkdir -p ${TEST_DIR}/etc/rc1.d
272
	mkdir -p ${TEST_DIR}/etc/rc2.d
273
}
274
275
if [ "\${USE_SYM_LINKS}" = yes ]
276
then
277
	[ "$RCS_D" = yes ]  &&  \
278
installf ${PKGNAME} \${PKG_INSTALL_ROOT}$TEST_DIR/etc/rcS.d/${SYSVINITSTOPT}${SYSVINIT_NAME}=../init.d/${SYSVINIT_NAME} s
279
	installf ${PKGNAME} \${PKG_INSTALL_ROOT}$TEST_DIR/etc/rc0.d/${SYSVINITSTOPT}${SYSVINIT_NAME}=../init.d/${SYSVINIT_NAME} s
280
	[ "$RC1_D" = no ]  ||  \
281
	installf ${PKGNAME} \${PKG_INSTALL_ROOT}$TEST_DIR/etc/rc1.d/${SYSVINITSTOPT}${SYSVINIT_NAME}=../init.d/${SYSVINIT_NAME} s
282
	installf ${PKGNAME} \${PKG_INSTALL_ROOT}$TEST_DIR/etc/rc2.d/${SYSVINITSTART}${SYSVINIT_NAME}=../init.d/${SYSVINIT_NAME} s
283
else
284
	[ "$RCS_D" = yes ]  &&  \
285
installf ${PKGNAME} \${PKG_INSTALL_ROOT}$TEST_DIR/etc/rcS.d/${SYSVINITSTOPT}${SYSVINIT_NAME}=\${PKG_INSTALL_ROOT}$TEST_DIR/etc/init.d/${SYSVINIT_NAME} l
286
	installf ${PKGNAME} \${PKG_INSTALL_ROOT}$TEST_DIR/etc/rc0.d/${SYSVINITSTOPT}${SYSVINIT_NAME}=\${PKG_INSTALL_ROOT}$TEST_DIR/etc/init.d/${SYSVINIT_NAME} l
287
	[ "$RC1_D" = no ]  ||  \
288
	installf ${PKGNAME} \${PKG_INSTALL_ROOT}$TEST_DIR/etc/rc1.d/${SYSVINITSTOPT}${SYSVINIT_NAME}=\${PKG_INSTALL_ROOT}$TEST_DIR/etc/init.d/${SYSVINIT_NAME} l
289
	installf ${PKGNAME} \${PKG_INSTALL_ROOT}$TEST_DIR/etc/rc2.d/${SYSVINITSTART}${SYSVINIT_NAME}=\${PKG_INSTALL_ROOT}$TEST_DIR/etc/init.d/${SYSVINIT_NAME} l
290
fi
291
292
# If piddir doesn't exist we add it. (Ie. --with-pid-dir=/var/opt/ssh)
293
[ -d $piddir ]  ||  installf ${PKGNAME} \${PKG_INSTALL_ROOT}$TEST_DIR$piddir d 0755 root sys
294
295
_EOF
296
297
# local postinstall changes here
298
[ -s "${PKG_POSTINSTALL_LOCAL}" ]  &&  . ${PKG_POSTINSTALL_LOCAL}
299
300
cat >> postinstall << _EOF
301
installf -f ${PKGNAME}
302
303
# Use chroot to handle PKG_INSTALL_ROOT
304
if [ ! -z "\${PKG_INSTALL_ROOT}" ]
305
then
306
	chroot="chroot \${PKG_INSTALL_ROOT}"
307
fi
308
# If this is a test build, we will skip the groupadd/useradd/passwd commands
309
if [ ! -z "${TEST_DIR}" ]
310
then
311
	chroot=echo
312
fi
313
314
if egrep '^[ \t]*UsePrivilegeSeparation[ \t]+no' \${PKG_INSTALL_ROOT}/$sysconfdir/sshd_config >/dev/null
315
then
316
	echo "UsePrivilegeSeparation disabled in config, not creating PrivSep user"
317
	echo "or group."
318
else
319
	echo "UsePrivilegeSeparation enabled in config (or defaulting to on)."
320
321
	# user required?
322
	if cut -f1 -d: \${PKG_INSTALL_ROOT}/etc/passwd | egrep '^'$SSH_PRIVSEP_USER'\$' >/dev/null
323
	then
324
		echo "PrivSep user $SSH_PRIVSEP_USER already exists."
325
		SSH_PRIVSEP_GROUP=\`grep "^$SSH_PRIVSEP_USER:" \${PKG_INSTALL_ROOT}/etc/passwd | awk -F: '{print \$4}'\`
326
		SSH_PRIVSEP_GROUP=\`grep ":\$SSH_PRIVSEP_GROUP:" \${PKG_INSTALL_ROOT}/etc/group | awk -F: '{print \$1}'\`
327
	else
328
		DO_PASSWD=yes
329
	fi
330
	[ -z "\$SSH_PRIVSEP_GROUP" ]  &&  SSH_PRIVSEP_GROUP=$SSH_PRIVSEP_USER
331
332
	# group required?
333
	if cut -f1 -d: \${PKG_INSTALL_ROOT}/etc/group | egrep '^'\$SSH_PRIVSEP_GROUP'\$' >/dev/null
334
	then
335
		echo "PrivSep group \$SSH_PRIVSEP_GROUP already exists."
336
	else
337
		DO_GROUP=yes
338
	fi
339
340
	# create group if required
341
	[ "\$DO_GROUP" = yes ]  &&  {
342
		# Use gid of 67 if possible
343
		if cut -f3 -d: \${PKG_INSTALL_ROOT}/etc/group | egrep '^'$SSHDGID'\$' >/dev/null
344
		then
345
			:
346
		else
347
			sshdgid="-g $SSHDGID"
348
		fi
349
		echo "Creating PrivSep group \$SSH_PRIVSEP_GROUP."
350
		\$chroot ${PATH_GROUPADD_PROG} \$sshdgid \$SSH_PRIVSEP_GROUP
351
	}
352
353
	# Create user if required
354
	[ "\$DO_PASSWD" = yes ]  &&  {
355
		# Use uid of 67 if possible
356
		if cut -f3 -d: \${PKG_INSTALL_ROOT}/etc/passwd | egrep '^'$SSHDUID'\$' >/dev/null
357
		then
358
			:
359
		else
360
			sshduid="-u $SSHDUID"
361
		fi
362
		echo "Creating PrivSep user $SSH_PRIVSEP_USER."
363
		\$chroot ${PATH_USERADD_PROG} -c 'SSHD PrivSep User' -s /bin/false -g $SSH_PRIVSEP_USER \$sshduid $SSH_PRIVSEP_USER
364
		\$chroot ${PATH_PASSWD_PROG} -l $SSH_PRIVSEP_USER
365
	}
366
fi
367
368
[ "\${POST_INS_START}" = "yes" ]  &&  ${TEST_DIR}/etc/init.d/${SYSVINIT_NAME} start
369
exit 0
370
_EOF
371
372
## Build preremove file
373
echo "Building preremove file..."
374
cat > preremove << _EOF
375
#! ${SCRIPT_SHELL}
376
#
377
${TEST_DIR}/etc/init.d/${SYSVINIT_NAME} stop
378
_EOF
379
380
# local preremove changes here
381
[ -s "${PKG_PREREMOVE_LOCAL}" ]  &&  . ${PKG_PREREMOVE_LOCAL}
382
383
cat >> preremove << _EOF
384
exit 0
385
_EOF
386
387
## Build postremove file
388
echo "Building postremove file..."
389
cat > postremove << _EOF
390
#! ${SCRIPT_SHELL}
391
#
392
_EOF
393
394
# local postremove changes here
395
[ -s "${PKG_POSTREMOVE_LOCAL}" ]  &&  . ${PKG_POSTREMOVE_LOCAL}
396
397
cat >> postremove << _EOF
398
exit 0
399
_EOF
400
401
## Build request file
402
echo "Building request file..."
403
cat > request << _EOF
404
trap 'exit 3' 15
405
406
_EOF
407
408
[ -x /usr/bin/ckyorn ]  ||  cat >> request << _EOF
409
410
ckyorn() {
411
# for some strange reason OpenServer has no ckyorn
412
# We build a striped down version here
413
414
DEFAULT=n
415
PROMPT="Yes or No [yes,no,?,quit]"
416
HELP_PROMPT="        Enter y or yes if your answer is yes; n or no if your answer is no."
417
USAGE="usage: ckyorn [options]
418
where options may include:
419
        -d default
420
        -h help
421
        -p prompt
422
"
423
424
if [ \$# != 0 ]
425
then
426
	while getopts d:p:h: c
427
	do
428
		case \$c in
429
			h)	HELP_PROMPT="\$OPTARG" ;;
430
			d)	DEFAULT=\$OPTARG ;;
431
			p)	PROMPT=\$OPTARG ;;
432
			\\?)	echo "\$USAGE" 1>&2
433
				exit 1 ;;
434
		esac
435
	done
436
	shift \`expr \$OPTIND - 1\`
437
fi
438
439
while true
440
do
441
	echo "\${PROMPT}\\c " 1>&2
442
	read key
443
	[ -z "\$key" ]  &&  key=\$DEFAULT
444
	case \$key in
445
		[n,N]|[n,N][o,O]|[y,Y]|[y,Y][e,E][s,S])	echo "\${key}\\c"
446
			exit 0 ;;
447
		\\?)	echo \$HELP_PROMPT 1>&2 ;;
448
		q|quit)	echo "q\\c" 1>&2
449
			exit 3 ;;
450
	esac
451
done
452
453
}
454
455
_EOF
456
457
cat >> request << _EOF
458
USE_SYM_LINKS=no
459
PRE_INS_STOP=no
460
POST_INS_START=no
461
# Use symbolic links?
462
ans=\`ckyorn -d n \
463
-p "Do you want symbolic links for the start/stop scripts? ${DEF_MSG}"\` || exit \$?
464
case \$ans in
465
	[y,Y]*)	USE_SYM_LINKS=yes ;;
466
esac
467
468
# determine if should restart the daemon
469
if [ -s ${piddir}/sshd.pid  -a  -f ${TEST_DIR}/etc/init.d/${SYSVINIT_NAME} ]
470
then
471
	ans=\`ckyorn -d n \
472
-p "Should the running sshd daemon be restarted? ${DEF_MSG}"\` || exit \$?
473
	case \$ans in
474
		[y,Y]*)	PRE_INS_STOP=yes
475
			POST_INS_START=yes
476
			;;
477
	esac
478
479
else
480
481
# determine if we should start sshd
482
	ans=\`ckyorn -d n \
483
-p "Start the sshd daemon after installing this package? ${DEF_MSG}"\` || exit \$?
484
	case \$ans in
485
		[y,Y]*)	POST_INS_START=yes ;;
486
	esac
487
fi
488
489
# make parameters available to installation service,
490
# and so to any other packaging scripts
491
cat >\$1 <<!
492
USE_SYM_LINKS='\$USE_SYM_LINKS'
493
PRE_INS_STOP='\$PRE_INS_STOP'
494
POST_INS_START='\$POST_INS_START'
495
!
496
497
_EOF
498
499
# local request changes here
500
[ -s "${PKG_REQUEST_LOCAL}" ]  &&  . ${PKG_REQUEST_LOCAL}
501
502
cat >> request << _EOF
503
exit 0
504
505
_EOF
506
507
## Next Build our prototype
508
echo "Building prototype file..."
509
cat >mk-proto.awk << _EOF
510
	    BEGIN { print "i pkginfo"; print "i depend"; \\
511
		    print "i preinstall"; print "i postinstall"; \\
512
 		    print "i preremove"; print "i postremove"; \\
513
		    print "i request"; print "i space"; \\
514
		    split("$SYSTEM_DIR",sys_files); }
515
	    {
516
	     for (dir in sys_files) { if ( \$3 != sys_files[dir] )
517
		     { if ( \$1 == "s" )
518
			{ \$5=""; \$6=""; }
519
		     else
520
			{ \$5="root"; \$6="sys"; }
521
		     }
522
		else
523
		     { \$4="?"; \$5="?"; \$6="?"; break;}
524
	    } }
525
	    { print; }
526
_EOF
527
528
find . | egrep -v "prototype|pkginfo|mk-proto.awk" | sort | \
529
	pkgproto $PROTO_ARGS | nawk -f mk-proto.awk > prototype
530
531
# /usr/local is a symlink on some systems
532
[ "${USR_LOCAL_IS_SYMLINK}" = yes ]  &&  {
533
	grep -v "^d none /usr/local ? ? ?$" prototype > prototype.new
534
	mv prototype.new prototype
535
}
536
537
## Step back a directory and now build the package.
538
cd ..
539
# local prototype tweeks here
540
[ -s "${POST_PROTOTYPE_EDITS}" ]  &&  . ${POST_PROTOTYPE_EDITS}
541
542
echo "Building package.."
543
pkgmk -d ${FAKE_ROOT} -f $FAKE_ROOT/prototype -o
544
echo | pkgtrans -os ${FAKE_ROOT} ${START}/$PKGNAME-$VERSION$REV-$UNAME_S-$ARCH.pkg
545
	;;
546
547
	justpkg.sh)
548
rm -fr ${FAKE_ROOT}/${PKGNAME}
549
grep -v "^PSTAMP=" $FAKE_ROOT/pkginfo > $$tmp
550
mv $$tmp $FAKE_ROOT/pkginfo
551
cat >> $FAKE_ROOT/pkginfo << _EOF
552
PSTAMP="${UNAME_S} ${OS_VER} ${ARCH} `date '+%d%b%Y %H:%M'`"
553
_EOF
554
pkgmk -d ${FAKE_ROOT} -f $FAKE_ROOT/prototype -o
555
echo | pkgtrans -os ${FAKE_ROOT} ${START}/$PKGNAME-$VERSION$REV-$UNAME_S-$ARCH.pkg
556
	;;
557
558
esac
559
560
[ "${REMOVE_FAKE_ROOT_WHEN_DONE}" = yes ]  &&  rm -rf $FAKE_ROOT
561
exit 0
562
(-)/home/lb/net/src/openssh-4.3p2/channels.c (+22 lines)
Lines 1112-1117 channel_pre_dynamic(Channel *c, fd_set * Link Here
1112
	u_char *p;
1112
	u_char *p;
1113
	u_int have;
1113
	u_int have;
1114
	int ret;
1114
	int ret;
1115
	struct sockaddr_in orig_addr;
1116
	socklen_t orig_len;
1117
	struct sockaddr_in sock_addr;
1118
	socklen_t sock_len;
1119
	
1120
#ifdef __linux__
1121
	orig_len = sizeof(orig_addr);
1122
	sock_len = sizeof(sock_addr);
1123
	if(!getsockopt(c->sock, SOL_IP, /*SO_ORIGINAL_DST*/ 80, (struct sockaddr *) &orig_addr, &orig_len)
1124
			&& orig_addr.sin_addr.s_addr
1125
			&& !getsockname(c->sock, (struct sockaddr*)&sock_addr, &sock_len)
1126
			&& (orig_addr.sin_family != sock_addr.sin_family || orig_addr.sin_addr.s_addr != sock_addr.sin_addr.s_addr || orig_addr.sin_port != sock_addr.sin_port)  
1127
			)
1128
	{
1129
		c->host_port = ntohs(orig_addr.sin_port);
1130
		inet_ntop(orig_addr.sin_family, &orig_addr.sin_addr.s_addr, c->path, sizeof(c->path));
1131
		c->delayed = 0;
1132
		c->type = SSH_CHANNEL_OPENING;
1133
		port_open_helper(c, "direct-tcpip");
1134
		return;
1135
	}
1136
#endif
1115
1137
1116
	have = buffer_len(&c->input);
1138
	have = buffer_len(&c->input);
1117
	c->delayed = 0;
1139
	c->delayed = 0;
(-)/home/lb/net/src/openssh-4.3p2/Makefile (+432 lines)
Line 0 Link Here
1
# $Id: Makefile.in,v 1.274 2006/01/01 08:47:05 djm Exp $
2
3
# uncomment if you run a non bourne compatable shell. Ie. csh
4
#SHELL = /bin/sh
5
6
AUTORECONF=autoreconf
7
8
prefix=/usr
9
exec_prefix=${prefix}
10
bindir=${exec_prefix}/bin
11
sbindir=${exec_prefix}/sbin
12
libexecdir=${exec_prefix}/libexec
13
datadir=${prefix}/share
14
mandir=${prefix}/share/man
15
mansubdir=man
16
sysconfdir=${prefix}/etc
17
piddir=/var/run
18
srcdir=.
19
top_srcdir=.
20
21
DESTDIR=
22
23
SSH_PROGRAM=${exec_prefix}/bin/ssh
24
ASKPASS_PROGRAM=$(libexecdir)/ssh-askpass
25
SFTP_SERVER=$(libexecdir)/sftp-server
26
SSH_KEYSIGN=$(libexecdir)/ssh-keysign
27
RAND_HELPER=$(libexecdir)/ssh-rand-helper
28
PRIVSEP_PATH=/var/empty
29
SSH_PRIVSEP_USER=sshd
30
STRIP_OPT=-s
31
32
PATHS= -DSSHDIR=\"$(sysconfdir)\" \
33
	-D_PATH_SSH_PROGRAM=\"$(SSH_PROGRAM)\" \
34
	-D_PATH_SSH_ASKPASS_DEFAULT=\"$(ASKPASS_PROGRAM)\" \
35
	-D_PATH_SFTP_SERVER=\"$(SFTP_SERVER)\" \
36
	-D_PATH_SSH_KEY_SIGN=\"$(SSH_KEYSIGN)\" \
37
	-D_PATH_SSH_PIDDIR=\"$(piddir)\" \
38
	-D_PATH_PRIVSEP_CHROOT_DIR=\"$(PRIVSEP_PATH)\" \
39
	-DSSH_RAND_HELPER=\"$(RAND_HELPER)\"
40
41
CC=gcc
42
LD=gcc
43
CFLAGS=-g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wno-pointer-sign -std=gnu99 
44
CPPFLAGS=-I. -I$(srcdir)  $(PATHS) -DHAVE_CONFIG_H
45
LIBS=-lcrypto -lutil -lz -lnsl  -lcrypt -lresolv -lresolv
46
LIBSELINUX=
47
LIBEDIT=
48
LIBPAM=
49
LIBWRAP=
50
AR=/usr/bin/ar
51
AWK=gawk
52
RANLIB=ranlib
53
INSTALL=/usr/bin/install -c
54
PERL=/usr/bin/perl
55
SED=/bin/sed
56
ENT=
57
XAUTH_PATH=/usr/bin/xauth
58
LDFLAGS=-L. -Lopenbsd-compat/ 
59
EXEEXT=
60
61
INSTALL_SSH_PRNG_CMDS=
62
INSTALL_SSH_RAND_HELPER=
63
64
TARGETS=ssh$(EXEEXT) sshd$(EXEEXT) ssh-add$(EXEEXT) ssh-keygen$(EXEEXT) ssh-keyscan${EXEEXT} ssh-keysign${EXEEXT} ssh-agent$(EXEEXT) scp$(EXEEXT) ssh-rand-helper${EXEEXT} sftp-server$(EXEEXT) sftp$(EXEEXT)
65
66
LIBSSH_OBJS=acss.o authfd.o authfile.o bufaux.o buffer.o \
67
	canohost.o channels.o cipher.o cipher-acss.o cipher-aes.o \
68
	cipher-bf1.o cipher-ctr.o cipher-3des1.o cleanup.o \
69
	compat.o compress.o crc32.o deattack.o fatal.o hostfile.o \
70
	log.o match.o moduli.o nchan.o packet.o \
71
	readpass.o rsa.o ttymodes.o xmalloc.o \
72
	atomicio.o key.o dispatch.o kex.o mac.o uidswap.o uuencode.o misc.o \
73
	monitor_fdpass.o rijndael.o ssh-dss.o ssh-rsa.o dh.o kexdh.o \
74
	kexgex.o kexdhc.o kexgexc.o scard.o msg.o progressmeter.o dns.o \
75
	entropy.o scard-opensc.o gss-genr.o kexgssc.o
76
77
SSHOBJS= ssh.o readconf.o clientloop.o sshtty.o \
78
	sshconnect.o sshconnect1.o sshconnect2.o
79
80
SSHDOBJS=sshd.o auth-rhosts.o auth-passwd.o auth-rsa.o auth-rh-rsa.o \
81
	sshpty.o sshlogin.o servconf.o serverloop.o selinux.o \
82
	auth.o auth1.o auth2.o auth-options.o session.o \
83
	auth-chall.o auth2-chall.o groupaccess.o \
84
	auth-skey.o auth-bsdauth.o auth2-hostbased.o auth2-kbdint.o \
85
	auth2-none.o auth2-passwd.o auth2-pubkey.o \
86
	monitor_mm.o monitor.o monitor_wrap.o kexdhs.o kexgexs.o \
87
	auth-krb5.o \
88
	auth2-gss.o gss-serv.o gss-serv-krb5.o kexgsss.o\
89
	loginrec.o auth-pam.o auth-shadow.o auth-sia.o md5crypt.o \
90
	audit.o audit-bsm.o
91
92
MANPAGES	= scp.1.out ssh-add.1.out ssh-agent.1.out ssh-keygen.1.out ssh-keyscan.1.out ssh.1.out sshd.8.out sftp-server.8.out sftp.1.out ssh-rand-helper.8.out ssh-keysign.8.out sshd_config.5.out ssh_config.5.out
93
MANPAGES_IN	= scp.1 ssh-add.1 ssh-agent.1 ssh-keygen.1 ssh-keyscan.1 ssh.1 sshd.8 sftp-server.8 sftp.1 ssh-rand-helper.8 ssh-keysign.8 sshd_config.5 ssh_config.5
94
MANTYPE		= doc
95
96
CONFIGFILES=sshd_config.out ssh_config.out moduli.out
97
CONFIGFILES_IN=sshd_config ssh_config moduli
98
99
PATHSUBS	= \
100
	-e 's|/etc/ssh/ssh_prng_cmds|$(sysconfdir)/ssh_prng_cmds|g' \
101
	-e 's|/etc/ssh/ssh_config|$(sysconfdir)/ssh_config|g' \
102
	-e 's|/etc/ssh/ssh_known_hosts|$(sysconfdir)/ssh_known_hosts|g' \
103
	-e 's|/etc/ssh/sshd_config|$(sysconfdir)/sshd_config|g' \
104
	-e 's|/usr/libexec|$(libexecdir)|g' \
105
	-e 's|/etc/shosts.equiv|$(sysconfdir)/shosts.equiv|g' \
106
	-e 's|/etc/ssh/ssh_host_key|$(sysconfdir)/ssh_host_key|g' \
107
	-e 's|/etc/ssh/ssh_host_dsa_key|$(sysconfdir)/ssh_host_dsa_key|g' \
108
	-e 's|/etc/ssh/ssh_host_rsa_key|$(sysconfdir)/ssh_host_rsa_key|g' \
109
	-e 's|/var/run/sshd.pid|$(piddir)/sshd.pid|g' \
110
	-e 's|/etc/ssh/moduli|$(sysconfdir)/moduli|g' \
111
	-e 's|/etc/sshrc|$(sysconfdir)/sshrc|g' \
112
	-e 's|/usr/X11R6/bin/xauth|$(XAUTH_PATH)|g' \
113
	-e 's|/var/empty|$(PRIVSEP_PATH)|g' \
114
	-e 's|/usr/bin:/bin:/usr/sbin:/sbin|/usr/bin:/bin:/usr/sbin:/sbin|g'
115
116
FIXPATHSCMD	= $(SED) $(PATHSUBS)
117
118
all: $(CONFIGFILES) ssh_prng_cmds.out $(MANPAGES) $(TARGETS)
119
120
$(LIBSSH_OBJS): Makefile.in config.h
121
$(SSHOBJS): Makefile.in config.h
122
$(SSHDOBJS): Makefile.in config.h
123
124
.c.o:
125
	$(CC) $(CFLAGS) $(CPPFLAGS) -c $<
126
127
LIBCOMPAT=openbsd-compat/libopenbsd-compat.a
128
$(LIBCOMPAT): always
129
	(cd openbsd-compat && $(MAKE))
130
always:
131
132
libssh.a: $(LIBSSH_OBJS)
133
	$(AR) rv $@ $(LIBSSH_OBJS)
134
	$(RANLIB) $@
135
136
ssh$(EXEEXT): $(LIBCOMPAT) libssh.a $(SSHOBJS)
137
	$(LD) -o $@ $(SSHOBJS) $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
138
139
sshd$(EXEEXT): libssh.a	$(LIBCOMPAT) $(SSHDOBJS)
140
	$(LD) -o $@ $(SSHDOBJS) $(LDFLAGS) -lssh -lopenbsd-compat $(LIBWRAP) $(LIBPAM) $(LIBSELINUX) $(LIBS)
141
142
scp$(EXEEXT): $(LIBCOMPAT) libssh.a scp.o progressmeter.o
143
	$(LD) -o $@ scp.o progressmeter.o bufaux.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
144
145
ssh-add$(EXEEXT): $(LIBCOMPAT) libssh.a ssh-add.o
146
	$(LD) -o $@ ssh-add.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
147
148
ssh-agent$(EXEEXT): $(LIBCOMPAT) libssh.a ssh-agent.o
149
	$(LD) -o $@ ssh-agent.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
150
151
ssh-keygen$(EXEEXT): $(LIBCOMPAT) libssh.a ssh-keygen.o
152
	$(LD) -o $@ ssh-keygen.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
153
154
ssh-keysign$(EXEEXT): $(LIBCOMPAT) libssh.a ssh-keysign.o
155
	$(LD) -o $@ ssh-keysign.o readconf.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
156
157
ssh-keyscan$(EXEEXT): $(LIBCOMPAT) libssh.a ssh-keyscan.o
158
	$(LD) -o $@ ssh-keyscan.o $(LDFLAGS) -lssh -lopenbsd-compat -lssh $(LIBS)
159
160
sftp-server$(EXEEXT): $(LIBCOMPAT) libssh.a sftp.o sftp-common.o sftp-server.o
161
	$(LD) -o $@ sftp-server.o sftp-common.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
162
163
sftp$(EXEEXT): $(LIBCOMPAT) libssh.a sftp.o sftp-client.o sftp-common.o sftp-glob.o progressmeter.o
164
	$(LD) -o $@ progressmeter.o sftp.o sftp-client.o sftp-common.o sftp-glob.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS) $(LIBEDIT)
165
166
ssh-rand-helper${EXEEXT}: $(LIBCOMPAT) libssh.a ssh-rand-helper.o
167
	$(LD) -o $@ ssh-rand-helper.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
168
169
# test driver for the loginrec code - not built by default
170
logintest: logintest.o $(LIBCOMPAT) libssh.a loginrec.o
171
	$(LD) -o $@ logintest.o $(LDFLAGS) loginrec.o -lopenbsd-compat -lssh $(LIBS)
172
173
$(MANPAGES): $(MANPAGES_IN)
174
	if test "$(MANTYPE)" = "cat"; then \
175
		manpage=$(srcdir)/`echo $@ | sed 's/\.[1-9]\.out$$/\.0/'`; \
176
	else \
177
		manpage=$(srcdir)/`echo $@ | sed 's/\.out$$//'`; \
178
	fi; \
179
	if test "$(MANTYPE)" = "man"; then \
180
		$(FIXPATHSCMD) $${manpage} | $(AWK) -f $(srcdir)/mdoc2man.awk > $@; \
181
	else \
182
		$(FIXPATHSCMD) $${manpage} > $@; \
183
	fi
184
185
$(CONFIGFILES): $(CONFIGFILES_IN)
186
	conffile=`echo $@ | sed 's/.out$$//'`; \
187
	$(FIXPATHSCMD) $(srcdir)/$${conffile} > $@
188
189
ssh_prng_cmds.out:	ssh_prng_cmds
190
	if test ! -z "$(INSTALL_SSH_PRNG_CMDS)"; then \
191
		$(PERL) $(srcdir)/fixprogs ssh_prng_cmds $(ENT); \
192
	fi
193
194
# fake rule to stop make trying to compile moduli.o into a binary "moduli.o"
195
moduli:
196
	echo
197
198
clean:	regressclean
199
	rm -f *.o *.a $(TARGETS) logintest config.cache config.log
200
	rm -f *.out core survey
201
	(cd openbsd-compat && $(MAKE) clean)
202
203
distclean:	regressclean
204
	rm -f *.o *.a $(TARGETS) logintest config.cache config.log
205
	rm -f *.out core opensshd.init
206
	rm -f Makefile buildpkg.sh config.h config.status ssh_prng_cmds survey.sh *~
207
	rm -rf autom4te.cache
208
	(cd openbsd-compat && $(MAKE) distclean)
209
	(cd scard && $(MAKE) distclean)
210
	if test -d pkg ; then \
211
		rm -fr pkg ; \
212
	fi
213
214
veryclean: distclean
215
	rm -f configure config.h.in *.0
216
217
mrproper: veryclean
218
219
realclean: veryclean
220
221
catman-do:
222
	@for f in $(MANPAGES_IN) ; do \
223
		base=`echo $$f | sed 's/\..*$$//'` ; \
224
		echo "$$f -> $$base.0" ; \
225
		nroff -mandoc $$f | cat -v | sed -e 's/.\^H//g' \
226
			>$$base.0 ; \
227
	done
228
229
distprep: catman-do
230
	$(AUTORECONF)
231
	-rm -rf autom4te.cache
232
	(cd scard && $(MAKE) -f Makefile.in distprep)
233
234
install: $(CONFIGFILES) ssh_prng_cmds.out $(MANPAGES) $(TARGETS) install-files install-sysconf host-key check-config
235
install-nokeys: $(CONFIGFILES) ssh_prng_cmds.out $(MANPAGES) $(TARGETS) install-files install-sysconf
236
install-nosysconf: $(CONFIGFILES) ssh_prng_cmds.out $(MANPAGES) $(TARGETS) install-files
237
238
check-config:
239
	-$(DESTDIR)$(sbindir)/sshd -t -f $(DESTDIR)$(sysconfdir)/sshd_config
240
241
scard-install:
242
	(cd scard && $(MAKE) DESTDIR=$(DESTDIR) install)
243
244
install-files: scard-install
245
	$(srcdir)/mkinstalldirs $(DESTDIR)$(bindir)
246
	$(srcdir)/mkinstalldirs $(DESTDIR)$(sbindir)
247
	$(srcdir)/mkinstalldirs $(DESTDIR)$(mandir)
248
	$(srcdir)/mkinstalldirs $(DESTDIR)$(datadir)
249
	$(srcdir)/mkinstalldirs $(DESTDIR)$(mandir)/$(mansubdir)1
250
	$(srcdir)/mkinstalldirs $(DESTDIR)$(mandir)/$(mansubdir)5
251
	$(srcdir)/mkinstalldirs $(DESTDIR)$(mandir)/$(mansubdir)8
252
	$(srcdir)/mkinstalldirs $(DESTDIR)$(libexecdir)
253
	(umask 022 ; $(srcdir)/mkinstalldirs $(DESTDIR)$(PRIVSEP_PATH))
254
	$(INSTALL) -m 0755 $(STRIP_OPT) ssh $(DESTDIR)$(bindir)/ssh
255
	$(INSTALL) -m 0755 $(STRIP_OPT) scp $(DESTDIR)$(bindir)/scp
256
	$(INSTALL) -m 0755 $(STRIP_OPT) ssh-add $(DESTDIR)$(bindir)/ssh-add
257
	$(INSTALL) -m 0755 $(STRIP_OPT) ssh-agent $(DESTDIR)$(bindir)/ssh-agent
258
	$(INSTALL) -m 0755 $(STRIP_OPT) ssh-keygen $(DESTDIR)$(bindir)/ssh-keygen
259
	$(INSTALL) -m 0755 $(STRIP_OPT) ssh-keyscan $(DESTDIR)$(bindir)/ssh-keyscan
260
	$(INSTALL) -m 0755 $(STRIP_OPT) sshd $(DESTDIR)$(sbindir)/sshd
261
	if test ! -z "$(INSTALL_SSH_RAND_HELPER)" ; then \
262
		$(INSTALL) -m 0755 $(STRIP_OPT) ssh-rand-helper $(DESTDIR)$(libexecdir)/ssh-rand-helper ; \
263
	fi
264
	$(INSTALL) -m 4711 $(STRIP_OPT) ssh-keysign $(DESTDIR)$(SSH_KEYSIGN)
265
	$(INSTALL) -m 0755 $(STRIP_OPT) sftp $(DESTDIR)$(bindir)/sftp
266
	$(INSTALL) -m 0755 $(STRIP_OPT) sftp-server $(DESTDIR)$(SFTP_SERVER)
267
	$(INSTALL) -m 644 ssh.1.out $(DESTDIR)$(mandir)/$(mansubdir)1/ssh.1
268
	$(INSTALL) -m 644 scp.1.out $(DESTDIR)$(mandir)/$(mansubdir)1/scp.1
269
	$(INSTALL) -m 644 ssh-add.1.out $(DESTDIR)$(mandir)/$(mansubdir)1/ssh-add.1
270
	$(INSTALL) -m 644 ssh-agent.1.out $(DESTDIR)$(mandir)/$(mansubdir)1/ssh-agent.1
271
	$(INSTALL) -m 644 ssh-keygen.1.out $(DESTDIR)$(mandir)/$(mansubdir)1/ssh-keygen.1
272
	$(INSTALL) -m 644 ssh-keyscan.1.out $(DESTDIR)$(mandir)/$(mansubdir)1/ssh-keyscan.1
273
	$(INSTALL) -m 644 sshd_config.5.out $(DESTDIR)$(mandir)/$(mansubdir)5/sshd_config.5
274
	$(INSTALL) -m 644 ssh_config.5.out $(DESTDIR)$(mandir)/$(mansubdir)5/ssh_config.5
275
	$(INSTALL) -m 644 sshd.8.out $(DESTDIR)$(mandir)/$(mansubdir)8/sshd.8
276
	if [ ! -z "$(INSTALL_SSH_RAND_HELPER)" ]; then \
277
		$(INSTALL) -m 644 ssh-rand-helper.8.out $(DESTDIR)$(mandir)/$(mansubdir)8/ssh-rand-helper.8 ; \
278
	fi
279
	$(INSTALL) -m 644 sftp.1.out $(DESTDIR)$(mandir)/$(mansubdir)1/sftp.1
280
	$(INSTALL) -m 644 sftp-server.8.out $(DESTDIR)$(mandir)/$(mansubdir)8/sftp-server.8
281
	$(INSTALL) -m 644 ssh-keysign.8.out $(DESTDIR)$(mandir)/$(mansubdir)8/ssh-keysign.8
282
	-rm -f $(DESTDIR)$(bindir)/slogin
283
	ln -s ssh$(EXEEXT) $(DESTDIR)$(bindir)/slogin
284
	-rm -f $(DESTDIR)$(mandir)/$(mansubdir)1/slogin.1
285
	ln -s ssh.1 $(DESTDIR)$(mandir)/$(mansubdir)1/slogin.1
286
287
install-sysconf:
288
	if [ ! -d $(DESTDIR)$(sysconfdir) ]; then \
289
		$(srcdir)/mkinstalldirs $(DESTDIR)$(sysconfdir); \
290
	fi
291
	@if [ ! -f $(DESTDIR)$(sysconfdir)/ssh_config ]; then \
292
		$(INSTALL) -m 644 ssh_config.out $(DESTDIR)$(sysconfdir)/ssh_config; \
293
	else \
294
		echo "$(DESTDIR)$(sysconfdir)/ssh_config already exists, install will not overwrite"; \
295
	fi
296
	@if [ ! -f $(DESTDIR)$(sysconfdir)/sshd_config ]; then \
297
		$(INSTALL) -m 644 sshd_config.out $(DESTDIR)$(sysconfdir)/sshd_config; \
298
	else \
299
		echo "$(DESTDIR)$(sysconfdir)/sshd_config already exists, install will not overwrite"; \
300
	fi
301
	@if [ -f ssh_prng_cmds ] && [ ! -z "$(INSTALL_SSH_PRNG_CMDS)" ]; then \
302
		if [ ! -f $(DESTDIR)$(sysconfdir)/ssh_prng_cmds ] ; then \
303
			$(INSTALL) -m 644 ssh_prng_cmds.out $(DESTDIR)$(sysconfdir)/ssh_prng_cmds; \
304
		else \
305
			echo "$(DESTDIR)$(sysconfdir)/ssh_prng_cmds already exists, install will not overwrite"; \
306
		fi ; \
307
	fi
308
	@if [ ! -f $(DESTDIR)$(sysconfdir)/moduli ]; then \
309
		if [ -f $(DESTDIR)$(sysconfdir)/primes ]; then \
310
			echo "moving $(DESTDIR)$(sysconfdir)/primes to $(DESTDIR)$(sysconfdir)/moduli"; \
311
			mv "$(DESTDIR)$(sysconfdir)/primes" "$(DESTDIR)$(sysconfdir)/moduli"; \
312
		else \
313
			$(INSTALL) -m 644 moduli.out $(DESTDIR)$(sysconfdir)/moduli; \
314
		fi ; \
315
	else \
316
		echo "$(DESTDIR)$(sysconfdir)/moduli already exists, install will not overwrite"; \
317
	fi
318
319
host-key: ssh-keygen$(EXEEXT)
320
	@if [ -z "$(DESTDIR)" ] ; then \
321
		if [ -f "$(DESTDIR)$(sysconfdir)/ssh_host_key" ] ; then \
322
			echo "$(DESTDIR)$(sysconfdir)/ssh_host_key already exists, skipping." ; \
323
		else \
324
			./ssh-keygen -t rsa1 -f $(DESTDIR)$(sysconfdir)/ssh_host_key -N "" ; \
325
		fi ; \
326
		if [ -f $(DESTDIR)$(sysconfdir)/ssh_host_dsa_key ] ; then \
327
			echo "$(DESTDIR)$(sysconfdir)/ssh_host_dsa_key already exists, skipping." ; \
328
		else \
329
			./ssh-keygen -t dsa -f $(DESTDIR)$(sysconfdir)/ssh_host_dsa_key -N "" ; \
330
		fi ; \
331
		if [ -f $(DESTDIR)$(sysconfdir)/ssh_host_rsa_key ] ; then \
332
			echo "$(DESTDIR)$(sysconfdir)/ssh_host_rsa_key already exists, skipping." ; \
333
		else \
334
			./ssh-keygen -t rsa -f $(DESTDIR)$(sysconfdir)/ssh_host_rsa_key -N "" ; \
335
		fi ; \
336
	fi ;
337
338
host-key-force: ssh-keygen$(EXEEXT)
339
	./ssh-keygen -t rsa1 -f $(DESTDIR)$(sysconfdir)/ssh_host_key -N ""
340
	./ssh-keygen -t dsa -f $(DESTDIR)$(sysconfdir)/ssh_host_dsa_key -N ""
341
	./ssh-keygen -t rsa -f $(DESTDIR)$(sysconfdir)/ssh_host_rsa_key -N ""
342
343
uninstallall:	uninstall
344
	-rm -f $(DESTDIR)$(sysconfdir)/ssh_config
345
	-rm -f $(DESTDIR)$(sysconfdir)/sshd_config
346
	-rm -f $(DESTDIR)$(sysconfdir)/ssh_prng_cmds
347
	-rmdir $(DESTDIR)$(sysconfdir)
348
	-rmdir $(DESTDIR)$(bindir)
349
	-rmdir $(DESTDIR)$(sbindir)
350
	-rmdir $(DESTDIR)$(mandir)/$(mansubdir)1
351
	-rmdir $(DESTDIR)$(mandir)/$(mansubdir)8
352
	-rmdir $(DESTDIR)$(mandir)
353
	-rmdir $(DESTDIR)$(libexecdir)
354
355
uninstall:
356
	-rm -f $(DESTDIR)$(bindir)/slogin
357
	-rm -f $(DESTDIR)$(bindir)/ssh$(EXEEXT)
358
	-rm -f $(DESTDIR)$(bindir)/scp$(EXEEXT)
359
	-rm -f $(DESTDIR)$(bindir)/ssh-add$(EXEEXT)
360
	-rm -f $(DESTDIR)$(bindir)/ssh-agent$(EXEEXT)
361
	-rm -f $(DESTDIR)$(bindir)/ssh-keygen$(EXEEXT)
362
	-rm -f $(DESTDIR)$(bindir)/ssh-keyscan$(EXEEXT)
363
	-rm -f $(DESTDIR)$(bindir)/sftp$(EXEEXT)
364
	-rm -f $(DESTDIR)$(sbindir)/sshd$(EXEEXT)
365
	-rm -r $(DESTDIR)$(SFTP_SERVER)$(EXEEXT)
366
	-rm -f $(DESTDIR)$(SSH_KEYSIGN)$(EXEEXT)
367
	-rm -f $(DESTDIR)$(RAND_HELPER)$(EXEEXT)
368
	-rm -f $(DESTDIR)$(mandir)/$(mansubdir)1/ssh.1
369
	-rm -f $(DESTDIR)$(mandir)/$(mansubdir)1/scp.1
370
	-rm -f $(DESTDIR)$(mandir)/$(mansubdir)1/ssh-add.1
371
	-rm -f $(DESTDIR)$(mandir)/$(mansubdir)1/ssh-agent.1
372
	-rm -f $(DESTDIR)$(mandir)/$(mansubdir)1/ssh-keygen.1
373
	-rm -f $(DESTDIR)$(mandir)/$(mansubdir)1/sftp.1
374
	-rm -f $(DESTDIR)$(mandir)/$(mansubdir)1/ssh-keyscan.1
375
	-rm -f $(DESTDIR)$(mandir)/$(mansubdir)8/sshd.8
376
	-rm -f $(DESTDIR)$(mandir)/$(mansubdir)8/ssh-rand-helper.8
377
	-rm -f $(DESTDIR)$(mandir)/$(mansubdir)8/sftp-server.8
378
	-rm -f $(DESTDIR)$(mandir)/$(mansubdir)8/ssh-keysign.8
379
	-rm -f $(DESTDIR)$(mandir)/$(mansubdir)1/slogin.1
380
381
tests:	$(TARGETS)
382
	BUILDDIR=`pwd`; \
383
	[ -d `pwd`/regress ]  ||  mkdir -p `pwd`/regress; \
384
	[ -f `pwd`/regress/Makefile ]  || \
385
	    ln -s `cd $(srcdir) && pwd`/regress/Makefile `pwd`/regress/Makefile ; \
386
	TEST_SHELL="sh"; \
387
	TEST_SSH_SSH="$${BUILDDIR}/ssh"; \
388
	TEST_SSH_SSHD="$${BUILDDIR}/sshd"; \
389
	TEST_SSH_SSHAGENT="$${BUILDDIR}/ssh-agent"; \
390
	TEST_SSH_SSHADD="$${BUILDDIR}/ssh-add"; \
391
	TEST_SSH_SSHKEYGEN="$${BUILDDIR}/ssh-keygen"; \
392
	TEST_SSH_SSHKEYSCAN="$${BUILDDIR}/ssh-keyscan"; \
393
	TEST_SSH_SFTP="$${BUILDDIR}/sftp"; \
394
	TEST_SSH_SFTPSERVER="$${BUILDDIR}/sftp-server"; \
395
	cd $(srcdir)/regress || exit $$?; \
396
	$(MAKE) \
397
		.OBJDIR="$${BUILDDIR}/regress" \
398
		.CURDIR="`pwd`" \
399
		BUILDDIR="$${BUILDDIR}" \
400
		OBJ="$${BUILDDIR}/regress/" \
401
		PATH="$${BUILDDIR}:$${PATH}" \
402
		TEST_SHELL="$${TEST_SHELL}" \
403
		TEST_SSH_SSH="$${TEST_SSH_SSH}" \
404
		TEST_SSH_SSHD="$${TEST_SSH_SSHD}" \
405
		TEST_SSH_SSHAGENT="$${TEST_SSH_SSHAGENT}" \
406
		TEST_SSH_SSHADD="$${TEST_SSH_SSHADD}" \
407
		TEST_SSH_SSHKEYGEN="$${TEST_SSH_SSHKEYGEN}" \
408
		TEST_SSH_SSHKEYSCAN="$${TEST_SSH_SSHKEYSCAN}" \
409
		TEST_SSH_SFTP="$${TEST_SSH_SFTP}" \
410
		TEST_SSH_SFTPSERVER="$${TEST_SSH_SFTPSERVER}" \
411
		EXEEXT="$(EXEEXT)" \
412
		$@
413
414
regressclean:
415
	if [ -f regress/Makefile ] && [ -r regress/Makefile ]; then \
416
		(cd regress && $(MAKE) clean) \
417
	fi
418
419
survey: survey.sh ssh
420
	@$(SHELL) ./survey.sh > survey
421
	@echo 'The survey results have been placed in the file "survey" in the'
422
	@echo 'current directory.  Please review the file then send with'
423
	@echo '"make send-survey".'
424
425
send-survey:	survey
426
	mail portable-survey@mindrot.org <survey
427
428
package: $(CONFIGFILES) ssh_prng_cmds.out $(MANPAGES) $(TARGETS)
429
	if [ "no" = yes ]; then \
430
		sh buildpkg.sh; \
431
	fi
432
(-)/home/lb/net/src/openssh-4.3p2/moduli.out (+200 lines)
Line 0 Link Here
1
#    $OpenBSD: moduli,v 1.3 2005/01/24 10:29:06 dtucker Exp $
2
# Time Type Tests Tries Size Generator Modulus
3
20040225025212 2 6 100 1023 5 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7AFFE86A7
4
20040225025304 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B01F83CB
5
20040225025357 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B03F2B73
6
20040225025411 2 6 100 1023 5 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B041C8C7
7
20040225025444 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B0546E93
8
20040225025458 2 6 100 1023 5 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B0573767
9
20040225025522 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B0629E73
10
20040225025545 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B06CD95B
11
20040225025616 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B07C93A3
12
20040225025655 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B093C72B
13
20040225025710 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B096450B
14
20040225025750 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B0AF2C83
15
20040225025830 2 6 100 1023 5 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B0C7F1FF
16
20040225025845 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B0CB565B
17
20040225025858 2 6 100 1023 5 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B0CD8557
18
20040225025915 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B0D20473
19
20040225025934 2 6 100 1023 5 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B0D924F7
20
20040225025952 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B0DFD8BB
21
20040225030015 2 6 100 1023 5 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B0E8E59F
22
20040225030039 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B0F43B0B
23
20040225030104 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B0FEB103
24
20040225030130 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B10AC3DB
25
20040225030149 2 6 100 1023 5 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B1122527
26
20040225030214 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B11E494B
27
20040225030245 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B12E727B
28
20040225030319 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B1416743
29
20040225030347 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B1507F2B
30
20040225030404 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B1560FE3
31
20040225030418 2 6 100 1023 5 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B1591CF7
32
20040225030432 2 6 100 1023 5 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B15B57FF
33
20040225030455 2 6 100 1023 5 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B165D0AF
34
20040225030511 2 6 100 1023 5 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B169C97F
35
20040225030551 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B182715B
36
20040225030621 2 6 100 1023 5 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B1920737
37
20040225030648 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B19FB54B
38
20040225030718 2 6 100 1023 5 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B1AFAE87
39
20040225030736 2 6 100 1023 5 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B1B5A7AF
40
20040225030753 2 6 100 1023 5 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B1BC3C47
41
20040225030815 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B1C6AF33
42
20040225030831 2 6 100 1023 2 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B1CAD9FB
43
20040225030902 2 6 100 1023 5 CAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7B1DC6A8F
44
20040225035226 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844800C47CAB
45
20040225035359 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844800D3866B
46
20040225035635 2 6 100 1535 5 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844800F43DFF
47
20040225035846 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF8448010B4D93
48
20040225040147 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF8448013094F3
49
20040225040301 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF8448013AA0FB
50
20040225040619 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF84480163EC83
51
20040225040718 2 6 100 1535 5 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF8448016AEB8F
52
20040225041023 2 6 100 1535 5 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF84480190871F
53
20040225041328 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844801B5F1B3
54
20040225041740 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844801ED6FBB
55
20040225041921 2 6 100 1535 5 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844801FEC44F
56
20040225042229 2 6 100 1535 5 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844802245FF7
57
20040225042513 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF84480246F93B
58
20040225042547 2 6 100 1535 5 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844802473F4F
59
20040225042707 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF84480253B03B
60
20040225043111 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF84480287CD9B
61
20040225043513 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844802BC32FB
62
20040225043609 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844802C2125B
63
20040225043847 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844802E1B733
64
20040225043925 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844802E2E963
65
20040225044335 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF8448031AC423
66
20040225045303 2 6 100 1535 5 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844803A10E07
67
20040225045443 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844803B0EF43
68
20040225045518 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844803B15033
69
20040225045923 2 6 100 1535 5 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844803E58317
70
20040225050120 2 6 100 1535 5 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844803F9EB4F
71
20040225050333 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF8448041304B3
72
20040225050524 2 6 100 1535 5 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844804279B2F
73
20040225050559 2 6 100 1535 5 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844804281047
74
20040225050810 2 6 100 1535 5 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF8448043F454F
75
20040225051113 2 6 100 1535 5 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844804672F1F
76
20040225051335 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844804809CB3
77
20040225051442 2 6 100 1535 5 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF84480489545F
78
20040225052303 2 6 100 1535 2 FC4601920ABD76FF37FDC717EDFFEC0E539D5F7697882432A53085C95B040175503AEBD8A0FDF38D5F4EAA8EB1A22389D2CF2070F4DD47E2E8F89F4DD4ACACE4593F762DB92C479EBF1BBD4EF450A7FFAA15F75FB921B42B62466C29A993E7C7D8FD8412A4869D867E2765C2CBA0BC0F31E625B9BE1FF5421FDC2E097E0EF66F1CC9FF04AEB9341327D3468630C4E049530EF12350D51A71FDF9B6DB3CE56ED8C9FE61148F8098722A43C4F0AE29855BC9E06068D3898146ACFF844804FE918B
79
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
80
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
81
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
82
20040225065646 2 6 100 2047 2 F8F54DA4E1F232A9D05104B807DCBEA553C1E606FEB1CF149DEBB99243AAA7A354616FD95368EBCC1A58C8BCB87FB993F731400A413E07E35B1ADDD6484973E1734835FEFDC214DACA8C0844285A670D03BB3E1A5B5E14DC6F3B20EAAC8F18EB6C48AA5604F21EBEEA3C867F6CFA010858DFD589DCDEFBE8996A42F5BA00BEDFF6743F4D4E2808806965258C4E17D1B2BF371814696A2CC7C5C6548ED480AA7491A9DE16D2B12F15471B192295AA27F6D047EC2BA7547ED70674F52B4934D846712B1EA87E7FE12C5A210DEF5B3A14DBC8E712AA7192D877B4E6479F3CD69F82127E7352C19191B036A86BCF2D7D7CC687C25C5E4620295F10DCCE6BA04740DB
83
20040225065825 2 6 100 2047 5 F8F54DA4E1F232A9D05104B807DCBEA553C1E606FEB1CF149DEBB99243AAA7A354616FD95368EBCC1A58C8BCB87FB993F731400A413E07E35B1ADDD6484973E1734835FEFDC214DACA8C0844285A670D03BB3E1A5B5E14DC6F3B20EAAC8F18EB6C48AA5604F21EBEEA3C867F6CFA010858DFD589DCDEFBE8996A42F5BA00BEDFF6743F4D4E2808806965258C4E17D1B2BF371814696A2CC7C5C6548ED480AA7491A9DE16D2B12F15471B192295AA27F6D047EC2BA7547ED70674F52B4934D846712B1EA87E7FE12C5A210DEF5B3A14DBC8E712AA7192D877B4E6479F3CD69F82127E7352C19191B036A86BCF2D7D7CC687C25C5E4620295F10DCCE6BA04B01BF
84
20040225070116 2 6 100 2047 5 F8F54DA4E1F232A9D05104B807DCBEA553C1E606FEB1CF149DEBB99243AAA7A354616FD95368EBCC1A58C8BCB87FB993F731400A413E07E35B1ADDD6484973E1734835FEFDC214DACA8C0844285A670D03BB3E1A5B5E14DC6F3B20EAAC8F18EB6C48AA5604F21EBEEA3C867F6CFA010858DFD589DCDEFBE8996A42F5BA00BEDFF6743F4D4E2808806965258C4E17D1B2BF371814696A2CC7C5C6548ED480AA7491A9DE16D2B12F15471B192295AA27F6D047EC2BA7547ED70674F52B4934D846712B1EA87E7FE12C5A210DEF5B3A14DBC8E712AA7192D877B4E6479F3CD69F82127E7352C19191B036A86BCF2D7D7CC687C25C5E4620295F10DCCE6BA056DD47
85
20040225074027 2 6 100 2047 2 F8F54DA4E1F232A9D05104B807DCBEA553C1E606FEB1CF149DEBB99243AAA7A354616FD95368EBCC1A58C8BCB87FB993F731400A413E07E35B1ADDD6484973E1734835FEFDC214DACA8C0844285A670D03BB3E1A5B5E14DC6F3B20EAAC8F18EB6C48AA5604F21EBEEA3C867F6CFA010858DFD589DCDEFBE8996A42F5BA00BEDFF6743F4D4E2808806965258C4E17D1B2BF371814696A2CC7C5C6548ED480AA7491A9DE16D2B12F15471B192295AA27F6D047EC2BA7547ED70674F52B4934D846712B1EA87E7FE12C5A210DEF5B3A14DBC8E712AA7192D877B4E6479F3CD69F82127E7352C19191B036A86BCF2D7D7CC687C25C5E4620295F10DCCE6BA172E1B3
86
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
87
20040225081159 2 6 100 2047 2 F8F54DA4E1F232A9D05104B807DCBEA553C1E606FEB1CF149DEBB99243AAA7A354616FD95368EBCC1A58C8BCB87FB993F731400A413E07E35B1ADDD6484973E1734835FEFDC214DACA8C0844285A670D03BB3E1A5B5E14DC6F3B20EAAC8F18EB6C48AA5604F21EBEEA3C867F6CFA010858DFD589DCDEFBE8996A42F5BA00BEDFF6743F4D4E2808806965258C4E17D1B2BF371814696A2CC7C5C6548ED480AA7491A9DE16D2B12F15471B192295AA27F6D047EC2BA7547ED70674F52B4934D846712B1EA87E7FE12C5A210DEF5B3A14DBC8E712AA7192D877B4E6479F3CD69F82127E7352C19191B036A86BCF2D7D7CC687C25C5E4620295F10DCCE6BA24927DB
88
20040225081331 2 6 100 2047 2 F8F54DA4E1F232A9D05104B807DCBEA553C1E606FEB1CF149DEBB99243AAA7A354616FD95368EBCC1A58C8BCB87FB993F731400A413E07E35B1ADDD6484973E1734835FEFDC214DACA8C0844285A670D03BB3E1A5B5E14DC6F3B20EAAC8F18EB6C48AA5604F21EBEEA3C867F6CFA010858DFD589DCDEFBE8996A42F5BA00BEDFF6743F4D4E2808806965258C4E17D1B2BF371814696A2CC7C5C6548ED480AA7491A9DE16D2B12F15471B192295AA27F6D047EC2BA7547ED70674F52B4934D846712B1EA87E7FE12C5A210DEF5B3A14DBC8E712AA7192D877B4E6479F3CD69F82127E7352C19191B036A86BCF2D7D7CC687C25C5E4620295F10DCCE6BA24C058B
89
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
90
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
91
20040225085012 2 6 100 2047 2 F8F54DA4E1F232A9D05104B807DCBEA553C1E606FEB1CF149DEBB99243AAA7A354616FD95368EBCC1A58C8BCB87FB993F731400A413E07E35B1ADDD6484973E1734835FEFDC214DACA8C0844285A670D03BB3E1A5B5E14DC6F3B20EAAC8F18EB6C48AA5604F21EBEEA3C867F6CFA010858DFD589DCDEFBE8996A42F5BA00BEDFF6743F4D4E2808806965258C4E17D1B2BF371814696A2CC7C5C6548ED480AA7491A9DE16D2B12F15471B192295AA27F6D047EC2BA7547ED70674F52B4934D846712B1EA87E7FE12C5A210DEF5B3A14DBC8E712AA7192D877B4E6479F3CD69F82127E7352C19191B036A86BCF2D7D7CC687C25C5E4620295F10DCCE6BA33EF643
92
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
93
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
94
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
95
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
96
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
97
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
98
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
99
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
100
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
101
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
102
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
103
20040225101834 2 6 100 2047 2 F8F54DA4E1F232A9D05104B807DCBEA553C1E606FEB1CF149DEBB99243AAA7A354616FD95368EBCC1A58C8BCB87FB993F731400A413E07E35B1ADDD6484973E1734835FEFDC214DACA8C0844285A670D03BB3E1A5B5E14DC6F3B20EAAC8F18EB6C48AA5604F21EBEEA3C867F6CFA010858DFD589DCDEFBE8996A42F5BA00BEDFF6743F4D4E2808806965258C4E17D1B2BF371814696A2CC7C5C6548ED480AA7491A9DE16D2B12F15471B192295AA27F6D047EC2BA7547ED70674F52B4934D846712B1EA87E7FE12C5A210DEF5B3A14DBC8E712AA7192D877B4E6479F3CD69F82127E7352C19191B036A86BCF2D7D7CC687C25C5E4620295F10DCCE6BA5609CBB
104
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
105
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
106
20040225103355 2 6 100 2047 5 F8F54DA4E1F232A9D05104B807DCBEA553C1E606FEB1CF149DEBB99243AAA7A354616FD95368EBCC1A58C8BCB87FB993F731400A413E07E35B1ADDD6484973E1734835FEFDC214DACA8C0844285A670D03BB3E1A5B5E14DC6F3B20EAAC8F18EB6C48AA5604F21EBEEA3C867F6CFA010858DFD589DCDEFBE8996A42F5BA00BEDFF6743F4D4E2808806965258C4E17D1B2BF371814696A2CC7C5C6548ED480AA7491A9DE16D2B12F15471B192295AA27F6D047EC2BA7547ED70674F52B4934D846712B1EA87E7FE12C5A210DEF5B3A14DBC8E712AA7192D877B4E6479F3CD69F82127E7352C19191B036A86BCF2D7D7CC687C25C5E4620295F10DCCE6BA5B98D2F
107
20040225103756 2 6 100 2047 2 F8F54DA4E1F232A9D05104B807DCBEA553C1E606FEB1CF149DEBB99243AAA7A354616FD95368EBCC1A58C8BCB87FB993F731400A413E07E35B1ADDD6484973E1734835FEFDC214DACA8C0844285A670D03BB3E1A5B5E14DC6F3B20EAAC8F18EB6C48AA5604F21EBEEA3C867F6CFA010858DFD589DCDEFBE8996A42F5BA00BEDFF6743F4D4E2808806965258C4E17D1B2BF371814696A2CC7C5C6548ED480AA7491A9DE16D2B12F15471B192295AA27F6D047EC2BA7547ED70674F52B4934D846712B1EA87E7FE12C5A210DEF5B3A14DBC8E712AA7192D877B4E6479F3CD69F82127E7352C19191B036A86BCF2D7D7CC687C25C5E4620295F10DCCE6BA5CEBAFB
108
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
109
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
110
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
111
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
112
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
113
20040225111338 2 6 100 2047 2 F8F54DA4E1F232A9D05104B807DCBEA553C1E606FEB1CF149DEBB99243AAA7A354616FD95368EBCC1A58C8BCB87FB993F731400A413E07E35B1ADDD6484973E1734835FEFDC214DACA8C0844285A670D03BB3E1A5B5E14DC6F3B20EAAC8F18EB6C48AA5604F21EBEEA3C867F6CFA010858DFD589DCDEFBE8996A42F5BA00BEDFF6743F4D4E2808806965258C4E17D1B2BF371814696A2CC7C5C6548ED480AA7491A9DE16D2B12F15471B192295AA27F6D047EC2BA7547ED70674F52B4934D846712B1EA87E7FE12C5A210DEF5B3A14DBC8E712AA7192D877B4E6479F3CD69F82127E7352C19191B036A86BCF2D7D7CC687C25C5E4620295F10DCCE6BA69FE2FB
114
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
115
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
116
20040225143208 2 6 100 3071 2 EDDA2E6520E6A915FE821EA06B4E19C95EBA8092F521CDE778B7B6CCA0FD89E935C904E2FA83E37DD49C1C52120C0958B85AAEE0B1A0E36C89836CE6C5509D50ABA58C154289C129B4A12A9249589496A5381CEA2105D818DB8790C4913BAD3C4C5ADB6BE036BD44B8AFB9F607017277FA36C971E5F10D7D062354FAB31BA97B376D723451478D1BA7D2C213A2E377E6826FF2F0695A2EDF9F8107DE4FF78DD0C2EF3A715084592623C58D2B2775FC7C0CF8F745EA1C75BEA8E574B9747207357DE143B0A803829E418B8F4BB44C40481CBB086B8AC6B93CC0E989E1336A010529F5D0FC4E077F778672646C62B7371965D60822C871F97C03913DB5CE080F67A348DD1722DD7BFA0761B2BF16A925FB9FCB6DCD1BC959A8794ACAEA984E1E9AE7BB2276B9C866CC890D8A8C51A17C479DA689DAA065C019CF9B082ED67D9CF1C9753E2A4030CCC27BE34280F042384597CEA223D5FA6631E109D5A23C60312F1D4783C3403D67A0D67665F7C5BEABF0BC30514DB07D7EF2A8E07CDD8968A91B
117
20040225144922 2 6 100 3071 2 EDDA2E6520E6A915FE821EA06B4E19C95EBA8092F521CDE778B7B6CCA0FD89E935C904E2FA83E37DD49C1C52120C0958B85AAEE0B1A0E36C89836CE6C5509D50ABA58C154289C129B4A12A9249589496A5381CEA2105D818DB8790C4913BAD3C4C5ADB6BE036BD44B8AFB9F607017277FA36C971E5F10D7D062354FAB31BA97B376D723451478D1BA7D2C213A2E377E6826FF2F0695A2EDF9F8107DE4FF78DD0C2EF3A715084592623C58D2B2775FC7C0CF8F745EA1C75BEA8E574B9747207357DE143B0A803829E418B8F4BB44C40481CBB086B8AC6B93CC0E989E1336A010529F5D0FC4E077F778672646C62B7371965D60822C871F97C03913DB5CE080F67A348DD1722DD7BFA0761B2BF16A925FB9FCB6DCD1BC959A8794ACAEA984E1E9AE7BB2276B9C866CC890D8A8C51A17C479DA689DAA065C019CF9B082ED67D9CF1C9753E2A4030CCC27BE34280F042384597CEA223D5FA6631E109D5A23C60312F1D4783C3403D67A0D67665F7C5BEABF0BC30514DB07D7EF2A8E07CDD8987DF6B
118
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
119
20040225161716 2 6 100 3071 5 EDDA2E6520E6A915FE821EA06B4E19C95EBA8092F521CDE778B7B6CCA0FD89E935C904E2FA83E37DD49C1C52120C0958B85AAEE0B1A0E36C89836CE6C5509D50ABA58C154289C129B4A12A9249589496A5381CEA2105D818DB8790C4913BAD3C4C5ADB6BE036BD44B8AFB9F607017277FA36C971E5F10D7D062354FAB31BA97B376D723451478D1BA7D2C213A2E377E6826FF2F0695A2EDF9F8107DE4FF78DD0C2EF3A715084592623C58D2B2775FC7C0CF8F745EA1C75BEA8E574B9747207357DE143B0A803829E418B8F4BB44C40481CBB086B8AC6B93CC0E989E1336A010529F5D0FC4E077F778672646C62B7371965D60822C871F97C03913DB5CE080F67A348DD1722DD7BFA0761B2BF16A925FB9FCB6DCD1BC959A8794ACAEA984E1E9AE7BB2276B9C866CC890D8A8C51A17C479DA689DAA065C019CF9B082ED67D9CF1C9753E2A4030CCC27BE34280F042384597CEA223D5FA6631E109D5A23C60312F1D4783C3403D67A0D67665F7C5BEABF0BC30514DB07D7EF2A8E07CDD8A3A91CF
120
20040225163012 2 6 100 3071 2 EDDA2E6520E6A915FE821EA06B4E19C95EBA8092F521CDE778B7B6CCA0FD89E935C904E2FA83E37DD49C1C52120C0958B85AAEE0B1A0E36C89836CE6C5509D50ABA58C154289C129B4A12A9249589496A5381CEA2105D818DB8790C4913BAD3C4C5ADB6BE036BD44B8AFB9F607017277FA36C971E5F10D7D062354FAB31BA97B376D723451478D1BA7D2C213A2E377E6826FF2F0695A2EDF9F8107DE4FF78DD0C2EF3A715084592623C58D2B2775FC7C0CF8F745EA1C75BEA8E574B9747207357DE143B0A803829E418B8F4BB44C40481CBB086B8AC6B93CC0E989E1336A010529F5D0FC4E077F778672646C62B7371965D60822C871F97C03913DB5CE080F67A348DD1722DD7BFA0761B2BF16A925FB9FCB6DCD1BC959A8794ACAEA984E1E9AE7BB2276B9C866CC890D8A8C51A17C479DA689DAA065C019CF9B082ED67D9CF1C9753E2A4030CCC27BE34280F042384597CEA223D5FA6631E109D5A23C60312F1D4783C3403D67A0D67665F7C5BEABF0BC30514DB07D7EF2A8E07CDD8A4CED2B
121
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
122
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
123
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
124
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
125
20040225203219 2 6 100 3071 5 EDDA2E6520E6A915FE821EA06B4E19C95EBA8092F521CDE778B7B6CCA0FD89E935C904E2FA83E37DD49C1C52120C0958B85AAEE0B1A0E36C89836CE6C5509D50ABA58C154289C129B4A12A9249589496A5381CEA2105D818DB8790C4913BAD3C4C5ADB6BE036BD44B8AFB9F607017277FA36C971E5F10D7D062354FAB31BA97B376D723451478D1BA7D2C213A2E377E6826FF2F0695A2EDF9F8107DE4FF78DD0C2EF3A715084592623C58D2B2775FC7C0CF8F745EA1C75BEA8E574B9747207357DE143B0A803829E418B8F4BB44C40481CBB086B8AC6B93CC0E989E1336A010529F5D0FC4E077F778672646C62B7371965D60822C871F97C03913DB5CE080F67A348DD1722DD7BFA0761B2BF16A925FB9FCB6DCD1BC959A8794ACAEA984E1E9AE7BB2276B9C866CC890D8A8C51A17C479DA689DAA065C019CF9B082ED67D9CF1C9753E2A4030CCC27BE34280F042384597CEA223D5FA6631E109D5A23C60312F1D4783C3403D67A0D67665F7C5BEABF0BC30514DB07D7EF2A8E07CDD8C40B747
126
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
127
20040225210230 2 6 100 3071 2 EDDA2E6520E6A915FE821EA06B4E19C95EBA8092F521CDE778B7B6CCA0FD89E935C904E2FA83E37DD49C1C52120C0958B85AAEE0B1A0E36C89836CE6C5509D50ABA58C154289C129B4A12A9249589496A5381CEA2105D818DB8790C4913BAD3C4C5ADB6BE036BD44B8AFB9F607017277FA36C971E5F10D7D062354FAB31BA97B376D723451478D1BA7D2C213A2E377E6826FF2F0695A2EDF9F8107DE4FF78DD0C2EF3A715084592623C58D2B2775FC7C0CF8F745EA1C75BEA8E574B9747207357DE143B0A803829E418B8F4BB44C40481CBB086B8AC6B93CC0E989E1336A010529F5D0FC4E077F778672646C62B7371965D60822C871F97C03913DB5CE080F67A348DD1722DD7BFA0761B2BF16A925FB9FCB6DCD1BC959A8794ACAEA984E1E9AE7BB2276B9C866CC890D8A8C51A17C479DA689DAA065C019CF9B082ED67D9CF1C9753E2A4030CCC27BE34280F042384597CEA223D5FA6631E109D5A23C60312F1D4783C3403D67A0D67665F7C5BEABF0BC30514DB07D7EF2A8E07CDD8C72586B
128
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
129
20040225214624 2 6 100 3071 2 EDDA2E6520E6A915FE821EA06B4E19C95EBA8092F521CDE778B7B6CCA0FD89E935C904E2FA83E37DD49C1C52120C0958B85AAEE0B1A0E36C89836CE6C5509D50ABA58C154289C129B4A12A9249589496A5381CEA2105D818DB8790C4913BAD3C4C5ADB6BE036BD44B8AFB9F607017277FA36C971E5F10D7D062354FAB31BA97B376D723451478D1BA7D2C213A2E377E6826FF2F0695A2EDF9F8107DE4FF78DD0C2EF3A715084592623C58D2B2775FC7C0CF8F745EA1C75BEA8E574B9747207357DE143B0A803829E418B8F4BB44C40481CBB086B8AC6B93CC0E989E1336A010529F5D0FC4E077F778672646C62B7371965D60822C871F97C03913DB5CE080F67A348DD1722DD7BFA0761B2BF16A925FB9FCB6DCD1BC959A8794ACAEA984E1E9AE7BB2276B9C866CC890D8A8C51A17C479DA689DAA065C019CF9B082ED67D9CF1C9753E2A4030CCC27BE34280F042384597CEA223D5FA6631E109D5A23C60312F1D4783C3403D67A0D67665F7C5BEABF0BC30514DB07D7EF2A8E07CDD8CC34833
130
20040225223007 2 6 100 3071 2 EDDA2E6520E6A915FE821EA06B4E19C95EBA8092F521CDE778B7B6CCA0FD89E935C904E2FA83E37DD49C1C52120C0958B85AAEE0B1A0E36C89836CE6C5509D50ABA58C154289C129B4A12A9249589496A5381CEA2105D818DB8790C4913BAD3C4C5ADB6BE036BD44B8AFB9F607017277FA36C971E5F10D7D062354FAB31BA97B376D723451478D1BA7D2C213A2E377E6826FF2F0695A2EDF9F8107DE4FF78DD0C2EF3A715084592623C58D2B2775FC7C0CF8F745EA1C75BEA8E574B9747207357DE143B0A803829E418B8F4BB44C40481CBB086B8AC6B93CC0E989E1336A010529F5D0FC4E077F778672646C62B7371965D60822C871F97C03913DB5CE080F67A348DD1722DD7BFA0761B2BF16A925FB9FCB6DCD1BC959A8794ACAEA984E1E9AE7BB2276B9C866CC890D8A8C51A17C479DA689DAA065C019CF9B082ED67D9CF1C9753E2A4030CCC27BE34280F042384597CEA223D5FA6631E109D5A23C60312F1D4783C3403D67A0D67665F7C5BEABF0BC30514DB07D7EF2A8E07CDD8D1B23AB
131
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
132
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
133
20040226004101 2 6 100 3071 2 EDDA2E6520E6A915FE821EA06B4E19C95EBA8092F521CDE778B7B6CCA0FD89E935C904E2FA83E37DD49C1C52120C0958B85AAEE0B1A0E36C89836CE6C5509D50ABA58C154289C129B4A12A9249589496A5381CEA2105D818DB8790C4913BAD3C4C5ADB6BE036BD44B8AFB9F607017277FA36C971E5F10D7D062354FAB31BA97B376D723451478D1BA7D2C213A2E377E6826FF2F0695A2EDF9F8107DE4FF78DD0C2EF3A715084592623C58D2B2775FC7C0CF8F745EA1C75BEA8E574B9747207357DE143B0A803829E418B8F4BB44C40481CBB086B8AC6B93CC0E989E1336A010529F5D0FC4E077F778672646C62B7371965D60822C871F97C03913DB5CE080F67A348DD1722DD7BFA0761B2BF16A925FB9FCB6DCD1BC959A8794ACAEA984E1E9AE7BB2276B9C866CC890D8A8C51A17C479DA689DAA065C019CF9B082ED67D9CF1C9753E2A4030CCC27BE34280F042384597CEA223D5FA6631E109D5A23C60312F1D4783C3403D67A0D67665F7C5BEABF0BC30514DB07D7EF2A8E07CDD8E24518B
134
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
135
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
136
20040226022931 2 6 100 3071 2 EDDA2E6520E6A915FE821EA06B4E19C95EBA8092F521CDE778B7B6CCA0FD89E935C904E2FA83E37DD49C1C52120C0958B85AAEE0B1A0E36C89836CE6C5509D50ABA58C154289C129B4A12A9249589496A5381CEA2105D818DB8790C4913BAD3C4C5ADB6BE036BD44B8AFB9F607017277FA36C971E5F10D7D062354FAB31BA97B376D723451478D1BA7D2C213A2E377E6826FF2F0695A2EDF9F8107DE4FF78DD0C2EF3A715084592623C58D2B2775FC7C0CF8F745EA1C75BEA8E574B9747207357DE143B0A803829E418B8F4BB44C40481CBB086B8AC6B93CC0E989E1336A010529F5D0FC4E077F778672646C62B7371965D60822C871F97C03913DB5CE080F67A348DD1722DD7BFA0761B2BF16A925FB9FCB6DCD1BC959A8794ACAEA984E1E9AE7BB2276B9C866CC890D8A8C51A17C479DA689DAA065C019CF9B082ED67D9CF1C9753E2A4030CCC27BE34280F042384597CEA223D5FA6631E109D5A23C60312F1D4783C3403D67A0D67665F7C5BEABF0BC30514DB07D7EF2A8E07CDD8EFD1773
137
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
138
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
139
20040226054156 2 6 100 3071 2 EDDA2E6520E6A915FE821EA06B4E19C95EBA8092F521CDE778B7B6CCA0FD89E935C904E2FA83E37DD49C1C52120C0958B85AAEE0B1A0E36C89836CE6C5509D50ABA58C154289C129B4A12A9249589496A5381CEA2105D818DB8790C4913BAD3C4C5ADB6BE036BD44B8AFB9F607017277FA36C971E5F10D7D062354FAB31BA97B376D723451478D1BA7D2C213A2E377E6826FF2F0695A2EDF9F8107DE4FF78DD0C2EF3A715084592623C58D2B2775FC7C0CF8F745EA1C75BEA8E574B9747207357DE143B0A803829E418B8F4BB44C40481CBB086B8AC6B93CC0E989E1336A010529F5D0FC4E077F778672646C62B7371965D60822C871F97C03913DB5CE080F67A348DD1722DD7BFA0761B2BF16A925FB9FCB6DCD1BC959A8794ACAEA984E1E9AE7BB2276B9C866CC890D8A8C51A17C479DA689DAA065C019CF9B082ED67D9CF1C9753E2A4030CCC27BE34280F042384597CEA223D5FA6631E109D5A23C60312F1D4783C3403D67A0D67665F7C5BEABF0BC30514DB07D7EF2A8E07CDD908AC36B
140
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
141
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
142
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
143
20040226112913 2 6 100 3071 2 EDDA2E6520E6A915FE821EA06B4E19C95EBA8092F521CDE778B7B6CCA0FD89E935C904E2FA83E37DD49C1C52120C0958B85AAEE0B1A0E36C89836CE6C5509D50ABA58C154289C129B4A12A9249589496A5381CEA2105D818DB8790C4913BAD3C4C5ADB6BE036BD44B8AFB9F607017277FA36C971E5F10D7D062354FAB31BA97B376D723451478D1BA7D2C213A2E377E6826FF2F0695A2EDF9F8107DE4FF78DD0C2EF3A715084592623C58D2B2775FC7C0CF8F745EA1C75BEA8E574B9747207357DE143B0A803829E418B8F4BB44C40481CBB086B8AC6B93CC0E989E1336A010529F5D0FC4E077F778672646C62B7371965D60822C871F97C03913DB5CE080F67A348DD1722DD7BFA0761B2BF16A925FB9FCB6DCD1BC959A8794ACAEA984E1E9AE7BB2276B9C866CC890D8A8C51A17C479DA689DAA065C019CF9B082ED67D9CF1C9753E2A4030CCC27BE34280F042384597CEA223D5FA6631E109D5A23C60312F1D4783C3403D67A0D67665F7C5BEABF0BC30514DB07D7EF2A8E07CDD93696533
144
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
145
20040226135326 2 6 100 3071 5 EDDA2E6520E6A915FE821EA06B4E19C95EBA8092F521CDE778B7B6CCA0FD89E935C904E2FA83E37DD49C1C52120C0958B85AAEE0B1A0E36C89836CE6C5509D50ABA58C154289C129B4A12A9249589496A5381CEA2105D818DB8790C4913BAD3C4C5ADB6BE036BD44B8AFB9F607017277FA36C971E5F10D7D062354FAB31BA97B376D723451478D1BA7D2C213A2E377E6826FF2F0695A2EDF9F8107DE4FF78DD0C2EF3A715084592623C58D2B2775FC7C0CF8F745EA1C75BEA8E574B9747207357DE143B0A803829E418B8F4BB44C40481CBB086B8AC6B93CC0E989E1336A010529F5D0FC4E077F778672646C62B7371965D60822C871F97C03913DB5CE080F67A348DD1722DD7BFA0761B2BF16A925FB9FCB6DCD1BC959A8794ACAEA984E1E9AE7BB2276B9C866CC890D8A8C51A17C479DA689DAA065C019CF9B082ED67D9CF1C9753E2A4030CCC27BE34280F042384597CEA223D5FA6631E109D5A23C60312F1D4783C3403D67A0D67665F7C5BEABF0BC30514DB07D7EF2A8E07CDD949596D7
146
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
147
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
148
20040226164905 2 6 100 3071 2 EDDA2E6520E6A915FE821EA06B4E19C95EBA8092F521CDE778B7B6CCA0FD89E935C904E2FA83E37DD49C1C52120C0958B85AAEE0B1A0E36C89836CE6C5509D50ABA58C154289C129B4A12A9249589496A5381CEA2105D818DB8790C4913BAD3C4C5ADB6BE036BD44B8AFB9F607017277FA36C971E5F10D7D062354FAB31BA97B376D723451478D1BA7D2C213A2E377E6826FF2F0695A2EDF9F8107DE4FF78DD0C2EF3A715084592623C58D2B2775FC7C0CF8F745EA1C75BEA8E574B9747207357DE143B0A803829E418B8F4BB44C40481CBB086B8AC6B93CC0E989E1336A010529F5D0FC4E077F778672646C62B7371965D60822C871F97C03913DB5CE080F67A348DD1722DD7BFA0761B2BF16A925FB9FCB6DCD1BC959A8794ACAEA984E1E9AE7BB2276B9C866CC890D8A8C51A17C479DA689DAA065C019CF9B082ED67D9CF1C9753E2A4030CCC27BE34280F042384597CEA223D5FA6631E109D5A23C60312F1D4783C3403D67A0D67665F7C5BEABF0BC30514DB07D7EF2A8E07CDD95FACE7B
149
20040226171921 2 6 100 3071 2 EDDA2E6520E6A915FE821EA06B4E19C95EBA8092F521CDE778B7B6CCA0FD89E935C904E2FA83E37DD49C1C52120C0958B85AAEE0B1A0E36C89836CE6C5509D50ABA58C154289C129B4A12A9249589496A5381CEA2105D818DB8790C4913BAD3C4C5ADB6BE036BD44B8AFB9F607017277FA36C971E5F10D7D062354FAB31BA97B376D723451478D1BA7D2C213A2E377E6826FF2F0695A2EDF9F8107DE4FF78DD0C2EF3A715084592623C58D2B2775FC7C0CF8F745EA1C75BEA8E574B9747207357DE143B0A803829E418B8F4BB44C40481CBB086B8AC6B93CC0E989E1336A010529F5D0FC4E077F778672646C62B7371965D60822C871F97C03913DB5CE080F67A348DD1722DD7BFA0761B2BF16A925FB9FCB6DCD1BC959A8794ACAEA984E1E9AE7BB2276B9C866CC890D8A8C51A17C479DA689DAA065C019CF9B082ED67D9CF1C9753E2A4030CCC27BE34280F042384597CEA223D5FA6631E109D5A23C60312F1D4783C3403D67A0D67665F7C5BEABF0BC30514DB07D7EF2A8E07CDD9633F443
150
20040226182347 2 6 100 3071 5 EDDA2E6520E6A915FE821EA06B4E19C95EBA8092F521CDE778B7B6CCA0FD89E935C904E2FA83E37DD49C1C52120C0958B85AAEE0B1A0E36C89836CE6C5509D50ABA58C154289C129B4A12A9249589496A5381CEA2105D818DB8790C4913BAD3C4C5ADB6BE036BD44B8AFB9F607017277FA36C971E5F10D7D062354FAB31BA97B376D723451478D1BA7D2C213A2E377E6826FF2F0695A2EDF9F8107DE4FF78DD0C2EF3A715084592623C58D2B2775FC7C0CF8F745EA1C75BEA8E574B9747207357DE143B0A803829E418B8F4BB44C40481CBB086B8AC6B93CC0E989E1336A010529F5D0FC4E077F778672646C62B7371965D60822C871F97C03913DB5CE080F67A348DD1722DD7BFA0761B2BF16A925FB9FCB6DCD1BC959A8794ACAEA984E1E9AE7BB2276B9C866CC890D8A8C51A17C479DA689DAA065C019CF9B082ED67D9CF1C9753E2A4030CCC27BE34280F042384597CEA223D5FA6631E109D5A23C60312F1D4783C3403D67A0D67665F7C5BEABF0BC30514DB07D7EF2A8E07CDD96BAC3A7
151
20040226200555 2 6 100 3071 2 EDDA2E6520E6A915FE821EA06B4E19C95EBA8092F521CDE778B7B6CCA0FD89E935C904E2FA83E37DD49C1C52120C0958B85AAEE0B1A0E36C89836CE6C5509D50ABA58C154289C129B4A12A9249589496A5381CEA2105D818DB8790C4913BAD3C4C5ADB6BE036BD44B8AFB9F607017277FA36C971E5F10D7D062354FAB31BA97B376D723451478D1BA7D2C213A2E377E6826FF2F0695A2EDF9F8107DE4FF78DD0C2EF3A715084592623C58D2B2775FC7C0CF8F745EA1C75BEA8E574B9747207357DE143B0A803829E418B8F4BB44C40481CBB086B8AC6B93CC0E989E1336A010529F5D0FC4E077F778672646C62B7371965D60822C871F97C03913DB5CE080F67A348DD1722DD7BFA0761B2BF16A925FB9FCB6DCD1BC959A8794ACAEA984E1E9AE7BB2276B9C866CC890D8A8C51A17C479DA689DAA065C019CF9B082ED67D9CF1C9753E2A4030CCC27BE34280F042384597CEA223D5FA6631E109D5A23C60312F1D4783C3403D67A0D67665F7C5BEABF0BC30514DB07D7EF2A8E07CDD97972EFB
152
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
153
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
154
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
155
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
156
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
157
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
158
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
159
20040227160657 2 6 100 4095 5 C7FE661FF2675517258B6E893FE81DFC29EDFB28FFE325C4F929BFAF5D0203DF5D75D966B0886A4197CC8F2EE339349DF88E73C54A315C402DF609DA61A237435167524F8EA37E5AB33E8A0C80E36DF4F6B9D6141958CC784CDDB6E2543038C9966D62AC2474786F2E2890E4935AD47BB005A6FC309817807EC9597B69858F1FBD6A1B28E897EFB6219F9FF83BEAFFD448C9F2F8C33CEA7C08242428FD75D218411E41523B688BF3D9311374E43D8963C821611BBBC91CA23968E60FB143FA0B36120657734D5C83C1C58A5A229CCDDC27875E51C358F0C8FEDDE4A11C50E0A154C80127B6FF92F496F7F2FA41D601A3EA88A3A53569AA3F3ABA5761757AC553CF57578800379C5F06082DD6088841D7BA48A58D1422B0DEC088279655C2D6380CF7097CD39565E9998785CBEB300AFFADEACA285201CBB27F48456EF7E49DE75380D0D1B4CCC28ADB8E12903473548D74A8847DAADC34315F157351C4CD507FF9B03CA6DD1C954BB75C9FD3C425FEFA76FC03FB346BE11E61B67A3AD374C1843ECA636CC7454249AB2A08B645DADCBFB48A470B1206ED20020FF0A0F5C2253187BBC2BC7F449AD58D35746E5A47B4A7BB404592C0A1F4E3BA34938C1E3C32464E1A52D3E722FA1165B72E8B438C11CFD0DB42A4081ED09F468A2E17C8D3F2BB689DC0CC831F889D7BAFC39D2A7F6C9A362E9BAE48B12FBACF34F9DFC7295F4F
160
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
161
20040227225950 2 6 100 4095 2 C7FE661FF2675517258B6E893FE81DFC29EDFB28FFE325C4F929BFAF5D0203DF5D75D966B0886A4197CC8F2EE339349DF88E73C54A315C402DF609DA61A237435167524F8EA37E5AB33E8A0C80E36DF4F6B9D6141958CC784CDDB6E2543038C9966D62AC2474786F2E2890E4935AD47BB005A6FC309817807EC9597B69858F1FBD6A1B28E897EFB6219F9FF83BEAFFD448C9F2F8C33CEA7C08242428FD75D218411E41523B688BF3D9311374E43D8963C821611BBBC91CA23968E60FB143FA0B36120657734D5C83C1C58A5A229CCDDC27875E51C358F0C8FEDDE4A11C50E0A154C80127B6FF92F496F7F2FA41D601A3EA88A3A53569AA3F3ABA5761757AC553CF57578800379C5F06082DD6088841D7BA48A58D1422B0DEC088279655C2D6380CF7097CD39565E9998785CBEB300AFFADEACA285201CBB27F48456EF7E49DE75380D0D1B4CCC28ADB8E12903473548D74A8847DAADC34315F157351C4CD507FF9B03CA6DD1C954BB75C9FD3C425FEFA76FC03FB346BE11E61B67A3AD374C1843ECA636CC7454249AB2A08B645DADCBFB48A470B1206ED20020FF0A0F5C2253187BBC2BC7F449AD58D35746E5A47B4A7BB404592C0A1F4E3BA34938C1E3C32464E1A52D3E722FA1165B72E8B438C11CFD0DB42A4081ED09F468A2E17C8D3F2BB689DC0CC831F889D7BAFC39D2A7F6C9A362E9BAE48B12FBACF34F9DFC8E6D5E3
162
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
163
20040228032633 2 6 100 4095 5 C7FE661FF2675517258B6E893FE81DFC29EDFB28FFE325C4F929BFAF5D0203DF5D75D966B0886A4197CC8F2EE339349DF88E73C54A315C402DF609DA61A237435167524F8EA37E5AB33E8A0C80E36DF4F6B9D6141958CC784CDDB6E2543038C9966D62AC2474786F2E2890E4935AD47BB005A6FC309817807EC9597B69858F1FBD6A1B28E897EFB6219F9FF83BEAFFD448C9F2F8C33CEA7C08242428FD75D218411E41523B688BF3D9311374E43D8963C821611BBBC91CA23968E60FB143FA0B36120657734D5C83C1C58A5A229CCDDC27875E51C358F0C8FEDDE4A11C50E0A154C80127B6FF92F496F7F2FA41D601A3EA88A3A53569AA3F3ABA5761757AC553CF57578800379C5F06082DD6088841D7BA48A58D1422B0DEC088279655C2D6380CF7097CD39565E9998785CBEB300AFFADEACA285201CBB27F48456EF7E49DE75380D0D1B4CCC28ADB8E12903473548D74A8847DAADC34315F157351C4CD507FF9B03CA6DD1C954BB75C9FD3C425FEFA76FC03FB346BE11E61B67A3AD374C1843ECA636CC7454249AB2A08B645DADCBFB48A470B1206ED20020FF0A0F5C2253187BBC2BC7F449AD58D35746E5A47B4A7BB404592C0A1F4E3BA34938C1E3C32464E1A52D3E722FA1165B72E8B438C11CFD0DB42A4081ED09F468A2E17C8D3F2BB689DC0CC831F889D7BAFC39D2A7F6C9A362E9BAE48B12FBACF34F9DFCA006227
164
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
165
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
166
20040228192850 2 6 100 4095 2 C7FE661FF2675517258B6E893FE81DFC29EDFB28FFE325C4F929BFAF5D0203DF5D75D966B0886A4197CC8F2EE339349DF88E73C54A315C402DF609DA61A237435167524F8EA37E5AB33E8A0C80E36DF4F6B9D6141958CC784CDDB6E2543038C9966D62AC2474786F2E2890E4935AD47BB005A6FC309817807EC9597B69858F1FBD6A1B28E897EFB6219F9FF83BEAFFD448C9F2F8C33CEA7C08242428FD75D218411E41523B688BF3D9311374E43D8963C821611BBBC91CA23968E60FB143FA0B36120657734D5C83C1C58A5A229CCDDC27875E51C358F0C8FEDDE4A11C50E0A154C80127B6FF92F496F7F2FA41D601A3EA88A3A53569AA3F3ABA5761757AC553CF57578800379C5F06082DD6088841D7BA48A58D1422B0DEC088279655C2D6380CF7097CD39565E9998785CBEB300AFFADEACA285201CBB27F48456EF7E49DE75380D0D1B4CCC28ADB8E12903473548D74A8847DAADC34315F157351C4CD507FF9B03CA6DD1C954BB75C9FD3C425FEFA76FC03FB346BE11E61B67A3AD374C1843ECA636CC7454249AB2A08B645DADCBFB48A470B1206ED20020FF0A0F5C2253187BBC2BC7F449AD58D35746E5A47B4A7BB404592C0A1F4E3BA34938C1E3C32464E1A52D3E722FA1165B72E8B438C11CFD0DB42A4081ED09F468A2E17C8D3F2BB689DC0CC831F889D7BAFC39D2A7F6C9A362E9BAE48B12FBACF34F9DFCE191D13
167
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
168
20040229164933 2 6 100 4095 5 C7FE661FF2675517258B6E893FE81DFC29EDFB28FFE325C4F929BFAF5D0203DF5D75D966B0886A4197CC8F2EE339349DF88E73C54A315C402DF609DA61A237435167524F8EA37E5AB33E8A0C80E36DF4F6B9D6141958CC784CDDB6E2543038C9966D62AC2474786F2E2890E4935AD47BB005A6FC309817807EC9597B69858F1FBD6A1B28E897EFB6219F9FF83BEAFFD448C9F2F8C33CEA7C08242428FD75D218411E41523B688BF3D9311374E43D8963C821611BBBC91CA23968E60FB143FA0B36120657734D5C83C1C58A5A229CCDDC27875E51C358F0C8FEDDE4A11C50E0A154C80127B6FF92F496F7F2FA41D601A3EA88A3A53569AA3F3ABA5761757AC553CF57578800379C5F06082DD6088841D7BA48A58D1422B0DEC088279655C2D6380CF7097CD39565E9998785CBEB300AFFADEACA285201CBB27F48456EF7E49DE75380D0D1B4CCC28ADB8E12903473548D74A8847DAADC34315F157351C4CD507FF9B03CA6DD1C954BB75C9FD3C425FEFA76FC03FB346BE11E61B67A3AD374C1843ECA636CC7454249AB2A08B645DADCBFB48A470B1206ED20020FF0A0F5C2253187BBC2BC7F449AD58D35746E5A47B4A7BB404592C0A1F4E3BA34938C1E3C32464E1A52D3E722FA1165B72E8B438C11CFD0DB42A4081ED09F468A2E17C8D3F2BB689DC0CC831F889D7BAFC39D2A7F6C9A362E9BAE48B12FBACF34F9DFD3887E07
169
20040229210220 2 6 100 4095 5 C7FE661FF2675517258B6E893FE81DFC29EDFB28FFE325C4F929BFAF5D0203DF5D75D966B0886A4197CC8F2EE339349DF88E73C54A315C402DF609DA61A237435167524F8EA37E5AB33E8A0C80E36DF4F6B9D6141958CC784CDDB6E2543038C9966D62AC2474786F2E2890E4935AD47BB005A6FC309817807EC9597B69858F1FBD6A1B28E897EFB6219F9FF83BEAFFD448C9F2F8C33CEA7C08242428FD75D218411E41523B688BF3D9311374E43D8963C821611BBBC91CA23968E60FB143FA0B36120657734D5C83C1C58A5A229CCDDC27875E51C358F0C8FEDDE4A11C50E0A154C80127B6FF92F496F7F2FA41D601A3EA88A3A53569AA3F3ABA5761757AC553CF57578800379C5F06082DD6088841D7BA48A58D1422B0DEC088279655C2D6380CF7097CD39565E9998785CBEB300AFFADEACA285201CBB27F48456EF7E49DE75380D0D1B4CCC28ADB8E12903473548D74A8847DAADC34315F157351C4CD507FF9B03CA6DD1C954BB75C9FD3C425FEFA76FC03FB346BE11E61B67A3AD374C1843ECA636CC7454249AB2A08B645DADCBFB48A470B1206ED20020FF0A0F5C2253187BBC2BC7F449AD58D35746E5A47B4A7BB404592C0A1F4E3BA34938C1E3C32464E1A52D3E722FA1165B72E8B438C11CFD0DB42A4081ED09F468A2E17C8D3F2BB689DC0CC831F889D7BAFC39D2A7F6C9A362E9BAE48B12FBACF34F9DFD49457B7
170
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
171
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
172
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
173
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
174
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
175
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
176
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
177
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
178
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
179
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
180
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
181
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
182
20040302142004 2 6 100 4095 2 C7FE661FF2675517258B6E893FE81DFC29EDFB28FFE325C4F929BFAF5D0203DF5D75D966B0886A4197CC8F2EE339349DF88E73C54A315C402DF609DA61A237435167524F8EA37E5AB33E8A0C80E36DF4F6B9D6141958CC784CDDB6E2543038C9966D62AC2474786F2E2890E4935AD47BB005A6FC309817807EC9597B69858F1FBD6A1B28E897EFB6219F9FF83BEAFFD448C9F2F8C33CEA7C08242428FD75D218411E41523B688BF3D9311374E43D8963C821611BBBC91CA23968E60FB143FA0B36120657734D5C83C1C58A5A229CCDDC27875E51C358F0C8FEDDE4A11C50E0A154C80127B6FF92F496F7F2FA41D601A3EA88A3A53569AA3F3ABA5761757AC553CF57578800379C5F06082DD6088841D7BA48A58D1422B0DEC088279655C2D6380CF7097CD39565E9998785CBEB300AFFADEACA285201CBB27F48456EF7E49DE75380D0D1B4CCC28ADB8E12903473548D74A8847DAADC34315F157351C4CD507FF9B03CA6DD1C954BB75C9FD3C425FEFA76FC03FB346BE11E61B67A3AD374C1843ECA636CC7454249AB2A08B645DADCBFB48A470B1206ED20020FF0A0F5C2253187BBC2BC7F449AD58D35746E5A47B4A7BB404592C0A1F4E3BA34938C1E3C32464E1A52D3E722FA1165B72E8B438C11CFD0DB42A4081ED09F468A2E17C8D3F2BB689DC0CC831F889D7BAFC39D2A7F6C9A362E9BAE48B12FBACF34F9DFDEA4AA9B
183
20040302145603 2 6 100 4095 2 C7FE661FF2675517258B6E893FE81DFC29EDFB28FFE325C4F929BFAF5D0203DF5D75D966B0886A4197CC8F2EE339349DF88E73C54A315C402DF609DA61A237435167524F8EA37E5AB33E8A0C80E36DF4F6B9D6141958CC784CDDB6E2543038C9966D62AC2474786F2E2890E4935AD47BB005A6FC309817807EC9597B69858F1FBD6A1B28E897EFB6219F9FF83BEAFFD448C9F2F8C33CEA7C08242428FD75D218411E41523B688BF3D9311374E43D8963C821611BBBC91CA23968E60FB143FA0B36120657734D5C83C1C58A5A229CCDDC27875E51C358F0C8FEDDE4A11C50E0A154C80127B6FF92F496F7F2FA41D601A3EA88A3A53569AA3F3ABA5761757AC553CF57578800379C5F06082DD6088841D7BA48A58D1422B0DEC088279655C2D6380CF7097CD39565E9998785CBEB300AFFADEACA285201CBB27F48456EF7E49DE75380D0D1B4CCC28ADB8E12903473548D74A8847DAADC34315F157351C4CD507FF9B03CA6DD1C954BB75C9FD3C425FEFA76FC03FB346BE11E61B67A3AD374C1843ECA636CC7454249AB2A08B645DADCBFB48A470B1206ED20020FF0A0F5C2253187BBC2BC7F449AD58D35746E5A47B4A7BB404592C0A1F4E3BA34938C1E3C32464E1A52D3E722FA1165B72E8B438C11CFD0DB42A4081ED09F468A2E17C8D3F2BB689DC0CC831F889D7BAFC39D2A7F6C9A362E9BAE48B12FBACF34F9DFDEC2C32B
184
20040302212946 2 6 100 4095 5 C7FE661FF2675517258B6E893FE81DFC29EDFB28FFE325C4F929BFAF5D0203DF5D75D966B0886A4197CC8F2EE339349DF88E73C54A315C402DF609DA61A237435167524F8EA37E5AB33E8A0C80E36DF4F6B9D6141958CC784CDDB6E2543038C9966D62AC2474786F2E2890E4935AD47BB005A6FC309817807EC9597B69858F1FBD6A1B28E897EFB6219F9FF83BEAFFD448C9F2F8C33CEA7C08242428FD75D218411E41523B688BF3D9311374E43D8963C821611BBBC91CA23968E60FB143FA0B36120657734D5C83C1C58A5A229CCDDC27875E51C358F0C8FEDDE4A11C50E0A154C80127B6FF92F496F7F2FA41D601A3EA88A3A53569AA3F3ABA5761757AC553CF57578800379C5F06082DD6088841D7BA48A58D1422B0DEC088279655C2D6380CF7097CD39565E9998785CBEB300AFFADEACA285201CBB27F48456EF7E49DE75380D0D1B4CCC28ADB8E12903473548D74A8847DAADC34315F157351C4CD507FF9B03CA6DD1C954BB75C9FD3C425FEFA76FC03FB346BE11E61B67A3AD374C1843ECA636CC7454249AB2A08B645DADCBFB48A470B1206ED20020FF0A0F5C2253187BBC2BC7F449AD58D35746E5A47B4A7BB404592C0A1F4E3BA34938C1E3C32464E1A52D3E722FA1165B72E8B438C11CFD0DB42A4081ED09F468A2E17C8D3F2BB689DC0CC831F889D7BAFC39D2A7F6C9A362E9BAE48B12FBACF34F9DFE0652EC7
185
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
186
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
187
20040305011518 2 6 100 6143 2 E95A4131F86234D27EE1E51791599559EEDB618912E4FE36B81B80CDA4D497959DBFAEE929317A66BE64A328BAB6183EA5A5CBB3581490B4B613B225ADD00EFD38540356E0F4716229CDDB260283AF044FDAF1EF9248BB0CE9031C117CF15D3259B3E7B0301CA1AAC91AFA7A57CCDEED2DA4EFC2DBC7A9FC53BB4D3CB2D57D209D5DDEF25DE14F8226404296BD504EC14F6340F0AA2A1A943B9552C4B91D3EB48C08A13671C36EE5042857625DD2CB58965C0975EB775057FF82BC2B8B69D0BF26E2F80115B3E1A984D1D73D9D02AD69C3A1AF90EC915DE6FC9F574BD755B2EF6BBE62F3717E128DC797A06FE35C1C28CED57A0F64F61A4439ACFE7A7B95A1A948417A5B8B69916A32989B00E2C3FB7C74139A4DA9E533C439E59FC7C4F90780D2BBCDF012C499C15A1E0B5C318F84FB17DF97AB3EC356FD0072CFA3884EFBED319009DE6DBF2A5C7C87A93DEB04CCD9147EF8C9BEC2FD713793E4F0BF8C4EFCEBFBF95D555E523AB5D742808C4E425979A1C216C8CB2B42C7715B8CA5907E84E6FBC35DA7BFBFC892870B659C882C6E3697E0DCC6C24771F26D51A890786DA516DBC2D161680B134F1715B32F734E667650398EC2241AF78877BB3D61D83D0158DDE894862EE6E1BEE278724EA7B34C74F0A5D6B7F79F1322E20AD5757E11D9AC31BFE27C56ABB23A275130533433DC41DDBA1081E3A018E0D0B55DF33ECAE104909DC74F1CA2256CFD423A859B0AC2112A0AE684396C0029AD07D0D30AC84FFD2C2E80B74DE29310FCAFE7D0CB8864729B6FD1F86052D7DD9A9CB085A186259A67C175B3F81C5DA19AFED1BF9C5C07F40A29ED47ED4F1C7DE878B8411E3239ED15AC0E4CCC1D7F8842E9FD9C989F301E2689F800C3D14A38810906A36EEA34207014E99C843C599D56FCFBC14278A2A009C13B6E4AC7460B54D2C7EF38D72AC450540097D2AF609D3FFF874D14582FA8FF21027DEC92844BD22A9A7EC14C66BCC8DB1E058B95AF87ACB60A5725767A76C9185744E483BCCD9278ED9FF15A04061D0F6E32D98B6853A39AA498673C7DD012982B1913B3C3CE2C7080E4CE974B
188
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
189
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
190
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
191
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
192
20040311222059 2 6 100 6143 5 E95A4131F86234D27EE1E51791599559EEDB618912E4FE36B81B80CDA4D497959DBFAEE929317A66BE64A328BAB6183EA5A5CBB3581490B4B613B225ADD00EFD38540356E0F4716229CDDB260283AF044FDAF1EF9248BB0CE9031C117CF15D3259B3E7B0301CA1AAC91AFA7A57CCDEED2DA4EFC2DBC7A9FC53BB4D3CB2D57D209D5DDEF25DE14F8226404296BD504EC14F6340F0AA2A1A943B9552C4B91D3EB48C08A13671C36EE5042857625DD2CB58965C0975EB775057FF82BC2B8B69D0BF26E2F80115B3E1A984D1D73D9D02AD69C3A1AF90EC915DE6FC9F574BD755B2EF6BBE62F3717E128DC797A06FE35C1C28CED57A0F64F61A4439ACFE7A7B95A1A948417A5B8B69916A32989B00E2C3FB7C74139A4DA9E533C439E59FC7C4F90780D2BBCDF012C499C15A1E0B5C318F84FB17DF97AB3EC356FD0072CFA3884EFBED319009DE6DBF2A5C7C87A93DEB04CCD9147EF8C9BEC2FD713793E4F0BF8C4EFCEBFBF95D555E523AB5D742808C4E425979A1C216C8CB2B42C7715B8CA5907E84E6FBC35DA7BFBFC892870B659C882C6E3697E0DCC6C24771F26D51A890786DA516DBC2D161680B134F1715B32F734E667650398EC2241AF78877BB3D61D83D0158DDE894862EE6E1BEE278724EA7B34C74F0A5D6B7F79F1322E20AD5757E11D9AC31BFE27C56ABB23A275130533433DC41DDBA1081E3A018E0D0B55DF33ECAE104909DC74F1CA2256CFD423A859B0AC2112A0AE684396C0029AD07D0D30AC84FFD2C2E80B74DE29310FCAFE7D0CB8864729B6FD1F86052D7DD9A9CB085A186259A67C175B3F81C5DA19AFED1BF9C5C07F40A29ED47ED4F1C7DE878B8411E3239ED15AC0E4CCC1D7F8842E9FD9C989F301E2689F800C3D14A38810906A36EEA34207014E99C843C599D56FCFBC14278A2A009C13B6E4AC7460B54D2C7EF38D72AC450540097D2AF609D3FFF874D14582FA8FF21027DEC92844BD22A9A7EC14C66BCC8DB1E058B95AF87ACB60A5725767A76C9185744E483BCCD9278ED9FF15A04061D0F6E32D98B6853A39AA498673C7DD012982B1913B3C3CE2C7080F103209F
193
20040312160304 2 6 100 6143 2 E95A4131F86234D27EE1E51791599559EEDB618912E4FE36B81B80CDA4D497959DBFAEE929317A66BE64A328BAB6183EA5A5CBB3581490B4B613B225ADD00EFD38540356E0F4716229CDDB260283AF044FDAF1EF9248BB0CE9031C117CF15D3259B3E7B0301CA1AAC91AFA7A57CCDEED2DA4EFC2DBC7A9FC53BB4D3CB2D57D209D5DDEF25DE14F8226404296BD504EC14F6340F0AA2A1A943B9552C4B91D3EB48C08A13671C36EE5042857625DD2CB58965C0975EB775057FF82BC2B8B69D0BF26E2F80115B3E1A984D1D73D9D02AD69C3A1AF90EC915DE6FC9F574BD755B2EF6BBE62F3717E128DC797A06FE35C1C28CED57A0F64F61A4439ACFE7A7B95A1A948417A5B8B69916A32989B00E2C3FB7C74139A4DA9E533C439E59FC7C4F90780D2BBCDF012C499C15A1E0B5C318F84FB17DF97AB3EC356FD0072CFA3884EFBED319009DE6DBF2A5C7C87A93DEB04CCD9147EF8C9BEC2FD713793E4F0BF8C4EFCEBFBF95D555E523AB5D742808C4E425979A1C216C8CB2B42C7715B8CA5907E84E6FBC35DA7BFBFC892870B659C882C6E3697E0DCC6C24771F26D51A890786DA516DBC2D161680B134F1715B32F734E667650398EC2241AF78877BB3D61D83D0158DDE894862EE6E1BEE278724EA7B34C74F0A5D6B7F79F1322E20AD5757E11D9AC31BFE27C56ABB23A275130533433DC41DDBA1081E3A018E0D0B55DF33ECAE104909DC74F1CA2256CFD423A859B0AC2112A0AE684396C0029AD07D0D30AC84FFD2C2E80B74DE29310FCAFE7D0CB8864729B6FD1F86052D7DD9A9CB085A186259A67C175B3F81C5DA19AFED1BF9C5C07F40A29ED47ED4F1C7DE878B8411E3239ED15AC0E4CCC1D7F8842E9FD9C989F301E2689F800C3D14A38810906A36EEA34207014E99C843C599D56FCFBC14278A2A009C13B6E4AC7460B54D2C7EF38D72AC450540097D2AF609D3FFF874D14582FA8FF21027DEC92844BD22A9A7EC14C66BCC8DB1E058B95AF87ACB60A5725767A76C9185744E483BCCD9278ED9FF15A04061D0F6E32D98B6853A39AA498673C7DD012982B1913B3C3CE2C7080F247861B
194
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
195
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
196
20040317113309 2 6 100 6143 2 E95A4131F86234D27EE1E51791599559EEDB618912E4FE36B81B80CDA4D497959DBFAEE929317A66BE64A328BAB6183EA5A5CBB3581490B4B613B225ADD00EFD38540356E0F4716229CDDB260283AF044FDAF1EF9248BB0CE9031C117CF15D3259B3E7B0301CA1AAC91AFA7A57CCDEED2DA4EFC2DBC7A9FC53BB4D3CB2D57D209D5DDEF25DE14F8226404296BD504EC14F6340F0AA2A1A943B9552C4B91D3EB48C08A13671C36EE5042857625DD2CB58965C0975EB775057FF82BC2B8B69D0BF26E2F80115B3E1A984D1D73D9D02AD69C3A1AF90EC915DE6FC9F574BD755B2EF6BBE62F3717E128DC797A06FE35C1C28CED57A0F64F61A4439ACFE7A7B95A1A948417A5B8B69916A32989B00E2C3FB7C74139A4DA9E533C439E59FC7C4F90780D2BBCDF012C499C15A1E0B5C318F84FB17DF97AB3EC356FD0072CFA3884EFBED319009DE6DBF2A5C7C87A93DEB04CCD9147EF8C9BEC2FD713793E4F0BF8C4EFCEBFBF95D555E523AB5D742808C4E425979A1C216C8CB2B42C7715B8CA5907E84E6FBC35DA7BFBFC892870B659C882C6E3697E0DCC6C24771F26D51A890786DA516DBC2D161680B134F1715B32F734E667650398EC2241AF78877BB3D61D83D0158DDE894862EE6E1BEE278724EA7B34C74F0A5D6B7F79F1322E20AD5757E11D9AC31BFE27C56ABB23A275130533433DC41DDBA1081E3A018E0D0B55DF33ECAE104909DC74F1CA2256CFD423A859B0AC2112A0AE684396C0029AD07D0D30AC84FFD2C2E80B74DE29310FCAFE7D0CB8864729B6FD1F86052D7DD9A9CB085A186259A67C175B3F81C5DA19AFED1BF9C5C07F40A29ED47ED4F1C7DE878B8411E3239ED15AC0E4CCC1D7F8842E9FD9C989F301E2689F800C3D14A38810906A36EEA34207014E99C843C599D56FCFBC14278A2A009C13B6E4AC7460B54D2C7EF38D72AC450540097D2AF609D3FFF874D14582FA8FF21027DEC92844BD22A9A7EC14C66BCC8DB1E058B95AF87ACB60A5725767A76C9185744E483BCCD9278ED9FF15A04061D0F6E32D98B6853A39AA498673C7DD012982B1913B3C3CE2C7080FAAE1F73
197
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
198
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
199
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
200
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
(-)/home/lb/net/src/openssh-4.3p2/openbsd-compat/Makefile (+42 lines)
Line 0 Link Here
1
# $Id: Makefile.in,v 1.37 2005/12/31 05:33:37 djm Exp $
2
3
sysconfdir=${prefix}/etc
4
piddir=/var/run
5
srcdir=.
6
top_srcdir=..
7
8
9
CC=gcc
10
LD=gcc
11
CFLAGS=-g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wno-pointer-sign -std=gnu99 
12
CPPFLAGS=-I. -I.. -I$(srcdir) -I$(srcdir)/..  -DHAVE_CONFIG_H
13
LIBS=-lcrypto -lutil -lz -lnsl  -lcrypt -lresolv -lresolv
14
AR=/usr/bin/ar
15
RANLIB=ranlib
16
INSTALL=/usr/bin/install -c
17
LDFLAGS=-L. 
18
19
OPENBSD=base64.o basename.o bindresvport.o daemon.o dirname.o getcwd.o getgrouplist.o getopt.o getrrsetbyname.o glob.o inet_aton.o inet_ntoa.o inet_ntop.o mktemp.o readpassphrase.o realpath.o rresvport.o setenv.o setproctitle.o sigact.o strlcat.o strlcpy.o strmode.o strsep.o strtonum.o strtoll.o strtoul.o vis.o
20
21
COMPAT=bsd-arc4random.o bsd-asprintf.o bsd-closefrom.o bsd-cray.o bsd-cygwin_util.o bsd-getpeereid.o bsd-misc.o bsd-nextstep.o bsd-openpty.o bsd-snprintf.o bsd-waitpid.o fake-rfc2553.o openssl-compat.o xmmap.o xcrypt.o
22
23
PORTS=port-irix.o port-aix.o port-uw.o port-tun.o
24
25
.c.o:
26
	$(CC) $(CFLAGS) $(CPPFLAGS) -c $<
27
28
all: libopenbsd-compat.a
29
30
$(COMPAT): ../config.h
31
$(OPENBSD): ../config.h
32
$(PORTS): ../config.h
33
34
libopenbsd-compat.a:  $(COMPAT) $(OPENBSD) $(PORTS)
35
	$(AR) rv $@ $(COMPAT) $(OPENBSD) $(PORTS)
36
	$(RANLIB) $@
37
38
clean:
39
	rm -f *.o *.a core 
40
41
distclean: clean
42
	rm -f Makefile *~
(-)/home/lb/net/src/openssh-4.3p2/opensshd.init (+82 lines)
Line 0 Link Here
1
#!/bin/sh
2
# Donated code that was put under PD license.
3
#
4
# Stripped PRNGd out of it for the time being.
5
6
umask 022
7
8
CAT=/bin/cat
9
KILL=/bin/kill
10
11
prefix=/usr
12
sysconfdir=${prefix}/etc
13
piddir=/var/run
14
15
SSHD=$prefix/sbin/sshd
16
PIDFILE=$piddir/sshd.pid
17
SSH_KEYGEN=$prefix/bin/ssh-keygen
18
HOST_KEY_RSA1=$sysconfdir/ssh_host_key
19
HOST_KEY_DSA=$sysconfdir/ssh_host_dsa_key
20
HOST_KEY_RSA=$sysconfdir/ssh_host_rsa_key
21
22
23
checkkeys() {
24
    if [ ! -f $HOST_KEY_RSA1 ]; then
25
	${SSH_KEYGEN} -t rsa1 -f ${HOST_KEY_RSA1} -N ""
26
    fi
27
    if [ ! -f $HOST_KEY_DSA ]; then
28
	${SSH_KEYGEN} -t dsa -f ${HOST_KEY_DSA} -N ""
29
    fi
30
    if [ ! -f $HOST_KEY_RSA ]; then
31
	${SSH_KEYGEN} -t rsa -f ${HOST_KEY_RSA} -N ""
32
    fi
33
}
34
35
stop_service() {
36
    if [  -r $PIDFILE  -a  ! -z ${PIDFILE}  ]; then
37
	PID=`${CAT} ${PIDFILE}`
38
    fi
39
    if [  ${PID:=0} -gt 1 -a  ! "X$PID" = "X "  ]; then
40
	${KILL} ${PID}
41
    else
42
	echo "Unable to read PID file"
43
    fi
44
}
45
46
start_service() {
47
    # XXX We really should check if the service is already going, but
48
    # XXX we will opt out at this time. - Bal
49
50
    # Check to see if we have keys that need to be made
51
    checkkeys
52
53
    # Start SSHD
54
    echo "starting $SSHD... \c"         ; $SSHD
55
56
    sshd_rc=$?
57
    if [ $sshd_rc -ne 0 ]; then
58
	echo "$0: Error ${sshd_rc} starting ${SSHD}... bailing."
59
	exit $sshd_rc
60
    fi
61
    echo done.
62
}
63
64
case $1 in
65
66
'start')
67
    start_service
68
    ;;
69
70
'stop')
71
    stop_service
72
    ;;
73
74
'restart')
75
    stop_service
76
    start_service
77
    ;;
78
79
*)
80
    echo "$0:  usage:  $0 {start|stop|restart}"
81
    ;;
82
esac
(-)/home/lb/net/src/openssh-4.3p2/scard/Makefile (+28 lines)
Line 0 Link Here
1
# $Id: Makefile.in,v 1.4 2002/04/26 01:25:41 djm Exp $
2
3
prefix=/usr
4
datadir=${prefix}/share
5
srcdir=.
6
top_srcdir=..
7
8
INSTALL=/usr/bin/install -c
9
10
11
12
all:
13
14
#Ssh.bin:  Ssh.bin.uu
15
#	uudecode Ssh.bin.uu
16
17
clean:
18
#	rm -rf Ssh.bin
19
20
distprep:
21
	uudecode Ssh.bin.uu
22
23
distclean: clean
24
	rm -f Makefile *~
25
26
install: $(srcdir)/Ssh.bin
27
	$(top_srcdir)/mkinstalldirs $(DESTDIR)$(datadir)
28
	$(INSTALL) -m 0644 $(srcdir)/Ssh.bin $(DESTDIR)$(datadir)/Ssh.bin
(-)/home/lb/net/src/openssh-4.3p2/scp.1.out (+221 lines)
Line 0 Link Here
1
.\"  -*- nroff -*-
2
.\"
3
.\" scp.1
4
.\"
5
.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
6
.\"
7
.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
8
.\"                    All rights reserved
9
.\"
10
.\" Created: Sun May  7 00:14:37 1995 ylo
11
.\"
12
.\" $OpenBSD: scp.1,v 1.39 2006/01/20 00:14:55 dtucker Exp $
13
.\"
14
.Dd September 25, 1999
15
.Dt SCP 1
16
.Os
17
.Sh NAME
18
.Nm scp
19
.Nd secure copy (remote file copy program)
20
.Sh SYNOPSIS
21
.Nm scp
22
.Bk -words
23
.Op Fl 1246BCpqrv
24
.Op Fl c Ar cipher
25
.Op Fl F Ar ssh_config
26
.Op Fl i Ar identity_file
27
.Op Fl l Ar limit
28
.Op Fl o Ar ssh_option
29
.Op Fl P Ar port
30
.Op Fl S Ar program
31
.Sm off
32
.Oo
33
.Op Ar user No @
34
.Ar host1 No :
35
.Oc Ns Ar file1
36
.Sm on
37
.Op Ar ...
38
.Sm off
39
.Oo
40
.Op Ar user No @
41
.Ar host2 No :
42
.Oc Ar file2
43
.Sm on
44
.Ek
45
.Sh DESCRIPTION
46
.Nm
47
copies files between hosts on a network.
48
It uses
49
.Xr ssh 1
50
for data transfer, and uses the same authentication and provides the
51
same security as
52
.Xr ssh 1 .
53
Unlike
54
.Xr rcp 1 ,
55
.Nm
56
will ask for passwords or passphrases if they are needed for
57
authentication.
58
.Pp
59
Any file name may contain a host and user specification to indicate
60
that the file is to be copied to/from that host.
61
Copies between two remote hosts are permitted.
62
.Pp
63
The options are as follows:
64
.Bl -tag -width Ds
65
.It Fl 1
66
Forces
67
.Nm
68
to use protocol 1.
69
.It Fl 2
70
Forces
71
.Nm
72
to use protocol 2.
73
.It Fl 4
74
Forces
75
.Nm
76
to use IPv4 addresses only.
77
.It Fl 6
78
Forces
79
.Nm
80
to use IPv6 addresses only.
81
.It Fl B
82
Selects batch mode (prevents asking for passwords or passphrases).
83
.It Fl C
84
Compression enable.
85
Passes the
86
.Fl C
87
flag to
88
.Xr ssh 1
89
to enable compression.
90
.It Fl c Ar cipher
91
Selects the cipher to use for encrypting the data transfer.
92
This option is directly passed to
93
.Xr ssh 1 .
94
.It Fl F Ar ssh_config
95
Specifies an alternative
96
per-user configuration file for
97
.Nm ssh .
98
This option is directly passed to
99
.Xr ssh 1 .
100
.It Fl i Ar identity_file
101
Selects the file from which the identity (private key) for RSA
102
authentication is read.
103
This option is directly passed to
104
.Xr ssh 1 .
105
.It Fl l Ar limit
106
Limits the used bandwidth, specified in Kbit/s.
107
.It Fl o Ar ssh_option
108
Can be used to pass options to
109
.Nm ssh
110
in the format used in
111
.Xr ssh_config 5 .
112
This is useful for specifying options
113
for which there is no separate
114
.Nm scp
115
command-line flag.
116
For full details of the options listed below, and their possible values, see
117
.Xr ssh_config 5 .
118
.Pp
119
.Bl -tag -width Ds -offset indent -compact
120
.It AddressFamily
121
.It BatchMode
122
.It BindAddress
123
.It ChallengeResponseAuthentication
124
.It CheckHostIP
125
.It Cipher
126
.It Ciphers
127
.It Compression
128
.It CompressionLevel
129
.It ConnectionAttempts
130
.It ConnectTimeout
131
.It ControlMaster
132
.It ControlPath
133
.It GlobalKnownHostsFile
134
.It GSSAPIAuthentication
135
.It GSSAPIDelegateCredentials
136
.It HashKnownHosts
137
.It Host
138
.It HostbasedAuthentication
139
.It HostKeyAlgorithms
140
.It HostKeyAlias
141
.It HostName
142
.It IdentityFile
143
.It IdentitiesOnly
144
.It KbdInteractiveDevices
145
.It LogLevel
146
.It MACs
147
.It NoHostAuthenticationForLocalhost
148
.It NumberOfPasswordPrompts
149
.It PasswordAuthentication
150
.It Port
151
.It PreferredAuthentications
152
.It Protocol
153
.It ProxyCommand
154
.It PubkeyAuthentication
155
.It RekeyLimit
156
.It RhostsRSAAuthentication
157
.It RSAAuthentication
158
.It SendEnv
159
.It ServerAliveInterval
160
.It ServerAliveCountMax
161
.It SmartcardDevice
162
.It StrictHostKeyChecking
163
.It TCPKeepAlive
164
.It UsePrivilegedPort
165
.It User
166
.It UserKnownHostsFile
167
.It VerifyHostKeyDNS
168
.El
169
.It Fl P Ar port
170
Specifies the port to connect to on the remote host.
171
Note that this option is written with a capital
172
.Sq P ,
173
because
174
.Fl p
175
is already reserved for preserving the times and modes of the file in
176
.Xr rcp 1 .
177
.It Fl p
178
Preserves modification times, access times, and modes from the
179
original file.
180
.It Fl q
181
Disables the progress meter.
182
.It Fl r
183
Recursively copy entire directories.
184
.It Fl S Ar program
185
Name of
186
.Ar program
187
to use for the encrypted connection.
188
The program must understand
189
.Xr ssh 1
190
options.
191
.It Fl v
192
Verbose mode.
193
Causes
194
.Nm
195
and
196
.Xr ssh 1
197
to print debugging messages about their progress.
198
This is helpful in
199
debugging connection, authentication, and configuration problems.
200
.El
201
.Sh DIAGNOSTICS
202
.Nm
203
exits with 0 on success or >0 if an error occurred.
204
.Sh SEE ALSO
205
.Xr rcp 1 ,
206
.Xr sftp 1 ,
207
.Xr ssh 1 ,
208
.Xr ssh-add 1 ,
209
.Xr ssh-agent 1 ,
210
.Xr ssh-keygen 1 ,
211
.Xr ssh_config 5 ,
212
.Xr sshd 8
213
.Sh HISTORY
214
.Nm
215
is based on the
216
.Xr rcp 1
217
program in BSD source code from the Regents of the University of
218
California.
219
.Sh AUTHORS
220
.An Timo Rinne Aq tri@iki.fi
221
.An Tatu Ylonen Aq ylo@cs.hut.fi
(-)/home/lb/net/src/openssh-4.3p2/sftp.1.out (+453 lines)
Line 0 Link Here
1
.\" $OpenBSD: sftp.1,v 1.63 2006/01/20 00:14:55 dtucker Exp $
2
.\"
3
.\" Copyright (c) 2001 Damien Miller.  All rights reserved.
4
.\"
5
.\" Redistribution and use in source and binary forms, with or without
6
.\" modification, are permitted provided that the following conditions
7
.\" are met:
8
.\" 1. Redistributions of source code must retain the above copyright
9
.\"    notice, this list of conditions and the following disclaimer.
10
.\" 2. Redistributions in binary form must reproduce the above copyright
11
.\"    notice, this list of conditions and the following disclaimer in the
12
.\"    documentation and/or other materials provided with the distribution.
13
.\"
14
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16
.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17
.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18
.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19
.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20
.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21
.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24
.\"
25
.Dd February 4, 2001
26
.Dt SFTP 1
27
.Os
28
.Sh NAME
29
.Nm sftp
30
.Nd secure file transfer program
31
.Sh SYNOPSIS
32
.Nm sftp
33
.Bk -words
34
.Op Fl 1Cv
35
.Op Fl B Ar buffer_size
36
.Op Fl b Ar batchfile
37
.Op Fl F Ar ssh_config
38
.Op Fl o Ar ssh_option
39
.Op Fl P Ar sftp_server_path
40
.Op Fl R Ar num_requests
41
.Op Fl S Ar program
42
.Op Fl s Ar subsystem | sftp_server
43
.Ar host
44
.Ek
45
.Nm sftp
46
.Oo Oo Ar user Ns @ Oc Ns
47
.Ar host Ns Oo : Ns Ar file Oo
48
.Ar file Oc Oc Oc
49
.Nm sftp
50
.Oo Oo Ar user Ns @ Oc Ns
51
.Ar host Ns Oo : Ns Ar dir Ns
52
.Oo Ar / Oc Oc Oc
53
.Nm sftp
54
.Fl b Ar batchfile
55
.Oo Ar user Ns @ Oc Ns Ar host
56
.Sh DESCRIPTION
57
.Nm
58
is an interactive file transfer program, similar to
59
.Xr ftp 1 ,
60
which performs all operations over an encrypted
61
.Xr ssh 1
62
transport.
63
It may also use many features of ssh, such as public key authentication and
64
compression.
65
.Nm
66
connects and logs into the specified
67
.Ar host ,
68
then enters an interactive command mode.
69
.Pp
70
The second usage format will retrieve files automatically if a non-interactive
71
authentication method is used; otherwise it will do so after
72
successful interactive authentication.
73
.Pp
74
The third usage format allows
75
.Nm
76
to start in a remote directory.
77
.Pp
78
The final usage format allows for automated sessions using the
79
.Fl b
80
option.
81
In such cases, it is necessary to configure non-interactive authentication
82
to obviate the need to enter a password at connection time (see
83
.Xr sshd 8
84
and
85
.Xr ssh-keygen 1
86
for details).
87
The options are as follows:
88
.Bl -tag -width Ds
89
.It Fl 1
90
Specify the use of protocol version 1.
91
.It Fl B Ar buffer_size
92
Specify the size of the buffer that
93
.Nm
94
uses when transferring files.
95
Larger buffers require fewer round trips at the cost of higher
96
memory consumption.
97
The default is 32768 bytes.
98
.It Fl b Ar batchfile
99
Batch mode reads a series of commands from an input
100
.Ar batchfile
101
instead of
102
.Em stdin .
103
Since it lacks user interaction it should be used in conjunction with
104
non-interactive authentication.
105
A
106
.Ar batchfile
107
of
108
.Sq \-
109
may be used to indicate standard input.
110
.Nm
111
will abort if any of the following
112
commands fail:
113
.Ic get , put , rename , ln ,
114
.Ic rm , mkdir , chdir , ls ,
115
.Ic lchdir , chmod , chown , chgrp , lpwd
116
and
117
.Ic lmkdir .
118
Termination on error can be suppressed on a command by command basis by
119
prefixing the command with a
120
.Sq \-
121
character (for example,
122
.Ic -rm /tmp/blah* ) .
123
.It Fl C
124
Enables compression (via ssh's
125
.Fl C
126
flag).
127
.It Fl F Ar ssh_config
128
Specifies an alternative
129
per-user configuration file for
130
.Xr ssh 1 .
131
This option is directly passed to
132
.Xr ssh 1 .
133
.It Fl o Ar ssh_option
134
Can be used to pass options to
135
.Nm ssh
136
in the format used in
137
.Xr ssh_config 5 .
138
This is useful for specifying options
139
for which there is no separate
140
.Nm sftp
141
command-line flag.
142
For example, to specify an alternate port use:
143
.Ic sftp -oPort=24 .
144
For full details of the options listed below, and their possible values, see
145
.Xr ssh_config 5 .
146
.Pp
147
.Bl -tag -width Ds -offset indent -compact
148
.It AddressFamily
149
.It BatchMode
150
.It BindAddress
151
.It ChallengeResponseAuthentication
152
.It CheckHostIP
153
.It Cipher
154
.It Ciphers
155
.It Compression
156
.It CompressionLevel
157
.It ConnectionAttempts
158
.It ConnectTimeout
159
.It ControlMaster
160
.It ControlPath
161
.It GlobalKnownHostsFile
162
.It GSSAPIAuthentication
163
.It GSSAPIDelegateCredentials
164
.It HashKnownHosts
165
.It Host
166
.It HostbasedAuthentication
167
.It HostKeyAlgorithms
168
.It HostKeyAlias
169
.It HostName
170
.It IdentityFile
171
.It IdentitiesOnly
172
.It KbdInteractiveDevices
173
.It LogLevel
174
.It MACs
175
.It NoHostAuthenticationForLocalhost
176
.It NumberOfPasswordPrompts
177
.It PasswordAuthentication
178
.It Port
179
.It PreferredAuthentications
180
.It Protocol
181
.It ProxyCommand
182
.It PubkeyAuthentication
183
.It RekeyLimit
184
.It RhostsRSAAuthentication
185
.It RSAAuthentication
186
.It SendEnv
187
.It ServerAliveInterval
188
.It ServerAliveCountMax
189
.It SmartcardDevice
190
.It StrictHostKeyChecking
191
.It TCPKeepAlive
192
.It UsePrivilegedPort
193
.It User
194
.It UserKnownHostsFile
195
.It VerifyHostKeyDNS
196
.El
197
.It Fl P Ar sftp_server_path
198
Connect directly to a local sftp server
199
(rather than via
200
.Xr ssh 1 ) .
201
This option may be useful in debugging the client and server.
202
.It Fl R Ar num_requests
203
Specify how many requests may be outstanding at any one time.
204
Increasing this may slightly improve file transfer speed
205
but will increase memory usage.
206
The default is 16 outstanding requests.
207
.It Fl S Ar program
208
Name of the
209
.Ar program
210
to use for the encrypted connection.
211
The program must understand
212
.Xr ssh 1
213
options.
214
.It Fl s Ar subsystem | sftp_server
215
Specifies the SSH2 subsystem or the path for an sftp server
216
on the remote host.
217
A path is useful for using
218
.Nm
219
over protocol version 1, or when the remote
220
.Xr sshd 8
221
does not have an sftp subsystem configured.
222
.It Fl v
223
Raise logging level.
224
This option is also passed to ssh.
225
.El
226
.Sh INTERACTIVE COMMANDS
227
Once in interactive mode,
228
.Nm
229
understands a set of commands similar to those of
230
.Xr ftp 1 .
231
Commands are case insensitive.
232
Pathnames that contain spaces must be enclosed in quotes.
233
Any special characters contained within pathnames that are recognized by
234
.Xr glob 3
235
must be escaped with backslashes
236
.Pq Sq \e .
237
.Bl -tag -width Ds
238
.It Ic bye
239
Quit
240
.Nm sftp .
241
.It Ic cd Ar path
242
Change remote directory to
243
.Ar path .
244
.It Ic chgrp Ar grp Ar path
245
Change group of file
246
.Ar path
247
to
248
.Ar grp .
249
.Ar path
250
may contain
251
.Xr glob 3
252
characters and may match multiple files.
253
.Ar grp
254
must be a numeric GID.
255
.It Ic chmod Ar mode Ar path
256
Change permissions of file
257
.Ar path
258
to
259
.Ar mode .
260
.Ar path
261
may contain
262
.Xr glob 3
263
characters and may match multiple files.
264
.It Ic chown Ar own Ar path
265
Change owner of file
266
.Ar path
267
to
268
.Ar own .
269
.Ar path
270
may contain
271
.Xr glob 3
272
characters and may match multiple files.
273
.Ar own
274
must be a numeric UID.
275
.It Ic exit
276
Quit
277
.Nm sftp .
278
.It Xo Ic get
279
.Op Fl P
280
.Ar remote-path
281
.Op Ar local-path
282
.Xc
283
Retrieve the
284
.Ar remote-path
285
and store it on the local machine.
286
If the local
287
path name is not specified, it is given the same name it has on the
288
remote machine.
289
.Ar remote-path
290
may contain
291
.Xr glob 3
292
characters and may match multiple files.
293
If it does and
294
.Ar local-path
295
is specified, then
296
.Ar local-path
297
must specify a directory.
298
If the
299
.Fl P
300
flag is specified, then full file permissions and access times are
301
copied too.
302
.It Ic help
303
Display help text.
304
.It Ic lcd Ar path
305
Change local directory to
306
.Ar path .
307
.It Ic lls Op Ar ls-options Op Ar path
308
Display local directory listing of either
309
.Ar path
310
or current directory if
311
.Ar path
312
is not specified.
313
.Ar ls-options
314
may contain any flags supported by the local system's
315
.Xr ls 1
316
command.
317
.Ar path
318
may contain
319
.Xr glob 3
320
characters and may match multiple files.
321
.It Ic lmkdir Ar path
322
Create local directory specified by
323
.Ar path .
324
.It Ic ln Ar oldpath Ar newpath
325
Create a symbolic link from
326
.Ar oldpath
327
to
328
.Ar newpath .
329
.It Ic lpwd
330
Print local working directory.
331
.It Xo Ic ls
332
.Op Fl 1aflnrSt
333
.Op Ar path
334
.Xc
335
Display a remote directory listing of either
336
.Ar path
337
or the current directory if
338
.Ar path
339
is not specified.
340
.Ar path
341
may contain
342
.Xr glob 3
343
characters and may match multiple files.
344
.Pp
345
The following flags are recognized and alter the behaviour of
346
.Ic ls
347
accordingly:
348
.Bl -tag -width Ds
349
.It Fl 1
350
Produce single columnar output.
351
.It Fl a
352
List files beginning with a dot
353
.Pq Sq \&. .
354
.It Fl f
355
Do not sort the listing.
356
The default sort order is lexicographical.
357
.It Fl l
358
Display additional details including permissions
359
and ownership information.
360
.It Fl n
361
Produce a long listing with user and group information presented
362
numerically.
363
.It Fl r
364
Reverse the sort order of the listing.
365
.It Fl S
366
Sort the listing by file size.
367
.It Fl t
368
Sort the listing by last modification time.
369
.El
370
.It Ic lumask Ar umask
371
Set local umask to
372
.Ar umask .
373
.It Ic mkdir Ar path
374
Create remote directory specified by
375
.Ar path .
376
.It Ic progress
377
Toggle display of progress meter.
378
.It Xo Ic put
379
.Op Fl P
380
.Ar local-path
381
.Op Ar remote-path
382
.Xc
383
Upload
384
.Ar local-path
385
and store it on the remote machine.
386
If the remote path name is not specified, it is given the same name it has
387
on the local machine.
388
.Ar local-path
389
may contain
390
.Xr glob 3
391
characters and may match multiple files.
392
If it does and
393
.Ar remote-path
394
is specified, then
395
.Ar remote-path
396
must specify a directory.
397
If the
398
.Fl P
399
flag is specified, then the file's full permission and access time are
400
copied too.
401
.It Ic pwd
402
Display remote working directory.
403
.It Ic quit
404
Quit
405
.Nm sftp .
406
.It Ic rename Ar oldpath Ar newpath
407
Rename remote file from
408
.Ar oldpath
409
to
410
.Ar newpath .
411
.It Ic rm Ar path
412
Delete remote file specified by
413
.Ar path .
414
.It Ic rmdir Ar path
415
Remove remote directory specified by
416
.Ar path .
417
.It Ic symlink Ar oldpath Ar newpath
418
Create a symbolic link from
419
.Ar oldpath
420
to
421
.Ar newpath .
422
.It Ic version
423
Display the
424
.Nm
425
protocol version.
426
.It Ic \&! Ar command
427
Execute
428
.Ar command
429
in local shell.
430
.It Ic \&!
431
Escape to local shell.
432
.It Ic \&?
433
Synonym for help.
434
.El
435
.Sh SEE ALSO
436
.Xr ftp 1 ,
437
.Xr ls 1 ,
438
.Xr scp 1 ,
439
.Xr ssh 1 ,
440
.Xr ssh-add 1 ,
441
.Xr ssh-keygen 1 ,
442
.Xr glob 3 ,
443
.Xr ssh_config 5 ,
444
.Xr sftp-server 8 ,
445
.Xr sshd 8
446
.Rs
447
.%A T. Ylonen
448
.%A S. Lehtinen
449
.%T "SSH File Transfer Protocol"
450
.%N draft-ietf-secsh-filexfer-00.txt
451
.%D January 2001
452
.%O work in progress material
453
.Re
(-)/home/lb/net/src/openssh-4.3p2/sftp-server.8.out (+63 lines)
Line 0 Link Here
1
.\" $OpenBSD: sftp-server.8,v 1.10 2003/10/08 08:27:36 jmc Exp $
2
.\"
3
.\" Copyright (c) 2000 Markus Friedl.  All rights reserved.
4
.\"
5
.\" Redistribution and use in source and binary forms, with or without
6
.\" modification, are permitted provided that the following conditions
7
.\" are met:
8
.\" 1. Redistributions of source code must retain the above copyright
9
.\"    notice, this list of conditions and the following disclaimer.
10
.\" 2. Redistributions in binary form must reproduce the above copyright
11
.\"    notice, this list of conditions and the following disclaimer in the
12
.\"    documentation and/or other materials provided with the distribution.
13
.\"
14
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16
.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17
.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18
.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19
.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20
.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21
.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24
.\"
25
.Dd August 30, 2000
26
.Dt SFTP-SERVER 8
27
.Os
28
.Sh NAME
29
.Nm sftp-server
30
.Nd SFTP server subsystem
31
.Sh SYNOPSIS
32
.Nm sftp-server
33
.Sh DESCRIPTION
34
.Nm
35
is a program that speaks the server side of SFTP protocol
36
to stdout and expects client requests from stdin.
37
.Nm
38
is not intended to be called directly, but from
39
.Xr sshd 8
40
using the
41
.Cm Subsystem
42
option.
43
See
44
.Xr sshd_config 5
45
for more information.
46
.Sh SEE ALSO
47
.Xr sftp 1 ,
48
.Xr ssh 1 ,
49
.Xr sshd_config 5 ,
50
.Xr sshd 8
51
.Rs
52
.%A T. Ylonen
53
.%A S. Lehtinen
54
.%T "SSH File Transfer Protocol"
55
.%N draft-ietf-secsh-filexfer-00.txt
56
.%D January 2001
57
.%O work in progress material
58
.Re
59
.Sh AUTHORS
60
.An Markus Friedl Aq markus@openbsd.org
61
.Sh HISTORY
62
.Nm
63
first appeared in OpenBSD 2.8 .
(-)/home/lb/net/src/openssh-4.3p2/ssh.1.out (+1369 lines)
Line 0 Link Here
1
.\"  -*- nroff -*-
2
.\"
3
.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4
.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5
.\"                    All rights reserved
6
.\"
7
.\" As far as I am concerned, the code I have written for this software
8
.\" can be used freely for any purpose.  Any derived versions of this
9
.\" software must be clearly marked as such, and if the derived work is
10
.\" incompatible with the protocol description in the RFC file, it must be
11
.\" called by a name other than "ssh" or "Secure Shell".
12
.\"
13
.\" Copyright (c) 1999,2000 Markus Friedl.  All rights reserved.
14
.\" Copyright (c) 1999 Aaron Campbell.  All rights reserved.
15
.\" Copyright (c) 1999 Theo de Raadt.  All rights reserved.
16
.\"
17
.\" Redistribution and use in source and binary forms, with or without
18
.\" modification, are permitted provided that the following conditions
19
.\" are met:
20
.\" 1. Redistributions of source code must retain the above copyright
21
.\"    notice, this list of conditions and the following disclaimer.
22
.\" 2. Redistributions in binary form must reproduce the above copyright
23
.\"    notice, this list of conditions and the following disclaimer in the
24
.\"    documentation and/or other materials provided with the distribution.
25
.\"
26
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
27
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
28
.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
29
.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
30
.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
31
.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
32
.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
33
.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36
.\"
37
.\" $OpenBSD: ssh.1,v 1.253 2006/01/30 13:37:49 jmc Exp $
38
.Dd September 25, 1999
39
.Dt SSH 1
40
.Os
41
.Sh NAME
42
.Nm ssh
43
.Nd OpenSSH SSH client (remote login program)
44
.Sh SYNOPSIS
45
.Nm ssh
46
.Op Fl 1246AaCfgKkMNnqsTtVvXxY
47
.Op Fl b Ar bind_address
48
.Op Fl c Ar cipher_spec
49
.Oo Fl D\ \&
50
.Sm off
51
.Oo Ar bind_address : Oc
52
.Ar port
53
.Sm on
54
.Oc
55
.Op Fl e Ar escape_char
56
.Op Fl F Ar configfile
57
.Bk -words
58
.Op Fl i Ar identity_file
59
.Ek
60
.Oo Fl L\ \&
61
.Sm off
62
.Oo Ar bind_address : Oc
63
.Ar port : host : hostport
64
.Sm on
65
.Oc
66
.Bk -words
67
.Op Fl l Ar login_name
68
.Ek
69
.Op Fl m Ar mac_spec
70
.Op Fl O Ar ctl_cmd
71
.Op Fl o Ar option
72
.Op Fl p Ar port
73
.Oo Fl R\ \&
74
.Sm off
75
.Oo Ar bind_address : Oc
76
.Ar port : host : hostport
77
.Sm on
78
.Oc
79
.Op Fl S Ar ctl_path
80
.Bk -words
81
.Op Fl w Ar tunnel : Ns Ar tunnel
82
.Oo Ar user Ns @ Oc Ns Ar hostname
83
.Op Ar command
84
.Ek
85
.Sh DESCRIPTION
86
.Nm
87
(SSH client) is a program for logging into a remote machine and for
88
executing commands on a remote machine.
89
It is intended to replace rlogin and rsh,
90
and provide secure encrypted communications between
91
two untrusted hosts over an insecure network.
92
X11 connections and arbitrary TCP ports
93
can also be forwarded over the secure channel.
94
.Pp
95
.Nm
96
connects and logs into the specified
97
.Ar hostname
98
(with optional
99
.Ar user
100
name).
101
The user must prove
102
his/her identity to the remote machine using one of several methods
103
depending on the protocol version used (see below).
104
.Pp
105
If
106
.Ar command
107
is specified,
108
it is executed on the remote host instead of a login shell.
109
.Pp
110
The options are as follows:
111
.Bl -tag -width Ds
112
.It Fl 1
113
Forces
114
.Nm
115
to try protocol version 1 only.
116
.It Fl 2
117
Forces
118
.Nm
119
to try protocol version 2 only.
120
.It Fl 4
121
Forces
122
.Nm
123
to use IPv4 addresses only.
124
.It Fl 6
125
Forces
126
.Nm
127
to use IPv6 addresses only.
128
.It Fl A
129
Enables forwarding of the authentication agent connection.
130
This can also be specified on a per-host basis in a configuration file.
131
.Pp
132
Agent forwarding should be enabled with caution.
133
Users with the ability to bypass file permissions on the remote host
134
(for the agent's Unix-domain socket)
135
can access the local agent through the forwarded connection.
136
An attacker cannot obtain key material from the agent,
137
however they can perform operations on the keys that enable them to
138
authenticate using the identities loaded into the agent.
139
.It Fl a
140
Disables forwarding of the authentication agent connection.
141
.It Fl b Ar bind_address
142
Use
143
.Ar bind_address
144
on the local machine as the source address
145
of the connection.
146
Only useful on systems with more than one address.
147
.It Fl C
148
Requests compression of all data (including stdin, stdout, stderr, and
149
data for forwarded X11 and TCP connections).
150
The compression algorithm is the same used by
151
.Xr gzip 1 ,
152
and the
153
.Dq level
154
can be controlled by the
155
.Cm CompressionLevel
156
option for protocol version 1.
157
Compression is desirable on modem lines and other
158
slow connections, but will only slow down things on fast networks.
159
The default value can be set on a host-by-host basis in the
160
configuration files; see the
161
.Cm Compression
162
option.
163
.It Fl c Ar cipher_spec
164
Selects the cipher specification for encrypting the session.
165
.Pp
166
Protocol version 1 allows specification of a single cipher.
167
The supported values are
168
.Dq 3des ,
169
.Dq blowfish ,
170
and
171
.Dq des .
172
.Ar 3des
173
(triple-des) is an encrypt-decrypt-encrypt triple with three different keys.
174
It is believed to be secure.
175
.Ar blowfish
176
is a fast block cipher; it appears very secure and is much faster than
177
.Ar 3des .
178
.Ar des
179
is only supported in the
180
.Nm
181
client for interoperability with legacy protocol 1 implementations
182
that do not support the
183
.Ar 3des
184
cipher.
185
Its use is strongly discouraged due to cryptographic weaknesses.
186
The default is
187
.Dq 3des .
188
.Pp
189
For protocol version 2,
190
.Ar cipher_spec
191
is a comma-separated list of ciphers
192
listed in order of preference.
193
The supported ciphers are:
194
3des-cbc,
195
aes128-cbc,
196
aes192-cbc,
197
aes256-cbc,
198
aes128-ctr,
199
aes192-ctr,
200
aes256-ctr,
201
arcfour128,
202
arcfour256,
203
arcfour,
204
blowfish-cbc,
205
and
206
cast128-cbc.
207
The default is:
208
.Bd -literal -offset indent
209
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,
210
arcfour256,arcfour,aes192-cbc,aes256-cbc,aes128-ctr,
211
aes192-ctr,aes256-ctr
212
.Ed
213
.It Fl D Xo
214
.Sm off
215
.Oo Ar bind_address : Oc
216
.Ar port
217
.Sm on
218
.Xc
219
Specifies a local
220
.Dq dynamic
221
application-level port forwarding.
222
This works by allocating a socket to listen to
223
.Ar port
224
on the local side, optionally bound to the specified
225
.Ar bind_address .
226
Whenever a connection is made to this port, the
227
connection is forwarded over the secure channel, and the application
228
protocol is then used to determine where to connect to from the
229
remote machine.
230
Currently the SOCKS4 and SOCKS5 protocols are supported, and
231
.Nm
232
will act as a SOCKS server.
233
Only root can forward privileged ports.
234
Dynamic port forwardings can also be specified in the configuration file.
235
.Pp
236
IPv6 addresses can be specified with an alternative syntax:
237
.Sm off
238
.Xo
239
.Op Ar bind_address No /
240
.Ar port
241
.Xc
242
.Sm on
243
or by enclosing the address in square brackets.
244
Only the superuser can forward privileged ports.
245
By default, the local port is bound in accordance with the
246
.Cm GatewayPorts
247
setting.
248
However, an explicit
249
.Ar bind_address
250
may be used to bind the connection to a specific address.
251
The
252
.Ar bind_address
253
of
254
.Dq localhost
255
indicates that the listening port be bound for local use only, while an
256
empty address or
257
.Sq *
258
indicates that the port should be available from all interfaces.
259
.It Fl e Ar escape_char
260
Sets the escape character for sessions with a pty (default:
261
.Ql ~ ) .
262
The escape character is only recognized at the beginning of a line.
263
The escape character followed by a dot
264
.Pq Ql \&.
265
closes the connection;
266
followed by control-Z suspends the connection;
267
and followed by itself sends the escape character once.
268
Setting the character to
269
.Dq none
270
disables any escapes and makes the session fully transparent.
271
.It Fl F Ar configfile
272
Specifies an alternative per-user configuration file.
273
If a configuration file is given on the command line,
274
the system-wide configuration file
275
.Pq Pa /usr/etc/ssh_config
276
will be ignored.
277
The default for the per-user configuration file is
278
.Pa ~/.ssh/config .
279
.It Fl f
280
Requests
281
.Nm
282
to go to background just before command execution.
283
This is useful if
284
.Nm
285
is going to ask for passwords or passphrases, but the user
286
wants it in the background.
287
This implies
288
.Fl n .
289
The recommended way to start X11 programs at a remote site is with
290
something like
291
.Ic ssh -f host xterm .
292
.It Fl g
293
Allows remote hosts to connect to local forwarded ports.
294
.It Fl I Ar smartcard_device
295
Specify the device
296
.Nm
297
should use to communicate with a smartcard used for storing the user's
298
private RSA key.
299
This option is only available if support for smartcard devices
300
is compiled in (default is no support).
301
.It Fl i Ar identity_file
302
Selects a file from which the identity (private key) for
303
RSA or DSA authentication is read.
304
The default is
305
.Pa ~/.ssh/identity
306
for protocol version 1, and
307
.Pa ~/.ssh/id_rsa
308
and
309
.Pa ~/.ssh/id_dsa
310
for protocol version 2.
311
Identity files may also be specified on
312
a per-host basis in the configuration file.
313
It is possible to have multiple
314
.Fl i
315
options (and multiple identities specified in
316
configuration files).
317
.It Fl K
318
Enables forwarding (delegation) of GSSAPI credentials to the server.
319
.It Fl k
320
Disables forwarding (delegation) of GSSAPI credentials to the server.
321
.It Fl L Xo
322
.Sm off
323
.Oo Ar bind_address : Oc
324
.Ar port : host : hostport
325
.Sm on
326
.Xc
327
Specifies that the given port on the local (client) host is to be
328
forwarded to the given host and port on the remote side.
329
This works by allocating a socket to listen to
330
.Ar port
331
on the local side, optionally bound to the specified
332
.Ar bind_address .
333
Whenever a connection is made to this port, the
334
connection is forwarded over the secure channel, and a connection is
335
made to
336
.Ar host
337
port
338
.Ar hostport
339
from the remote machine.
340
Port forwardings can also be specified in the configuration file.
341
IPv6 addresses can be specified with an alternative syntax:
342
.Sm off
343
.Xo
344
.Op Ar bind_address No /
345
.Ar port No / Ar host No /
346
.Ar hostport
347
.Xc
348
.Sm on
349
or by enclosing the address in square brackets.
350
Only the superuser can forward privileged ports.
351
By default, the local port is bound in accordance with the
352
.Cm GatewayPorts
353
setting.
354
However, an explicit
355
.Ar bind_address
356
may be used to bind the connection to a specific address.
357
The
358
.Ar bind_address
359
of
360
.Dq localhost
361
indicates that the listening port be bound for local use only, while an
362
empty address or
363
.Sq *
364
indicates that the port should be available from all interfaces.
365
.It Fl l Ar login_name
366
Specifies the user to log in as on the remote machine.
367
This also may be specified on a per-host basis in the configuration file.
368
.It Fl M
369
Places the
370
.Nm
371
client into
372
.Dq master
373
mode for connection sharing.
374
Multiple
375
.Fl M
376
options places
377
.Nm
378
into
379
.Dq master
380
mode with confirmation required before slave connections are accepted.
381
Refer to the description of
382
.Cm ControlMaster
383
in
384
.Xr ssh_config 5
385
for details.
386
.It Fl m Ar mac_spec
387
Additionally, for protocol version 2 a comma-separated list of MAC
388
(message authentication code) algorithms can
389
be specified in order of preference.
390
See the
391
.Cm MACs
392
keyword for more information.
393
.It Fl N
394
Do not execute a remote command.
395
This is useful for just forwarding ports
396
(protocol version 2 only).
397
.It Fl n
398
Redirects stdin from
399
.Pa /dev/null
400
(actually, prevents reading from stdin).
401
This must be used when
402
.Nm
403
is run in the background.
404
A common trick is to use this to run X11 programs on a remote machine.
405
For example,
406
.Ic ssh -n shadows.cs.hut.fi emacs &
407
will start an emacs on shadows.cs.hut.fi, and the X11
408
connection will be automatically forwarded over an encrypted channel.
409
The
410
.Nm
411
program will be put in the background.
412
(This does not work if
413
.Nm
414
needs to ask for a password or passphrase; see also the
415
.Fl f
416
option.)
417
.It Fl O Ar ctl_cmd
418
Control an active connection multiplexing master process.
419
When the
420
.Fl O
421
option is specified, the
422
.Ar ctl_cmd
423
argument is interpreted and passed to the master process.
424
Valid commands are:
425
.Dq check
426
(check that the master process is running) and
427
.Dq exit
428
(request the master to exit).
429
.It Fl o Ar option
430
Can be used to give options in the format used in the configuration file.
431
This is useful for specifying options for which there is no separate
432
command-line flag.
433
For full details of the options listed below, and their possible values, see
434
.Xr ssh_config 5 .
435
.Pp
436
.Bl -tag -width Ds -offset indent -compact
437
.It AddressFamily
438
.It BatchMode
439
.It BindAddress
440
.It ChallengeResponseAuthentication
441
.It CheckHostIP
442
.It Cipher
443
.It Ciphers
444
.It ClearAllForwardings
445
.It Compression
446
.It CompressionLevel
447
.It ConnectionAttempts
448
.It ConnectTimeout
449
.It ControlMaster
450
.It ControlPath
451
.It DynamicForward
452
.It EscapeChar
453
.It ForwardAgent
454
.It ForwardX11
455
.It ForwardX11Trusted
456
.It GatewayPorts
457
.It GlobalKnownHostsFile
458
.It GSSAPIAuthentication
459
.It GSSAPIDelegateCredentials
460
.It HashKnownHosts
461
.It Host
462
.It HostbasedAuthentication
463
.It HostKeyAlgorithms
464
.It HostKeyAlias
465
.It HostName
466
.It IdentityFile
467
.It IdentitiesOnly
468
.It KbdInteractiveDevices
469
.It LocalCommand
470
.It LocalForward
471
.It LogLevel
472
.It MACs
473
.It NoHostAuthenticationForLocalhost
474
.It NumberOfPasswordPrompts
475
.It PasswordAuthentication
476
.It PermitLocalCommand
477
.It Port
478
.It PreferredAuthentications
479
.It Protocol
480
.It ProxyCommand
481
.It PubkeyAuthentication
482
.It RekeyLimit
483
.It RemoteForward
484
.It RhostsRSAAuthentication
485
.It RSAAuthentication
486
.It SendEnv
487
.It ServerAliveInterval
488
.It ServerAliveCountMax
489
.It SmartcardDevice
490
.It StrictHostKeyChecking
491
.It TCPKeepAlive
492
.It Tunnel
493
.It TunnelDevice
494
.It UsePrivilegedPort
495
.It User
496
.It UserKnownHostsFile
497
.It VerifyHostKeyDNS
498
.It XAuthLocation
499
.El
500
.It Fl p Ar port
501
Port to connect to on the remote host.
502
This can be specified on a
503
per-host basis in the configuration file.
504
.It Fl q
505
Quiet mode.
506
Causes all warning and diagnostic messages to be suppressed.
507
Only fatal errors are displayed.
508
If a second
509
.Fl q
510
is given then even fatal errors are suppressed.
511
.It Fl R Xo
512
.Sm off
513
.Oo Ar bind_address : Oc
514
.Ar port : host : hostport
515
.Sm on
516
.Xc
517
Specifies that the given port on the remote (server) host is to be
518
forwarded to the given host and port on the local side.
519
This works by allocating a socket to listen to
520
.Ar port
521
on the remote side, and whenever a connection is made to this port, the
522
connection is forwarded over the secure channel, and a connection is
523
made to
524
.Ar host
525
port
526
.Ar hostport
527
from the local machine.
528
.Pp
529
Port forwardings can also be specified in the configuration file.
530
Privileged ports can be forwarded only when
531
logging in as root on the remote machine.
532
IPv6 addresses can be specified by enclosing the address in square braces or
533
using an alternative syntax:
534
.Sm off
535
.Xo
536
.Op Ar bind_address No /
537
.Ar host No / Ar port No /
538
.Ar hostport
539
.Xc .
540
.Sm on
541
.Pp
542
By default, the listening socket on the server will be bound to the loopback
543
interface only.
544
This may be overriden by specifying a
545
.Ar bind_address .
546
An empty
547
.Ar bind_address ,
548
or the address
549
.Ql * ,
550
indicates that the remote socket should listen on all interfaces.
551
Specifying a remote
552
.Ar bind_address
553
will only succeed if the server's
554
.Cm GatewayPorts
555
option is enabled (see
556
.Xr sshd_config 5 ) .
557
.It Fl S Ar ctl_path
558
Specifies the location of a control socket for connection sharing.
559
Refer to the description of
560
.Cm ControlPath
561
and
562
.Cm ControlMaster
563
in
564
.Xr ssh_config 5
565
for details.
566
.It Fl s
567
May be used to request invocation of a subsystem on the remote system.
568
Subsystems are a feature of the SSH2 protocol which facilitate the use
569
of SSH as a secure transport for other applications (eg.\&
570
.Xr sftp 1 ) .
571
The subsystem is specified as the remote command.
572
.It Fl T
573
Disable pseudo-tty allocation.
574
.It Fl t
575
Force pseudo-tty allocation.
576
This can be used to execute arbitrary
577
screen-based programs on a remote machine, which can be very useful,
578
e.g., when implementing menu services.
579
Multiple
580
.Fl t
581
options force tty allocation, even if
582
.Nm
583
has no local tty.
584
.It Fl V
585
Display the version number and exit.
586
.It Fl v
587
Verbose mode.
588
Causes
589
.Nm
590
to print debugging messages about its progress.
591
This is helpful in
592
debugging connection, authentication, and configuration problems.
593
Multiple
594
.Fl v
595
options increase the verbosity.
596
The maximum is 3.
597
.It Fl w Ar tunnel : Ns Ar tunnel
598
Requests a
599
.Xr tun 4
600
device on the client
601
(first
602
.Ar tunnel
603
arg)
604
and server
605
(second
606
.Ar tunnel
607
arg).
608
The devices may be specified by numerical ID or the keyword
609
.Dq any ,
610
which uses the next available tunnel device.
611
See also the
612
.Cm Tunnel
613
directive in
614
.Xr ssh_config 5 .
615
.It Fl X
616
Enables X11 forwarding.
617
This can also be specified on a per-host basis in a configuration file.
618
.Pp
619
X11 forwarding should be enabled with caution.
620
Users with the ability to bypass file permissions on the remote host
621
(for the user's X authorization database)
622
can access the local X11 display through the forwarded connection.
623
An attacker may then be able to perform activities such as keystroke monitoring.
624
.Pp
625
For this reason, X11 forwarding is subjected to X11 SECURITY extension
626
restrictions by default.
627
Please refer to the
628
.Nm
629
.Fl Y
630
option and the
631
.Cm ForwardX11Trusted
632
directive in
633
.Xr ssh_config 5
634
for more information.
635
.It Fl x
636
Disables X11 forwarding.
637
.It Fl Y
638
Enables trusted X11 forwarding.
639
Trusted X11 forwardings are not subjected to the X11 SECURITY extension
640
controls.
641
.El
642
.Pp
643
.Nm
644
may additionally obtain configuration data from
645
a per-user configuration file and a system-wide configuration file.
646
The file format and configuration options are described in
647
.Xr ssh_config 5 .
648
.Pp
649
.Nm
650
exits with the exit status of the remote command or with 255
651
if an error occurred.
652
.Sh AUTHENTICATION
653
The OpenSSH SSH client supports SSH protocols 1 and 2.
654
Protocol 2 is the default, with
655
.Nm
656
falling back to protocol 1 if it detects protocol 2 is unsupported.
657
These settings may be altered using the
658
.Cm Protocol
659
option in
660
.Xr ssh_config 5 ,
661
or enforced using the
662
.Fl 1
663
and
664
.Fl 2
665
options (see above).
666
Both protocols support similar authentication methods,
667
but protocol 2 is preferred since
668
it provides additional mechanisms for confidentiality
669
(the traffic is encrypted using AES, 3DES, Blowfish, CAST128, or Arcfour)
670
and integrity (hmac-md5, hmac-sha1, hmac-ripemd160).
671
Protocol 1 lacks a strong mechanism for ensuring the
672
integrity of the connection.
673
.Pp
674
The methods available for authentication are:
675
host-based authentication,
676
public key authentication,
677
challenge-response authentication,
678
and password authentication.
679
Authentication methods are tried in the order specified above,
680
though protocol 2 has a configuration option to change the default order:
681
.Cm PreferredAuthentications .
682
.Pp
683
Host-based authentication works as follows:
684
If the machine the user logs in from is listed in
685
.Pa /etc/hosts.equiv
686
or
687
.Pa /usr/etc/shosts.equiv
688
on the remote machine, and the user names are
689
the same on both sides, or if the files
690
.Pa ~/.rhosts
691
or
692
.Pa ~/.shosts
693
exist in the user's home directory on the
694
remote machine and contain a line containing the name of the client
695
machine and the name of the user on that machine, the user is
696
considered for login.
697
Additionally, the server
698
.Em must
699
be able to verify the client's
700
host key (see the description of
701
.Pa /usr/etc/ssh_known_hosts
702
and
703
.Pa ~/.ssh/known_hosts ,
704
below)
705
for login to be permitted.
706
This authentication method closes security holes due to IP
707
spoofing, DNS spoofing, and routing spoofing.
708
[Note to the administrator:
709
.Pa /etc/hosts.equiv ,
710
.Pa ~/.rhosts ,
711
and the rlogin/rsh protocol in general, are inherently insecure and should be
712
disabled if security is desired.]
713
.Pp
714
Public key authentication works as follows:
715
The scheme is based on public-key cryptography,
716
using cryptosystems
717
where encryption and decryption are done using separate keys,
718
and it is unfeasible to derive the decryption key from the encryption key.
719
The idea is that each user creates a public/private
720
key pair for authentication purposes.
721
The server knows the public key, and only the user knows the private key.
722
.Nm
723
implements public key authentication protocol automatically,
724
using either the RSA or DSA algorithms.
725
Protocol 1 is restricted to using only RSA keys,
726
but protocol 2 may use either.
727
The
728
.Sx HISTORY
729
section of
730
.Xr ssl 8
731
contains a brief discussion of the two algorithms.
732
.Pp
733
The file
734
.Pa ~/.ssh/authorized_keys
735
lists the public keys that are permitted for logging in.
736
When the user logs in, the
737
.Nm
738
program tells the server which key pair it would like to use for
739
authentication.
740
The client proves that it has access to the private key
741
and the server checks that the corresponding public key
742
is authorized to accept the account.
743
.Pp
744
The user creates his/her key pair by running
745
.Xr ssh-keygen 1 .
746
This stores the private key in
747
.Pa ~/.ssh/identity
748
(protocol 1),
749
.Pa ~/.ssh/id_dsa
750
(protocol 2 DSA),
751
or
752
.Pa ~/.ssh/id_rsa
753
(protocol 2 RSA)
754
and stores the public key in
755
.Pa ~/.ssh/identity.pub
756
(protocol 1),
757
.Pa ~/.ssh/id_dsa.pub
758
(protocol 2 DSA),
759
or
760
.Pa ~/.ssh/id_rsa.pub
761
(protocol 2 RSA)
762
in the user's home directory.
763
The user should then copy the public key
764
to
765
.Pa ~/.ssh/authorized_keys
766
in his/her home directory on the remote machine.
767
The
768
.Pa authorized_keys
769
file corresponds to the conventional
770
.Pa ~/.rhosts
771
file, and has one key
772
per line, though the lines can be very long.
773
After this, the user can log in without giving the password.
774
.Pp
775
The most convenient way to use public key authentication may be with an
776
authentication agent.
777
See
778
.Xr ssh-agent 1
779
for more information.
780
.Pp
781
Challenge-response authentication works as follows:
782
The server sends an arbitrary
783
.Qq challenge
784
text, and prompts for a response.
785
Protocol 2 allows multiple challenges and responses;
786
protocol 1 is restricted to just one challenge/response.
787
Examples of challenge-response authentication include
788
BSD Authentication (see
789
.Xr login.conf 5 )
790
and PAM (some non-OpenBSD systems).
791
.Pp
792
Finally, if other authentication methods fail,
793
.Nm
794
prompts the user for a password.
795
The password is sent to the remote
796
host for checking; however, since all communications are encrypted,
797
the password cannot be seen by someone listening on the network.
798
.Pp
799
.Nm
800
automatically maintains and checks a database containing
801
identification for all hosts it has ever been used with.
802
Host keys are stored in
803
.Pa ~/.ssh/known_hosts
804
in the user's home directory.
805
Additionally, the file
806
.Pa /usr/etc/ssh_known_hosts
807
is automatically checked for known hosts.
808
Any new hosts are automatically added to the user's file.
809
If a host's identification ever changes,
810
.Nm
811
warns about this and disables password authentication to prevent
812
server spoofing or man-in-the-middle attacks,
813
which could otherwise be used to circumvent the encryption.
814
The
815
.Cm StrictHostKeyChecking
816
option can be used to control logins to machines whose
817
host key is not known or has changed.
818
.Pp
819
When the user's identity has been accepted by the server, the server
820
either executes the given command, or logs into the machine and gives
821
the user a normal shell on the remote machine.
822
All communication with
823
the remote command or shell will be automatically encrypted.
824
.Pp
825
If a pseudo-terminal has been allocated (normal login session), the
826
user may use the escape characters noted below.
827
.Pp
828
If no pseudo-tty has been allocated,
829
the session is transparent and can be used to reliably transfer binary data.
830
On most systems, setting the escape character to
831
.Dq none
832
will also make the session transparent even if a tty is used.
833
.Pp
834
The session terminates when the command or shell on the remote
835
machine exits and all X11 and TCP connections have been closed.
836
.Sh ESCAPE CHARACTERS
837
When a pseudo-terminal has been requested,
838
.Nm
839
supports a number of functions through the use of an escape character.
840
.Pp
841
A single tilde character can be sent as
842
.Ic ~~
843
or by following the tilde by a character other than those described below.
844
The escape character must always follow a newline to be interpreted as
845
special.
846
The escape character can be changed in configuration files using the
847
.Cm EscapeChar
848
configuration directive or on the command line by the
849
.Fl e
850
option.
851
.Pp
852
The supported escapes (assuming the default
853
.Ql ~ )
854
are:
855
.Bl -tag -width Ds
856
.It Cm ~.
857
Disconnect.
858
.It Cm ~^Z
859
Background
860
.Nm .
861
.It Cm ~#
862
List forwarded connections.
863
.It Cm ~&
864
Background
865
.Nm
866
at logout when waiting for forwarded connection / X11 sessions to terminate.
867
.It Cm ~?
868
Display a list of escape characters.
869
.It Cm ~B
870
Send a BREAK to the remote system
871
(only useful for SSH protocol version 2 and if the peer supports it).
872
.It Cm ~C
873
Open command line.
874
Currently this allows the addition of port forwardings using the
875
.Fl L
876
and
877
.Fl R
878
options (see above).
879
It also allows the cancellation of existing remote port-forwardings
880
using
881
.Fl KR Ar hostport .
882
.Ic !\& Ns Ar command
883
allows the user to execute a local command if the
884
.Ic PermitLocalCommand
885
option is enabled in
886
.Xr ssh_config 5 .
887
Basic help is available, using the
888
.Fl h
889
option.
890
.It Cm ~R
891
Request rekeying of the connection
892
(only useful for SSH protocol version 2 and if the peer supports it).
893
.El
894
.Sh TCP FORWARDING
895
Forwarding of arbitrary TCP connections over the secure channel can
896
be specified either on the command line or in a configuration file.
897
One possible application of TCP forwarding is a secure connection to a
898
mail server; another is going through firewalls.
899
.Pp
900
In the example below, we look at encrypting communication between
901
an IRC client and server, even though the IRC server does not directly
902
support encrypted communications.
903
This works as follows:
904
the user connects to the remote host using
905
.Nm ,
906
specifying a port to be used to forward connections
907
to the remote server.
908
After that it is possible to start the service which is to be encrypted
909
on the client machine,
910
connecting to the same local port,
911
and
912
.Nm
913
will encrypt and forward the connection.
914
.Pp
915
The following example tunnels an IRC session from client machine
916
.Dq 127.0.0.1
917
(localhost)
918
to remote server
919
.Dq server.example.com :
920
.Bd -literal -offset 4n
921
$ ssh -f -L 1234:localhost:6667 server.example.com sleep 10
922
$ irc -c '#users' -p 1234 pinky 127.0.0.1
923
.Ed
924
.Pp
925
This tunnels a connection to IRC server
926
.Dq server.example.com ,
927
joining channel
928
.Dq #users ,
929
nickname
930
.Dq pinky ,
931
using port 1234.
932
It doesn't matter which port is used,
933
as long as it's greater than 1023
934
(remember, only root can open sockets on privileged ports)
935
and doesn't conflict with any ports already in use.
936
The connection is forwarded to port 6667 on the remote server,
937
since that's the standard port for IRC services.
938
.Pp
939
The
940
.Fl f
941
option backgrounds
942
.Nm
943
and the remote command
944
.Dq sleep 10
945
is specified to allow an amount of time
946
(10 seconds, in the example)
947
to start the service which is to be tunnelled.
948
If no connections are made within the time specified,
949
.Nm
950
will exit.
951
.Sh X11 FORWARDING
952
If the
953
.Cm ForwardX11
954
variable is set to
955
.Dq yes
956
(or see the description of the
957
.Fl X ,
958
.Fl x ,
959
and
960
.Fl Y
961
options above)
962
and the user is using X11 (the
963
.Ev DISPLAY
964
environment variable is set), the connection to the X11 display is
965
automatically forwarded to the remote side in such a way that any X11
966
programs started from the shell (or command) will go through the
967
encrypted channel, and the connection to the real X server will be made
968
from the local machine.
969
The user should not manually set
970
.Ev DISPLAY .
971
Forwarding of X11 connections can be
972
configured on the command line or in configuration files.
973
.Pp
974
The
975
.Ev DISPLAY
976
value set by
977
.Nm
978
will point to the server machine, but with a display number greater than zero.
979
This is normal, and happens because
980
.Nm
981
creates a
982
.Dq proxy
983
X server on the server machine for forwarding the
984
connections over the encrypted channel.
985
.Pp
986
.Nm
987
will also automatically set up Xauthority data on the server machine.
988
For this purpose, it will generate a random authorization cookie,
989
store it in Xauthority on the server, and verify that any forwarded
990
connections carry this cookie and replace it by the real cookie when
991
the connection is opened.
992
The real authentication cookie is never
993
sent to the server machine (and no cookies are sent in the plain).
994
.Pp
995
If the
996
.Cm ForwardAgent
997
variable is set to
998
.Dq yes
999
(or see the description of the
1000
.Fl A
1001
and
1002
.Fl a
1003
options above) and
1004
the user is using an authentication agent, the connection to the agent
1005
is automatically forwarded to the remote side.
1006
.Sh VERIFYING HOST KEYS
1007
When connecting to a server for the first time,
1008
a fingerprint of the server's public key is presented to the user
1009
(unless the option
1010
.Cm StrictHostKeyChecking
1011
has been disabled).
1012
Fingerprints can be determined using
1013
.Xr ssh-keygen 1 :
1014
.Pp
1015
.Dl $ ssh-keygen -l -f /usr/etc/ssh_host_rsa_key
1016
.Pp
1017
If the fingerprint is already known,
1018
it can be matched and verified,
1019
and the key can be accepted.
1020
If the fingerprint is unknown,
1021
an alternative method of verification is available:
1022
SSH fingerprints verified by DNS.
1023
An additional resource record (RR),
1024
SSHFP,
1025
is added to a zonefile
1026
and the connecting client is able to match the fingerprint
1027
with that of the key presented.
1028
.Pp
1029
In this example, we are connecting a client to a server,
1030
.Dq host.example.com .
1031
The SSHFP resource records should first be added to the zonefile for
1032
host.example.com:
1033
.Bd -literal -offset indent
1034
$ ssh-keygen -f /usr/etc/ssh_host_rsa_key.pub -r host.example.com.
1035
$ ssh-keygen -f /usr/etc/ssh_host_dsa_key.pub -r host.example.com.
1036
.Ed
1037
.Pp
1038
The output lines will have to be added to the zonefile.
1039
To check that the zone is answering fingerprint queries:
1040
.Pp
1041
.Dl $ dig -t SSHFP host.example.com
1042
.Pp
1043
Finally the client connects:
1044
.Bd -literal -offset indent
1045
$ ssh -o "VerifyHostKeyDNS ask" host.example.com
1046
[...]
1047
Matching host key fingerprint found in DNS.
1048
Are you sure you want to continue connecting (yes/no)?
1049
.Ed
1050
.Pp
1051
See the
1052
.Cm VerifyHostKeyDNS
1053
option in
1054
.Xr ssh_config 5
1055
for more information.
1056
.Sh SSH-BASED VIRTUAL PRIVATE NETWORKS
1057
.Nm
1058
contains support for Virtual Private Network (VPN) tunnelling
1059
using the
1060
.Xr tun 4
1061
network pseudo-device,
1062
allowing two networks to be joined securely.
1063
The
1064
.Xr sshd_config 5
1065
configuration option
1066
.Cm PermitTunnel
1067
controls whether the server supports this,
1068
and at what level (layer 2 or 3 traffic).
1069
.Pp
1070
The following example would connect client network 10.0.50.0/24
1071
with remote network 10.0.99.0/24, provided that the SSH server
1072
running on the gateway to the remote network,
1073
at 192.168.1.15, allows it:
1074
.Bd -literal -offset indent
1075
# ssh -f -w 0:1 192.168.1.15 true
1076
# ifconfig tun0 10.0.50.1 10.0.99.1 netmask 255.255.255.252
1077
.Ed
1078
.Pp
1079
Client access may be more finely tuned via the
1080
.Pa /root/.ssh/authorized_keys
1081
file (see below) and the
1082
.Cm PermitRootLogin
1083
server option.
1084
The following entry would permit connections on the first
1085
.Xr tun 4
1086
device from user
1087
.Dq jane
1088
and on the second device from user
1089
.Dq john ,
1090
if
1091
.Cm PermitRootLogin
1092
is set to
1093
.Dq forced-commands-only :
1094
.Bd -literal -offset 2n
1095
tunnel="1",command="sh /etc/netstart tun1" ssh-rsa ... jane
1096
tunnel="2",command="sh /etc/netstart tun1" ssh-rsa ... john
1097
.Ed
1098
.Pp
1099
Since a SSH-based setup entails a fair amount of overhead,
1100
it may be more suited to temporary setups,
1101
such as for wireless VPNs.
1102
More permanent VPNs are better provided by tools such as
1103
.Xr ipsecctl 8
1104
and
1105
.Xr isakmpd 8 .
1106
.Sh ENVIRONMENT
1107
.Nm
1108
will normally set the following environment variables:
1109
.Bl -tag -width "SSH_ORIGINAL_COMMAND"
1110
.It Ev DISPLAY
1111
The
1112
.Ev DISPLAY
1113
variable indicates the location of the X11 server.
1114
It is automatically set by
1115
.Nm
1116
to point to a value of the form
1117
.Dq hostname:n ,
1118
where
1119
.Dq hostname
1120
indicates the host where the shell runs, and
1121
.Sq n
1122
is an integer \*(Ge 1.
1123
.Nm
1124
uses this special value to forward X11 connections over the secure
1125
channel.
1126
The user should normally not set
1127
.Ev DISPLAY
1128
explicitly, as that
1129
will render the X11 connection insecure (and will require the user to
1130
manually copy any required authorization cookies).
1131
.It Ev HOME
1132
Set to the path of the user's home directory.
1133
.It Ev LOGNAME
1134
Synonym for
1135
.Ev USER ;
1136
set for compatibility with systems that use this variable.
1137
.It Ev MAIL
1138
Set to the path of the user's mailbox.
1139
.It Ev PATH
1140
Set to the default
1141
.Ev PATH ,
1142
as specified when compiling
1143
.Nm .
1144
.It Ev SSH_ASKPASS
1145
If
1146
.Nm
1147
needs a passphrase, it will read the passphrase from the current
1148
terminal if it was run from a terminal.
1149
If
1150
.Nm
1151
does not have a terminal associated with it but
1152
.Ev DISPLAY
1153
and
1154
.Ev SSH_ASKPASS
1155
are set, it will execute the program specified by
1156
.Ev SSH_ASKPASS
1157
and open an X11 window to read the passphrase.
1158
This is particularly useful when calling
1159
.Nm
1160
from a
1161
.Pa .xsession
1162
or related script.
1163
(Note that on some machines it
1164
may be necessary to redirect the input from
1165
.Pa /dev/null
1166
to make this work.)
1167
.It Ev SSH_AUTH_SOCK
1168
Identifies the path of a
1169
.Ux Ns -domain
1170
socket used to communicate with the agent.
1171
.It Ev SSH_CONNECTION
1172
Identifies the client and server ends of the connection.
1173
The variable contains
1174
four space-separated values: client IP address, client port number,
1175
server IP address, and server port number.
1176
.It Ev SSH_ORIGINAL_COMMAND
1177
This variable contains the original command line if a forced command
1178
is executed.
1179
It can be used to extract the original arguments.
1180
.It Ev SSH_TTY
1181
This is set to the name of the tty (path to the device) associated
1182
with the current shell or command.
1183
If the current session has no tty,
1184
this variable is not set.
1185
.It Ev TZ
1186
This variable is set to indicate the present time zone if it
1187
was set when the daemon was started (i.e., the daemon passes the value
1188
on to new connections).
1189
.It Ev USER
1190
Set to the name of the user logging in.
1191
.El
1192
.Pp
1193
Additionally,
1194
.Nm
1195
reads
1196
.Pa ~/.ssh/environment ,
1197
and adds lines of the format
1198
.Dq VARNAME=value
1199
to the environment if the file exists and users are allowed to
1200
change their environment.
1201
For more information, see the
1202
.Cm PermitUserEnvironment
1203
option in
1204
.Xr sshd_config 5 .
1205
.Sh FILES
1206
.Bl -tag -width Ds -compact
1207
.It ~/.rhosts
1208
This file is used for host-based authentication (see above).
1209
On some machines this file may need to be
1210
world-readable if the user's home directory is on an NFS partition,
1211
because
1212
.Xr sshd 8
1213
reads it as root.
1214
Additionally, this file must be owned by the user,
1215
and must not have write permissions for anyone else.
1216
The recommended
1217
permission for most machines is read/write for the user, and not
1218
accessible by others.
1219
.Pp
1220
.It ~/.shosts
1221
This file is used in exactly the same way as
1222
.Pa .rhosts ,
1223
but allows host-based authentication without permitting login with
1224
rlogin/rsh.
1225
.Pp
1226
.It ~/.ssh/authorized_keys
1227
Lists the public keys (RSA/DSA) that can be used for logging in as this user.
1228
The format of this file is described in the
1229
.Xr sshd 8
1230
manual page.
1231
This file is not highly sensitive, but the recommended
1232
permissions are read/write for the user, and not accessible by others.
1233
.Pp
1234
.It ~/.ssh/config
1235
This is the per-user configuration file.
1236
The file format and configuration options are described in
1237
.Xr ssh_config 5 .
1238
Because of the potential for abuse, this file must have strict permissions:
1239
read/write for the user, and not accessible by others.
1240
It may be group-writable provided that the group in question contains only
1241
the user.
1242
.Pp
1243
.It ~/.ssh/environment
1244
Contains additional definitions for environment variables; see
1245
.Sx ENVIRONMENT ,
1246
above.
1247
.Pp
1248
.It ~/.ssh/identity
1249
.It ~/.ssh/id_dsa
1250
.It ~/.ssh/id_rsa
1251
Contains the private key for authentication.
1252
These files
1253
contain sensitive data and should be readable by the user but not
1254
accessible by others (read/write/execute).
1255
.Nm
1256
will simply ignore a private key file if it is accessible by others.
1257
It is possible to specify a passphrase when
1258
generating the key which will be used to encrypt the
1259
sensitive part of this file using 3DES.
1260
.Pp
1261
.It ~/.ssh/identity.pub
1262
.It ~/.ssh/id_dsa.pub
1263
.It ~/.ssh/id_rsa.pub
1264
Contains the public key for authentication.
1265
These files are not
1266
sensitive and can (but need not) be readable by anyone.
1267
.Pp
1268
.It ~/.ssh/known_hosts
1269
Contains a list of host keys for all hosts the user has logged into
1270
that are not already in the systemwide list of known host keys.
1271
See
1272
.Xr sshd 8
1273
for further details of the format of this file.
1274
.Pp
1275
.It ~/.ssh/rc
1276
Commands in this file are executed by
1277
.Nm
1278
when the user logs in, just before the user's shell (or command) is
1279
started.
1280
See the
1281
.Xr sshd 8
1282
manual page for more information.
1283
.Pp
1284
.It /etc/hosts.equiv
1285
This file is for host-based authentication (see above).
1286
It should only be writable by root.
1287
.Pp
1288
.It /usr/etc/shosts.equiv
1289
This file is used in exactly the same way as
1290
.Pa hosts.equiv ,
1291
but allows host-based authentication without permitting login with
1292
rlogin/rsh.
1293
.Pp
1294
.It Pa /usr/etc/ssh_config
1295
Systemwide configuration file.
1296
The file format and configuration options are described in
1297
.Xr ssh_config 5 .
1298
.Pp
1299
.It /usr/etc/ssh_host_key
1300
.It /usr/etc/ssh_host_dsa_key
1301
.It /usr/etc/ssh_host_rsa_key
1302
These three files contain the private parts of the host keys
1303
and are used for host-based authentication.
1304
If protocol version 1 is used,
1305
.Nm
1306
must be setuid root, since the host key is readable only by root.
1307
For protocol version 2,
1308
.Nm
1309
uses
1310
.Xr ssh-keysign 8
1311
to access the host keys,
1312
eliminating the requirement that
1313
.Nm
1314
be setuid root when host-based authentication is used.
1315
By default
1316
.Nm
1317
is not setuid root.
1318
.Pp
1319
.It /usr/etc/ssh_known_hosts
1320
Systemwide list of known host keys.
1321
This file should be prepared by the
1322
system administrator to contain the public host keys of all machines in the
1323
organization.
1324
It should be world-readable.
1325
See
1326
.Xr sshd 8
1327
for further details of the format of this file.
1328
.Pp
1329
.It /etc/ssh/sshrc
1330
Commands in this file are executed by
1331
.Nm
1332
when the user logs in, just before the user's shell (or command) is started.
1333
See the
1334
.Xr sshd 8
1335
manual page for more information.
1336
.El
1337
.Sh SEE ALSO
1338
.Xr scp 1 ,
1339
.Xr sftp 1 ,
1340
.Xr ssh-add 1 ,
1341
.Xr ssh-agent 1 ,
1342
.Xr ssh-argv0 1 ,
1343
.Xr ssh-keygen 1 ,
1344
.Xr ssh-keyscan 1 ,
1345
.Xr tun 4 ,
1346
.Xr hosts.equiv 5 ,
1347
.Xr ssh_config 5 ,
1348
.Xr ssh-keysign 8 ,
1349
.Xr sshd 8
1350
.Rs
1351
.%A T. Ylonen
1352
.%A T. Kivinen
1353
.%A M. Saarinen
1354
.%A T. Rinne
1355
.%A S. Lehtinen
1356
.%T "SSH Protocol Architecture"
1357
.%N draft-ietf-secsh-architecture-12.txt
1358
.%D January 2002
1359
.%O work in progress material
1360
.Re
1361
.Sh AUTHORS
1362
OpenSSH is a derivative of the original and free
1363
ssh 1.2.12 release by Tatu Ylonen.
1364
Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos,
1365
Theo de Raadt and Dug Song
1366
removed many bugs, re-added newer features and
1367
created OpenSSH.
1368
Markus Friedl contributed the support for SSH
1369
protocol versions 1.5 and 2.0.
(-)/home/lb/net/src/openssh-4.3p2/ssh-add.1.out (+175 lines)
Line 0 Link Here
1
.\"	$OpenBSD: ssh-add.1,v 1.43 2005/04/21 06:17:50 djm Exp $
2
.\"
3
.\"  -*- nroff -*-
4
.\"
5
.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
6
.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
7
.\"                    All rights reserved
8
.\"
9
.\" As far as I am concerned, the code I have written for this software
10
.\" can be used freely for any purpose.  Any derived versions of this
11
.\" software must be clearly marked as such, and if the derived work is
12
.\" incompatible with the protocol description in the RFC file, it must be
13
.\" called by a name other than "ssh" or "Secure Shell".
14
.\"
15
.\"
16
.\" Copyright (c) 1999,2000 Markus Friedl.  All rights reserved.
17
.\" Copyright (c) 1999 Aaron Campbell.  All rights reserved.
18
.\" Copyright (c) 1999 Theo de Raadt.  All rights reserved.
19
.\"
20
.\" Redistribution and use in source and binary forms, with or without
21
.\" modification, are permitted provided that the following conditions
22
.\" are met:
23
.\" 1. Redistributions of source code must retain the above copyright
24
.\"    notice, this list of conditions and the following disclaimer.
25
.\" 2. Redistributions in binary form must reproduce the above copyright
26
.\"    notice, this list of conditions and the following disclaimer in the
27
.\"    documentation and/or other materials provided with the distribution.
28
.\"
29
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
30
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
31
.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
32
.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
33
.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
34
.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
35
.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
36
.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
37
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
38
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
39
.\"
40
.Dd September 25, 1999
41
.Dt SSH-ADD 1
42
.Os
43
.Sh NAME
44
.Nm ssh-add
45
.Nd adds RSA or DSA identities to the authentication agent
46
.Sh SYNOPSIS
47
.Nm ssh-add
48
.Op Fl cDdLlXx
49
.Op Fl t Ar life
50
.Op Ar
51
.Nm ssh-add
52
.Fl s Ar reader
53
.Nm ssh-add
54
.Fl e Ar reader
55
.Sh DESCRIPTION
56
.Nm
57
adds RSA or DSA identities to the authentication agent,
58
.Xr ssh-agent 1 .
59
When run without arguments, it adds the files
60
.Pa ~/.ssh/id_rsa ,
61
.Pa ~/.ssh/id_dsa
62
and
63
.Pa ~/.ssh/identity .
64
Alternative file names can be given on the command line.
65
If any file requires a passphrase,
66
.Nm
67
asks for the passphrase from the user.
68
The passphrase is read from the user's tty.
69
.Nm
70
retries the last passphrase if multiple identity files are given.
71
.Pp
72
The authentication agent must be running and the
73
.Ev SSH_AUTH_SOCK
74
environment variable must contain the name of its socket for
75
.Nm
76
to work.
77
.Pp
78
The options are as follows:
79
.Bl -tag -width Ds
80
.It Fl c
81
Indicates that added identities should be subject to confirmation before
82
being used for authentication.
83
Confirmation is performed by the
84
.Ev SSH_ASKPASS
85
program mentioned below.
86
Successful confirmation is signaled by a zero exit status from the
87
.Ev SSH_ASKPASS
88
program, rather than text entered into the requester.
89
.It Fl D
90
Deletes all identities from the agent.
91
.It Fl d
92
Instead of adding the identity, removes the identity from the agent.
93
.It Fl e Ar reader
94
Remove key in smartcard
95
.Ar reader .
96
.It Fl L
97
Lists public key parameters of all identities currently represented
98
by the agent.
99
.It Fl l
100
Lists fingerprints of all identities currently represented by the agent.
101
.It Fl s Ar reader
102
Add key in smartcard
103
.Ar reader .
104
.It Fl t Ar life
105
Set a maximum lifetime when adding identities to an agent.
106
The lifetime may be specified in seconds or in a time format
107
specified in
108
.Xr sshd_config 5 .
109
.It Fl X
110
Unlock the agent.
111
.It Fl x
112
Lock the agent with a password.
113
.El
114
.Sh ENVIRONMENT
115
.Bl -tag -width Ds
116
.It Ev "DISPLAY" and "SSH_ASKPASS"
117
If
118
.Nm
119
needs a passphrase, it will read the passphrase from the current
120
terminal if it was run from a terminal.
121
If
122
.Nm
123
does not have a terminal associated with it but
124
.Ev DISPLAY
125
and
126
.Ev SSH_ASKPASS
127
are set, it will execute the program specified by
128
.Ev SSH_ASKPASS
129
and open an X11 window to read the passphrase.
130
This is particularly useful when calling
131
.Nm
132
from a
133
.Pa .xsession
134
or related script.
135
(Note that on some machines it
136
may be necessary to redirect the input from
137
.Pa /dev/null
138
to make this work.)
139
.It Ev SSH_AUTH_SOCK
140
Identifies the path of a unix-domain socket used to communicate with the
141
agent.
142
.El
143
.Sh FILES
144
.Bl -tag -width Ds
145
.It Pa ~/.ssh/identity
146
Contains the protocol version 1 RSA authentication identity of the user.
147
.It Pa ~/.ssh/id_dsa
148
Contains the protocol version 2 DSA authentication identity of the user.
149
.It Pa ~/.ssh/id_rsa
150
Contains the protocol version 2 RSA authentication identity of the user.
151
.El
152
.Pp
153
Identity files should not be readable by anyone but the user.
154
Note that
155
.Nm
156
ignores identity files if they are accessible by others.
157
.Sh DIAGNOSTICS
158
Exit status is 0 on success, 1 if the specified command fails,
159
and 2 if
160
.Nm
161
is unable to contact the authentication agent.
162
.Sh SEE ALSO
163
.Xr ssh 1 ,
164
.Xr ssh-agent 1 ,
165
.Xr ssh-keygen 1 ,
166
.Xr sshd 8
167
.Sh AUTHORS
168
OpenSSH is a derivative of the original and free
169
ssh 1.2.12 release by Tatu Ylonen.
170
Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos,
171
Theo de Raadt and Dug Song
172
removed many bugs, re-added newer features and
173
created OpenSSH.
174
Markus Friedl contributed the support for SSH
175
protocol versions 1.5 and 2.0.
(-)/home/lb/net/src/openssh-4.3p2/ssh-agent.1.out (+207 lines)
Line 0 Link Here
1
.\" $OpenBSD: ssh-agent.1,v 1.43 2005/11/28 06:02:56 dtucker Exp $
2
.\"
3
.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4
.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5
.\"                    All rights reserved
6
.\"
7
.\" As far as I am concerned, the code I have written for this software
8
.\" can be used freely for any purpose.  Any derived versions of this
9
.\" software must be clearly marked as such, and if the derived work is
10
.\" incompatible with the protocol description in the RFC file, it must be
11
.\" called by a name other than "ssh" or "Secure Shell".
12
.\"
13
.\" Copyright (c) 1999,2000 Markus Friedl.  All rights reserved.
14
.\" Copyright (c) 1999 Aaron Campbell.  All rights reserved.
15
.\" Copyright (c) 1999 Theo de Raadt.  All rights reserved.
16
.\"
17
.\" Redistribution and use in source and binary forms, with or without
18
.\" modification, are permitted provided that the following conditions
19
.\" are met:
20
.\" 1. Redistributions of source code must retain the above copyright
21
.\"    notice, this list of conditions and the following disclaimer.
22
.\" 2. Redistributions in binary form must reproduce the above copyright
23
.\"    notice, this list of conditions and the following disclaimer in the
24
.\"    documentation and/or other materials provided with the distribution.
25
.\"
26
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
27
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
28
.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
29
.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
30
.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
31
.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
32
.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
33
.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36
.\"
37
.Dd September 25, 1999
38
.Dt SSH-AGENT 1
39
.Os
40
.Sh NAME
41
.Nm ssh-agent
42
.Nd authentication agent
43
.Sh SYNOPSIS
44
.Nm ssh-agent
45
.Op Fl a Ar bind_address
46
.Op Fl c Li | Fl s
47
.Op Fl t Ar life
48
.Op Fl d
49
.Op Ar command Op Ar args ...
50
.Nm ssh-agent
51
.Op Fl c Li | Fl s
52
.Fl k
53
.Sh DESCRIPTION
54
.Nm
55
is a program to hold private keys used for public key authentication
56
(RSA, DSA).
57
The idea is that
58
.Nm
59
is started in the beginning of an X-session or a login session, and
60
all other windows or programs are started as clients to the ssh-agent
61
program.
62
Through use of environment variables the agent can be located
63
and automatically used for authentication when logging in to other
64
machines using
65
.Xr ssh 1 .
66
.Pp
67
The options are as follows:
68
.Bl -tag -width Ds
69
.It Fl a Ar bind_address
70
Bind the agent to the unix-domain socket
71
.Ar bind_address .
72
The default is
73
.Pa /tmp/ssh-XXXXXXXXXX/agent.<ppid> .
74
.It Fl c
75
Generate C-shell commands on
76
.Dv stdout .
77
This is the default if
78
.Ev SHELL
79
looks like it's a csh style of shell.
80
.It Fl s
81
Generate Bourne shell commands on
82
.Dv stdout .
83
This is the default if
84
.Ev SHELL
85
does not look like it's a csh style of shell.
86
.It Fl k
87
Kill the current agent (given by the
88
.Ev SSH_AGENT_PID
89
environment variable).
90
.It Fl t Ar life
91
Set a default value for the maximum lifetime of identities added to the agent.
92
The lifetime may be specified in seconds or in a time format specified in
93
.Xr sshd_config 5 .
94
A lifetime specified for an identity with
95
.Xr ssh-add 1
96
overrides this value.
97
Without this option the default maximum lifetime is forever.
98
.It Fl d
99
Debug mode.
100
When this option is specified
101
.Nm
102
will not fork.
103
.El
104
.Pp
105
If a commandline is given, this is executed as a subprocess of the agent.
106
When the command dies, so does the agent.
107
.Pp
108
The agent initially does not have any private keys.
109
Keys are added using
110
.Xr ssh-add 1 .
111
When executed without arguments,
112
.Xr ssh-add 1
113
adds the files
114
.Pa ~/.ssh/id_rsa ,
115
.Pa ~/.ssh/id_dsa
116
and
117
.Pa ~/.ssh/identity .
118
If the identity has a passphrase,
119
.Xr ssh-add 1
120
asks for the passphrase (using a small X11 application if running
121
under X11, or from the terminal if running without X).
122
It then sends the identity to the agent.
123
Several identities can be stored in the
124
agent; the agent can automatically use any of these identities.
125
.Ic ssh-add -l
126
displays the identities currently held by the agent.
127
.Pp
128
The idea is that the agent is run in the user's local PC, laptop, or
129
terminal.
130
Authentication data need not be stored on any other
131
machine, and authentication passphrases never go over the network.
132
However, the connection to the agent is forwarded over SSH
133
remote logins, and the user can thus use the privileges given by the
134
identities anywhere in the network in a secure way.
135
.Pp
136
There are two main ways to get an agent set up:
137
The first is that the agent starts a new subcommand into which some environment
138
variables are exported, eg
139
.Cm ssh-agent xterm & .
140
The second is that the agent prints the needed shell commands (either
141
.Xr sh 1
142
or
143
.Xr csh 1
144
syntax can be generated) which can be evalled in the calling shell, eg
145
.Cm eval `ssh-agent -s`
146
for Bourne-type shells such as
147
.Xr sh 1
148
or
149
.Xr ksh 1
150
and
151
.Cm eval `ssh-agent -c`
152
for
153
.Xr csh 1
154
and derivatives.
155
.Pp
156
Later
157
.Xr ssh 1
158
looks at these variables and uses them to establish a connection to the agent.
159
.Pp
160
The agent will never send a private key over its request channel.
161
Instead, operations that require a private key will be performed
162
by the agent, and the result will be returned to the requester.
163
This way, private keys are not exposed to clients using the agent.
164
.Pp
165
A unix-domain socket is created
166
and the name of this socket is stored in the
167
.Ev SSH_AUTH_SOCK
168
environment
169
variable.
170
The socket is made accessible only to the current user.
171
This method is easily abused by root or another instance of the same
172
user.
173
.Pp
174
The
175
.Ev SSH_AGENT_PID
176
environment variable holds the agent's process ID.
177
.Pp
178
The agent exits automatically when the command given on the command
179
line terminates.
180
.Sh FILES
181
.Bl -tag -width Ds
182
.It Pa ~/.ssh/identity
183
Contains the protocol version 1 RSA authentication identity of the user.
184
.It Pa ~/.ssh/id_dsa
185
Contains the protocol version 2 DSA authentication identity of the user.
186
.It Pa ~/.ssh/id_rsa
187
Contains the protocol version 2 RSA authentication identity of the user.
188
.It Pa /tmp/ssh-XXXXXXXXXX/agent.<ppid>
189
Unix-domain sockets used to contain the connection to the
190
authentication agent.
191
These sockets should only be readable by the owner.
192
The sockets should get automatically removed when the agent exits.
193
.El
194
.Sh SEE ALSO
195
.Xr ssh 1 ,
196
.Xr ssh-add 1 ,
197
.Xr ssh-keygen 1 ,
198
.Xr sshd 8
199
.Sh AUTHORS
200
OpenSSH is a derivative of the original and free
201
ssh 1.2.12 release by Tatu Ylonen.
202
Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos,
203
Theo de Raadt and Dug Song
204
removed many bugs, re-added newer features and
205
created OpenSSH.
206
Markus Friedl contributed the support for SSH
207
protocol versions 1.5 and 2.0.
(-)/home/lb/net/src/openssh-4.3p2/ssh_config.5.out (+1063 lines)
Line 0 Link Here
1
.\"  -*- nroff -*-
2
.\"
3
.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4
.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5
.\"                    All rights reserved
6
.\"
7
.\" As far as I am concerned, the code I have written for this software
8
.\" can be used freely for any purpose.  Any derived versions of this
9
.\" software must be clearly marked as such, and if the derived work is
10
.\" incompatible with the protocol description in the RFC file, it must be
11
.\" called by a name other than "ssh" or "Secure Shell".
12
.\"
13
.\" Copyright (c) 1999,2000 Markus Friedl.  All rights reserved.
14
.\" Copyright (c) 1999 Aaron Campbell.  All rights reserved.
15
.\" Copyright (c) 1999 Theo de Raadt.  All rights reserved.
16
.\"
17
.\" Redistribution and use in source and binary forms, with or without
18
.\" modification, are permitted provided that the following conditions
19
.\" are met:
20
.\" 1. Redistributions of source code must retain the above copyright
21
.\"    notice, this list of conditions and the following disclaimer.
22
.\" 2. Redistributions in binary form must reproduce the above copyright
23
.\"    notice, this list of conditions and the following disclaimer in the
24
.\"    documentation and/or other materials provided with the distribution.
25
.\"
26
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
27
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
28
.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
29
.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
30
.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
31
.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
32
.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
33
.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36
.\"
37
.\" $OpenBSD: ssh_config.5,v 1.76 2006/01/20 11:21:45 jmc Exp $
38
.Dd September 25, 1999
39
.Dt SSH_CONFIG 5
40
.Os
41
.Sh NAME
42
.Nm ssh_config
43
.Nd OpenSSH SSH client configuration files
44
.Sh SYNOPSIS
45
.Bl -tag -width Ds -compact
46
.It Pa ~/.ssh/config
47
.It Pa /usr/etc/ssh_config
48
.El
49
.Sh DESCRIPTION
50
.Nm ssh
51
obtains configuration data from the following sources in
52
the following order:
53
.Bl -enum -offset indent -compact
54
.It
55
command-line options
56
.It
57
user's configuration file
58
.Pq Pa ~/.ssh/config
59
.It
60
system-wide configuration file
61
.Pq Pa /usr/etc/ssh_config
62
.El
63
.Pp
64
For each parameter, the first obtained value
65
will be used.
66
The configuration files contain sections separated by
67
.Dq Host
68
specifications, and that section is only applied for hosts that
69
match one of the patterns given in the specification.
70
The matched host name is the one given on the command line.
71
.Pp
72
Since the first obtained value for each parameter is used, more
73
host-specific declarations should be given near the beginning of the
74
file, and general defaults at the end.
75
.Pp
76
The configuration file has the following format:
77
.Pp
78
Empty lines and lines starting with
79
.Ql #
80
are comments.
81
.Pp
82
Otherwise a line is of the format
83
.Dq keyword arguments .
84
Configuration options may be separated by whitespace or
85
optional whitespace and exactly one
86
.Ql = ;
87
the latter format is useful to avoid the need to quote whitespace
88
when specifying configuration options using the
89
.Nm ssh ,
90
.Nm scp
91
and
92
.Nm sftp
93
.Fl o
94
option.
95
.Pp
96
The possible
97
keywords and their meanings are as follows (note that
98
keywords are case-insensitive and arguments are case-sensitive):
99
.Bl -tag -width Ds
100
.It Cm Host
101
Restricts the following declarations (up to the next
102
.Cm Host
103
keyword) to be only for those hosts that match one of the patterns
104
given after the keyword.
105
.Ql \&*
106
and
107
.Ql \&?
108
can be used as wildcards in the
109
patterns.
110
A single
111
.Ql \&*
112
as a pattern can be used to provide global
113
defaults for all hosts.
114
The host is the
115
.Ar hostname
116
argument given on the command line (i.e., the name is not converted to
117
a canonicalized host name before matching).
118
.It Cm AddressFamily
119
Specifies which address family to use when connecting.
120
Valid arguments are
121
.Dq any ,
122
.Dq inet
123
(use IPv4 only) or
124
.Dq inet6
125
(use IPv6 only).
126
.It Cm BatchMode
127
If set to
128
.Dq yes ,
129
passphrase/password querying will be disabled.
130
In addition, the 
131
.Cm ServerAliveInterval 
132
and
133
.Cm SetupTimeOut
134
options will both be set to 300 seconds by default.
135
This option is useful in scripts and other batch jobs where no user
136
is present to supply the password,
137
and where it is desirable to detect a
138
broken network swiftly.
139
The argument must be
140
.Dq yes
141
or
142
.Dq no .
143
The default is
144
.Dq no .
145
.It Cm BindAddress
146
Use the specified address on the local machine as the source address of
147
the connection.
148
Only useful on systems with more than one address.
149
Note that this option does not work if
150
.Cm UsePrivilegedPort
151
is set to
152
.Dq yes .
153
.It Cm ChallengeResponseAuthentication
154
Specifies whether to use challenge response authentication.
155
The argument to this keyword must be
156
.Dq yes
157
or
158
.Dq no .
159
The default is
160
.Dq yes .
161
.It Cm CheckHostIP
162
If this flag is set to
163
.Dq yes ,
164
ssh will additionally check the host IP address in the
165
.Pa known_hosts
166
file.
167
This allows ssh to detect if a host key changed due to DNS spoofing.
168
If the option is set to
169
.Dq no ,
170
the check will not be executed.
171
The default is
172
.Dq yes .
173
.It Cm Cipher
174
Specifies the cipher to use for encrypting the session
175
in protocol version 1.
176
Currently,
177
.Dq blowfish ,
178
.Dq 3des ,
179
and
180
.Dq des
181
are supported.
182
.Ar des
183
is only supported in the
184
.Nm ssh
185
client for interoperability with legacy protocol 1 implementations
186
that do not support the
187
.Ar 3des
188
cipher.
189
Its use is strongly discouraged due to cryptographic weaknesses.
190
The default is
191
.Dq 3des .
192
.It Cm Ciphers
193
Specifies the ciphers allowed for protocol version 2
194
in order of preference.
195
Multiple ciphers must be comma-separated.
196
The supported ciphers are
197
.Dq 3des-cbc ,
198
.Dq aes128-cbc ,
199
.Dq aes192-cbc ,
200
.Dq aes256-cbc ,
201
.Dq aes128-ctr ,
202
.Dq aes192-ctr ,
203
.Dq aes256-ctr ,
204
.Dq arcfour128 ,
205
.Dq arcfour256 ,
206
.Dq arcfour ,
207
.Dq blowfish-cbc ,
208
and
209
.Dq cast128-cbc .
210
The default is
211
.Bd -literal
212
  ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,
213
    arcfour256,arcfour,aes192-cbc,aes256-cbc,aes128-ctr,
214
    aes192-ctr,aes256-ctr''
215
.Ed
216
.It Cm ClearAllForwardings
217
Specifies that all local, remote and dynamic port forwardings
218
specified in the configuration files or on the command line be
219
cleared.
220
This option is primarily useful when used from the
221
.Nm ssh
222
command line to clear port forwardings set in
223
configuration files, and is automatically set by
224
.Xr scp 1
225
and
226
.Xr sftp 1 .
227
The argument must be
228
.Dq yes
229
or
230
.Dq no .
231
The default is
232
.Dq no .
233
.It Cm Compression
234
Specifies whether to use compression.
235
The argument must be
236
.Dq yes
237
or
238
.Dq no .
239
The default is
240
.Dq no .
241
.It Cm CompressionLevel
242
Specifies the compression level to use if compression is enabled.
243
The argument must be an integer from 1 (fast) to 9 (slow, best).
244
The default level is 6, which is good for most applications.
245
The meaning of the values is the same as in
246
.Xr gzip 1 .
247
Note that this option applies to protocol version 1 only.
248
.It Cm ConnectionAttempts
249
Specifies the number of tries (one per second) to make before exiting.
250
The argument must be an integer.
251
This may be useful in scripts if the connection sometimes fails.
252
The default is 1.
253
.It Cm ConnectTimeout
254
Specifies the timeout (in seconds) used when connecting to the ssh
255
server, instead of using the default system TCP timeout.
256
This value is used only when the target is down or really unreachable,
257
not when it refuses the connection.
258
.It Cm ControlMaster
259
Enables the sharing of multiple sessions over a single network connection.
260
When set to
261
.Dq yes
262
.Nm ssh
263
will listen for connections on a control socket specified using the
264
.Cm ControlPath
265
argument.
266
Additional sessions can connect to this socket using the same
267
.Cm ControlPath
268
with
269
.Cm ControlMaster
270
set to
271
.Dq no
272
(the default).
273
These sessions will try to reuse the master instance's network connection
274
rather than initiating new ones, but will fall back to connecting normally
275
if the control socket does not exist, or is not listening.
276
.Pp
277
Setting this to
278
.Dq ask
279
will cause
280
.Nm ssh
281
to listen for control connections, but require confirmation using the
282
.Ev SSH_ASKPASS
283
program before they are accepted (see
284
.Xr ssh-add 1
285
for details).
286
If the
287
.Cm ControlPath
288
can not be opened,
289
.Nm ssh
290
will continue without connecting to a master instance.
291
.Pp
292
X11 and
293
.Xr ssh-agent 1
294
forwarding is supported over these multiplexed connections, however the
295
display and agent forwarded will be the one belonging to the master
296
connection i.e. it is not possible to forward multiple displays or agents.
297
.Pp
298
Two additional options allow for opportunistic multiplexing: try to use a
299
master connection but fall back to creating a new one if one does not already
300
exist.
301
These options are:
302
.Dq auto
303
and
304
.Dq autoask .
305
The latter requires confirmation like the
306
.Dq ask
307
option.
308
.It Cm ControlPath
309
Specify the path to the control socket used for connection sharing as described
310
in the
311
.Cm ControlMaster
312
section above or the string
313
.Dq none
314
to disable connection sharing.
315
In the path,
316
.Ql %h
317
will be substituted by the target host name,
318
.Ql %p
319
the port and
320
.Ql %r
321
by the remote login username.
322
It is recommended that any
323
.Cm ControlPath
324
used for opportunistic connection sharing include
325
all three of these escape sequences.
326
This ensures that shared connections are uniquely identified.
327
.It Cm DynamicForward
328
Specifies that a TCP port on the local machine be forwarded
329
over the secure channel, and the application
330
protocol is then used to determine where to connect to from the
331
remote machine.
332
.Pp
333
The argument must be
334
.Sm off
335
.Oo Ar bind_address : Oc Ar port .
336
.Sm on
337
IPv6 addresses can be specified by enclosing addresses in square brackets or
338
by using an alternative syntax:
339
.Oo Ar bind_address Ns / Oc Ns Ar port .
340
By default, the local port is bound in accordance with the
341
.Cm GatewayPorts
342
setting.
343
However, an explicit
344
.Ar bind_address
345
may be used to bind the connection to a specific address.
346
The
347
.Ar bind_address
348
of
349
.Dq localhost
350
indicates that the listening port be bound for local use only, while an
351
empty address or
352
.Sq *
353
indicates that the port should be available from all interfaces.
354
.Pp
355
Currently the SOCKS4 and SOCKS5 protocols are supported, and
356
.Nm ssh
357
will act as a SOCKS server.
358
Multiple forwardings may be specified, and
359
additional forwardings can be given on the command line.
360
Only the superuser can forward privileged ports.
361
.It Cm EnableSSHKeysign
362
Setting this option to
363
.Dq yes
364
in the global client configuration file
365
.Pa /usr/etc/ssh_config
366
enables the use of the helper program
367
.Xr ssh-keysign 8
368
during
369
.Cm HostbasedAuthentication .
370
The argument must be
371
.Dq yes
372
or
373
.Dq no .
374
The default is
375
.Dq no .
376
This option should be placed in the non-hostspecific section.
377
See
378
.Xr ssh-keysign 8
379
for more information.
380
.It Cm EscapeChar
381
Sets the escape character (default:
382
.Ql ~ ) .
383
The escape character can also
384
be set on the command line.
385
The argument should be a single character,
386
.Ql ^
387
followed by a letter, or
388
.Dq none
389
to disable the escape
390
character entirely (making the connection transparent for binary
391
data).
392
.It Cm ForwardAgent
393
Specifies whether the connection to the authentication agent (if any)
394
will be forwarded to the remote machine.
395
The argument must be
396
.Dq yes
397
or
398
.Dq no .
399
The default is
400
.Dq no .
401
.Pp
402
Agent forwarding should be enabled with caution.
403
Users with the ability to bypass file permissions on the remote host
404
(for the agent's Unix-domain socket)
405
can access the local agent through the forwarded connection.
406
An attacker cannot obtain key material from the agent,
407
however they can perform operations on the keys that enable them to
408
authenticate using the identities loaded into the agent.
409
.It Cm ForwardX11
410
Specifies whether X11 connections will be automatically redirected
411
over the secure channel and
412
.Ev DISPLAY
413
set.
414
The argument must be
415
.Dq yes
416
or
417
.Dq no .
418
The default is
419
.Dq no .
420
.Pp
421
X11 forwarding should be enabled with caution.
422
Users with the ability to bypass file permissions on the remote host
423
(for the user's X11 authorization database)
424
can access the local X11 display through the forwarded connection.
425
An attacker may then be able to perform activities such as keystroke monitoring
426
if the
427
.Cm ForwardX11Trusted
428
option is also enabled.
429
.It Cm ForwardX11Trusted
430
If this option is set to
431
.Dq yes
432
then remote X11 clients will have full access to the original X11 display.
433
.Pp
434
If this option is set to
435
.Dq no
436
then remote X11 clients will be considered untrusted and prevented
437
from stealing or tampering with data belonging to trusted X11
438
clients.
439
Furthermore, the
440
.Xr xauth 1
441
token used for the session will be set to expire after 20 minutes.
442
Remote clients will be refused access after this time.
443
.Pp
444
The default is
445
.Dq yes
446
(Debian-specific).
447
.Pp
448
See the X11 SECURITY extension specification for full details on
449
the restrictions imposed on untrusted clients.
450
.It Cm GatewayPorts
451
Specifies whether remote hosts are allowed to connect to local
452
forwarded ports.
453
By default,
454
.Nm ssh
455
binds local port forwardings to the loopback address.
456
This prevents other remote hosts from connecting to forwarded ports.
457
.Cm GatewayPorts
458
can be used to specify that
459
.Nm ssh
460
should bind local port forwardings to the wildcard address,
461
thus allowing remote hosts to connect to forwarded ports.
462
The argument must be
463
.Dq yes
464
or
465
.Dq no .
466
The default is
467
.Dq no .
468
.It Cm GlobalKnownHostsFile
469
Specifies a file to use for the global
470
host key database instead of
471
.Pa /usr/etc/ssh_known_hosts .
472
.It Cm GSSAPIAuthentication
473
Specifies whether user authentication based on GSSAPI is allowed.
474
The default is
475
.Dq no .
476
Note that this option applies to protocol version 2 only.
477
.It Cm GSSAPIDelegateCredentials
478
Forward (delegate) credentials to the server.
479
The default is
480
.Dq no .
481
Note that this option applies to protocol version 2 only.
482
.It Cm GSSAPITrustDns
483
Set to 
484
.Dq yes to indicate that the DNS is trusted to securely canonicalize
485
the name of the host being connected to. If 
486
.Dq no, the hostname entered on the
487
command line will be passed untouched to the GSSAPI library.
488
The default is
489
.Dq no .
490
This option only applies to protocol version 2 connections using GSSAPI 
491
key exchange.
492
.It Cm HashKnownHosts
493
Indicates that
494
.Nm ssh
495
should hash host names and addresses when they are added to
496
.Pa ~/.ssh/known_hosts .
497
These hashed names may be used normally by
498
.Nm ssh
499
and
500
.Nm sshd ,
501
but they do not reveal identifying information should the file's contents
502
be disclosed.
503
The default is
504
.Dq no .
505
Note that hashing of names and addresses will not be retrospectively applied
506
to existing known hosts files, but these may be manually hashed using
507
.Xr ssh-keygen 1 .
508
.It Cm HostbasedAuthentication
509
Specifies whether to try rhosts based authentication with public key
510
authentication.
511
The argument must be
512
.Dq yes
513
or
514
.Dq no .
515
The default is
516
.Dq no .
517
This option applies to protocol version 2 only and
518
is similar to
519
.Cm RhostsRSAAuthentication .
520
.It Cm HostKeyAlgorithms
521
Specifies the protocol version 2 host key algorithms
522
that the client wants to use in order of preference.
523
The default for this option is:
524
.Dq ssh-rsa,ssh-dss .
525
.It Cm HostKeyAlias
526
Specifies an alias that should be used instead of the
527
real host name when looking up or saving the host key
528
in the host key database files.
529
This option is useful for tunneling ssh connections
530
or for multiple servers running on a single host.
531
.It Cm HostName
532
Specifies the real host name to log into.
533
This can be used to specify nicknames or abbreviations for hosts.
534
Default is the name given on the command line.
535
Numeric IP addresses are also permitted (both on the command line and in
536
.Cm HostName
537
specifications).
538
.It Cm IdentitiesOnly
539
Specifies that
540
.Nm ssh
541
should only use the authentication identity files configured in the
542
.Nm
543
files,
544
even if the
545
.Nm ssh-agent
546
offers more identities.
547
The argument to this keyword must be
548
.Dq yes
549
or
550
.Dq no .
551
This option is intended for situations where
552
.Nm ssh-agent
553
offers many different identities.
554
The default is
555
.Dq no .
556
.It Cm IdentityFile
557
Specifies a file from which the user's RSA or DSA authentication identity
558
is read.
559
The default is
560
.Pa ~/.ssh/identity
561
for protocol version 1, and
562
.Pa ~/.ssh/id_rsa
563
and
564
.Pa ~/.ssh/id_dsa
565
for protocol version 2.
566
Additionally, any identities represented by the authentication agent
567
will be used for authentication.
568
The file name may use the tilde
569
syntax to refer to a user's home directory.
570
It is possible to have
571
multiple identity files specified in configuration files; all these
572
identities will be tried in sequence.
573
.It Cm KbdInteractiveDevices
574
Specifies the list of methods to use in keyboard-interactive authentication.
575
Multiple method names must be comma-separated.
576
The default is to use the server specified list.
577
.It Cm LocalCommand
578
Specifies a command to execute on the local machine after successfully
579
connecting to the server.
580
The command string extends to the end of the line, and is executed with
581
.Pa /bin/sh .
582
This directive is ignored unless
583
.Cm PermitLocalCommand
584
has been enabled.
585
.It Cm LocalForward
586
Specifies that a TCP port on the local machine be forwarded over
587
the secure channel to the specified host and port from the remote machine.
588
The first argument must be
589
.Sm off
590
.Oo Ar bind_address : Oc Ar port
591
.Sm on
592
and the second argument must be
593
.Ar host : Ns Ar hostport .
594
IPv6 addresses can be specified by enclosing addresses in square brackets or
595
by using an alternative syntax:
596
.Oo Ar bind_address Ns / Oc Ns Ar port
597
and
598
.Ar host Ns / Ns Ar hostport .
599
Multiple forwardings may be specified, and additional forwardings can be
600
given on the command line.
601
Only the superuser can forward privileged ports.
602
By default, the local port is bound in accordance with the
603
.Cm GatewayPorts
604
setting.
605
However, an explicit
606
.Ar bind_address
607
may be used to bind the connection to a specific address.
608
The
609
.Ar bind_address
610
of
611
.Dq localhost
612
indicates that the listening port be bound for local use only, while an
613
empty address or
614
.Sq *
615
indicates that the port should be available from all interfaces.
616
.It Cm LogLevel
617
Gives the verbosity level that is used when logging messages from
618
.Nm ssh .
619
The possible values are:
620
QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3.
621
The default is INFO.
622
DEBUG and DEBUG1 are equivalent.
623
DEBUG2 and DEBUG3 each specify higher levels of verbose output.
624
.It Cm MACs
625
Specifies the MAC (message authentication code) algorithms
626
in order of preference.
627
The MAC algorithm is used in protocol version 2
628
for data integrity protection.
629
Multiple algorithms must be comma-separated.
630
The default is
631
.Dq hmac-md5,hmac-sha1,hmac-ripemd160,hmac-sha1-96,hmac-md5-96 .
632
.It Cm NoHostAuthenticationForLocalhost
633
This option can be used if the home directory is shared across machines.
634
In this case localhost will refer to a different machine on each of
635
the machines and the user will get many warnings about changed host keys.
636
However, this option disables host authentication for localhost.
637
The argument to this keyword must be
638
.Dq yes
639
or
640
.Dq no .
641
The default is to check the host key for localhost.
642
.It Cm NumberOfPasswordPrompts
643
Specifies the number of password prompts before giving up.
644
The argument to this keyword must be an integer.
645
Default is 3.
646
.It Cm PasswordAuthentication
647
Specifies whether to use password authentication.
648
The argument to this keyword must be
649
.Dq yes
650
or
651
.Dq no .
652
The default is
653
.Dq yes .
654
.It Cm PermitLocalCommand
655
Allow local command execution via the
656
.Ic LocalCommand
657
option or using the
658
.Ic !\& Ns Ar command
659
escape sequence in
660
.Xr ssh 1 .
661
The argument must be
662
.Dq yes
663
or
664
.Dq no .
665
The default is
666
.Dq no .
667
.It Cm Port
668
Specifies the port number to connect on the remote host.
669
Default is 22.
670
.It Cm PreferredAuthentications
671
Specifies the order in which the client should try protocol 2
672
authentication methods.
673
This allows a client to prefer one method (e.g.\&
674
.Cm keyboard-interactive )
675
over another method (e.g.\&
676
.Cm password )
677
The default for this option is:
678
.Dq hostbased,publickey,keyboard-interactive,password .
679
.It Cm Protocol
680
Specifies the protocol versions
681
.Nm ssh
682
should support in order of preference.
683
The possible values are
684
.Dq 1
685
and
686
.Dq 2 .
687
Multiple versions must be comma-separated.
688
The default is
689
.Dq 2,1 .
690
This means that
691
.Nm ssh
692
tries version 2 and falls back to version 1
693
if version 2 is not available.
694
.It Cm ProxyCommand
695
Specifies the command to use to connect to the server.
696
The command
697
string extends to the end of the line, and is executed with
698
.Pa /bin/sh .
699
In the command string,
700
.Ql %h
701
will be substituted by the host name to
702
connect and
703
.Ql %p
704
by the port.
705
The command can be basically anything,
706
and should read from its standard input and write to its standard output.
707
It should eventually connect an
708
.Xr sshd 8
709
server running on some machine, or execute
710
.Ic sshd -i
711
somewhere.
712
Host key management will be done using the
713
HostName of the host being connected (defaulting to the name typed by
714
the user).
715
Setting the command to
716
.Dq none
717
disables this option entirely.
718
Note that
719
.Cm CheckHostIP
720
is not available for connects with a proxy command.
721
.Pp
722
This directive is useful in conjunction with
723
.Xr nc 1
724
and its proxy support.
725
For example, the following directive would connect via an HTTP proxy at
726
192.0.2.0:
727
.Bd -literal -offset 3n
728
ProxyCommand /usr/bin/nc -X connect -x 192.0.2.0:8080 %h %p
729
.Ed
730
.It Cm PubkeyAuthentication
731
Specifies whether to try public key authentication.
732
The argument to this keyword must be
733
.Dq yes
734
or
735
.Dq no .
736
The default is
737
.Dq yes .
738
This option applies to protocol version 2 only.
739
.It Cm RekeyLimit
740
Specifies the maximum amount of data that may be transmitted before the
741
session key is renegotiated.
742
The argument is the number of bytes, with an optional suffix of
743
.Sq K ,
744
.Sq M ,
745
or
746
.Sq G
747
to indicate Kilobytes, Megabytes, or Gigabytes, respectively.
748
The default is between
749
.Dq 1G
750
and
751
.Dq 4G ,
752
depending on the cipher.
753
This option applies to protocol version 2 only.
754
.It Cm RemoteForward
755
Specifies that a TCP port on the remote machine be forwarded over
756
the secure channel to the specified host and port from the local machine.
757
The first argument must be
758
.Sm off
759
.Oo Ar bind_address : Oc Ar port
760
.Sm on
761
and the second argument must be
762
.Ar host : Ns Ar hostport .
763
IPv6 addresses can be specified by enclosing addresses in square brackets
764
or by using an alternative syntax:
765
.Oo Ar bind_address Ns / Oc Ns Ar port
766
and
767
.Ar host Ns / Ns Ar hostport .
768
Multiple forwardings may be specified, and additional
769
forwardings can be given on the command line.
770
Only the superuser can forward privileged ports.
771
.Pp
772
If the
773
.Ar bind_address
774
is not specified, the default is to only bind to loopback addresses.
775
If the
776
.Ar bind_address
777
is
778
.Ql *
779
or an empty string, then the forwarding is requested to listen on all
780
interfaces.
781
Specifying a remote
782
.Ar bind_address
783
will only succeed if the server's
784
.Cm GatewayPorts
785
option is enabled (see
786
.Xr sshd_config 5 ) .
787
.It Cm RhostsRSAAuthentication
788
Specifies whether to try rhosts based authentication with RSA host
789
authentication.
790
The argument must be
791
.Dq yes
792
or
793
.Dq no .
794
The default is
795
.Dq no .
796
This option applies to protocol version 1 only and requires
797
.Nm ssh
798
to be setuid root.
799
.It Cm RSAAuthentication
800
Specifies whether to try RSA authentication.
801
The argument to this keyword must be
802
.Dq yes
803
or
804
.Dq no .
805
RSA authentication will only be
806
attempted if the identity file exists, or an authentication agent is
807
running.
808
The default is
809
.Dq yes .
810
Note that this option applies to protocol version 1 only.
811
.It Cm SendEnv
812
Specifies what variables from the local
813
.Xr environ 7
814
should be sent to the server.
815
Note that environment passing is only supported for protocol 2, the
816
server must also support it, and the server must be configured to
817
accept these environment variables.
818
Refer to
819
.Cm AcceptEnv
820
in
821
.Xr sshd_config 5
822
for how to configure the server.
823
Variables are specified by name, which may contain the wildcard characters
824
.Ql \&*
825
and
826
.Ql \&? .
827
Multiple environment variables may be separated by whitespace or spread
828
across multiple
829
.Cm SendEnv
830
directives.
831
The default is not to send any environment variables.
832
.It Cm ServerAliveCountMax
833
Sets the number of server alive messages (see below) which may be
834
sent without
835
.Nm ssh
836
receiving any messages back from the server.
837
If this threshold is reached while server alive messages are being sent,
838
.Nm ssh
839
will disconnect from the server, terminating the session.
840
It is important to note that the use of server alive messages is very
841
different from
842
.Cm TCPKeepAlive
843
(below).
844
The server alive messages are sent through the encrypted channel
845
and therefore will not be spoofable.
846
The TCP keepalive option enabled by
847
.Cm TCPKeepAlive
848
is spoofable.
849
The server alive mechanism is valuable when the client or
850
server depend on knowing when a connection has become inactive.
851
.Pp
852
The default value is 3.
853
If, for example,
854
.Cm ServerAliveInterval
855
(see below) is set to 15, and
856
.Cm ServerAliveCountMax
857
is left at the default, if the server becomes unresponsive ssh
858
will disconnect after approximately 45 seconds.
859
This option works when using protocol version 2 only; in protocol version
860
1 there is no mechanism to request a response from the server to the
861
server alive messages, so disconnection is the responsibility of the TCP
862
stack.
863
.It Cm ServerAliveInterval
864
Sets a timeout interval in seconds after which if no data has been received
865
from the server,
866
.Nm ssh
867
will send a message through the encrypted
868
channel to request a response from the server.
869
The default
870
is 0, indicating that these messages will not be sent to the server,
871
or 300 if the
872
.Cm BatchMode
873
option is set.
874
This option applies to protocol version 2 only.
875
.Cm ProtocolKeepAlives
876
is a Debian-specific compatibility alias for this option.
877
.It Cm SetupTimeOut
878
Normally,
879
.Nm ssh
880
blocks indefinitely whilst waiting to receive the ssh banner and other
881
setup protocol from the server, during the session setup.
882
This can cause
883
.Nm ssh
884
to hang under certain circumstances.
885
If this option is set,
886
.Nm ssh
887
will give up if no data from the server is received for the specified
888
number of seconds.
889
The argument must be an integer.
890
The default is 0 (disabled), or 300 if
891
.Cm BatchMode
892
is set.
893
This is a Debian-specific option.
894
.It Cm SmartcardDevice
895
Specifies which smartcard device to use.
896
The argument to this keyword is the device
897
.Nm ssh
898
should use to communicate with a smartcard used for storing the user's
899
private RSA key.
900
By default, no device is specified and smartcard support is not activated.
901
.It Cm StrictHostKeyChecking
902
If this flag is set to
903
.Dq yes ,
904
.Nm ssh
905
will never automatically add host keys to the
906
.Pa ~/.ssh/known_hosts
907
file, and refuses to connect to hosts whose host key has changed.
908
This provides maximum protection against trojan horse attacks,
909
however, can be annoying when the
910
.Pa /usr/etc/ssh_known_hosts
911
file is poorly maintained, or connections to new hosts are
912
frequently made.
913
This option forces the user to manually
914
add all new hosts.
915
If this flag is set to
916
.Dq no ,
917
.Nm ssh
918
will automatically add new host keys to the
919
user known hosts files.
920
If this flag is set to
921
.Dq ask ,
922
new host keys
923
will be added to the user known host files only after the user
924
has confirmed that is what they really want to do, and
925
.Nm ssh
926
will refuse to connect to hosts whose host key has changed.
927
The host keys of
928
known hosts will be verified automatically in all cases.
929
The argument must be
930
.Dq yes ,
931
.Dq no
932
or
933
.Dq ask .
934
The default is
935
.Dq ask .
936
.It Cm TCPKeepAlive
937
Specifies whether the system should send TCP keepalive messages to the
938
other side.
939
If they are sent, death of the connection or crash of one
940
of the machines will be properly noticed.
941
This option only uses TCP keepalives (as opposed to using ssh level
942
keepalives), so takes a long time to notice when the connection dies.
943
As such, you probably want
944
the
945
.Cm ServerAliveInterval
946
option as well.
947
However, this means that
948
connections will die if the route is down temporarily, and some people
949
find it annoying.
950
.Pp
951
The default is
952
.Dq yes
953
(to send TCP keepalive messages), and the client will notice
954
if the network goes down or the remote host dies.
955
This is important in scripts, and many users want it too.
956
.Pp
957
To disable TCP keepalive messages, the value should be set to
958
.Dq no .
959
.It Cm Tunnel
960
Request starting
961
.Xr tun 4
962
device forwarding between the client and the server.
963
This option also allows requesting layer 2 (ethernet)
964
instead of layer 3 (point-to-point) tunneling from the server.
965
The argument must be
966
.Dq yes ,
967
.Dq point-to-point ,
968
.Dq ethernet
969
or
970
.Dq no .
971
The default is
972
.Dq no .
973
.It Cm TunnelDevice
974
Force a specified
975
.Xr tun 4
976
device on the client.
977
Without this option, the next available device will be used.
978
.It Cm UsePrivilegedPort
979
Specifies whether to use a privileged port for outgoing connections.
980
The argument must be
981
.Dq yes
982
or
983
.Dq no .
984
The default is
985
.Dq no .
986
If set to
987
.Dq yes
988
.Nm ssh
989
must be setuid root.
990
Note that this option must be set to
991
.Dq yes
992
for
993
.Cm RhostsRSAAuthentication
994
with older servers.
995
.It Cm User
996
Specifies the user to log in as.
997
This can be useful when a different user name is used on different machines.
998
This saves the trouble of
999
having to remember to give the user name on the command line.
1000
.It Cm UserKnownHostsFile
1001
Specifies a file to use for the user
1002
host key database instead of
1003
.Pa ~/.ssh/known_hosts .
1004
.It Cm VerifyHostKeyDNS
1005
Specifies whether to verify the remote key using DNS and SSHFP resource
1006
records.
1007
If this option is set to
1008
.Dq yes ,
1009
the client will implicitly trust keys that match a secure fingerprint
1010
from DNS.
1011
Insecure fingerprints will be handled as if this option was set to
1012
.Dq ask .
1013
If this option is set to
1014
.Dq ask ,
1015
information on fingerprint match will be displayed, but the user will still
1016
need to confirm new host keys according to the
1017
.Cm StrictHostKeyChecking
1018
option.
1019
The argument must be
1020
.Dq yes ,
1021
.Dq no
1022
or
1023
.Dq ask .
1024
The default is
1025
.Dq no .
1026
Note that this option applies to protocol version 2 only.
1027
.It Cm XAuthLocation
1028
Specifies the full pathname of the
1029
.Xr xauth 1
1030
program.
1031
The default is
1032
.Pa /usr/bin/xauth .
1033
.El
1034
.Sh FILES
1035
.Bl -tag -width Ds
1036
.It Pa ~/.ssh/config
1037
This is the per-user configuration file.
1038
The format of this file is described above.
1039
This file is used by the
1040
.Nm ssh
1041
client.
1042
Because of the potential for abuse, this file must have strict permissions:
1043
read/write for the user, and not accessible by others.
1044
It may be group-writable provided that the group in question contains only
1045
the user.
1046
.It Pa /usr/etc/ssh_config
1047
Systemwide configuration file.
1048
This file provides defaults for those
1049
values that are not specified in the user's configuration file, and
1050
for those users who do not have a configuration file.
1051
This file must be world-readable.
1052
.El
1053
.Sh SEE ALSO
1054
.Xr ssh 1
1055
.Sh AUTHORS
1056
OpenSSH is a derivative of the original and free
1057
ssh 1.2.12 release by Tatu Ylonen.
1058
Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos,
1059
Theo de Raadt and Dug Song
1060
removed many bugs, re-added newer features and
1061
created OpenSSH.
1062
Markus Friedl contributed the support for SSH
1063
protocol versions 1.5 and 2.0.
(-)/home/lb/net/src/openssh-4.3p2/ssh_config.out (+47 lines)
Line 0 Link Here
1
#	$OpenBSD: ssh_config,v 1.21 2005/12/06 22:38:27 reyk Exp $
2
3
# This is the ssh client system-wide configuration file.  See
4
# ssh_config(5) for more information.  This file provides defaults for
5
# users, and the values can be changed in per-user configuration files
6
# or on the command line.
7
8
# Configuration data is parsed as follows:
9
#  1. command line options
10
#  2. user-specific file
11
#  3. system-wide file
12
# Any configuration value is only changed the first time it is set.
13
# Thus, host-specific definitions should be at the beginning of the
14
# configuration file, and defaults at the end.
15
16
# Site-wide defaults for some commonly used options.  For a comprehensive
17
# list of available options, their meanings and defaults, please see the
18
# ssh_config(5) man page.
19
20
Host *
21
#   ForwardAgent no
22
#   ForwardX11 no
23
#   ForwardX11Trusted yes
24
#   RhostsRSAAuthentication no
25
#   RSAAuthentication yes
26
#   PasswordAuthentication yes
27
#   HostbasedAuthentication no
28
#   BatchMode no
29
#   CheckHostIP yes
30
#   AddressFamily any
31
#   ConnectTimeout 0
32
#   StrictHostKeyChecking ask
33
#   IdentityFile ~/.ssh/identity
34
#   IdentityFile ~/.ssh/id_rsa
35
#   IdentityFile ~/.ssh/id_dsa
36
#   Port 22
37
#   Protocol 2,1
38
#   Cipher 3des
39
#   Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
40
#   EscapeChar ~
41
#   Tunnel no
42
#   TunnelDevice any:any
43
#   PermitLocalCommand no
44
    SendEnv LANG LC_*
45
    HashKnownHosts yes
46
    GSSAPIAuthentication yes
47
    GSSAPIDelegateCredentials no
(-)/home/lb/net/src/openssh-4.3p2/sshd.8.out (+872 lines)
Line 0 Link Here
1
.\"  -*- nroff -*-
2
.\"
3
.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4
.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5
.\"                    All rights reserved
6
.\"
7
.\" As far as I am concerned, the code I have written for this software
8
.\" can be used freely for any purpose.  Any derived versions of this
9
.\" software must be clearly marked as such, and if the derived work is
10
.\" incompatible with the protocol description in the RFC file, it must be
11
.\" called by a name other than "ssh" or "Secure Shell".
12
.\"
13
.\" Copyright (c) 1999,2000 Markus Friedl.  All rights reserved.
14
.\" Copyright (c) 1999 Aaron Campbell.  All rights reserved.
15
.\" Copyright (c) 1999 Theo de Raadt.  All rights reserved.
16
.\"
17
.\" Redistribution and use in source and binary forms, with or without
18
.\" modification, are permitted provided that the following conditions
19
.\" are met:
20
.\" 1. Redistributions of source code must retain the above copyright
21
.\"    notice, this list of conditions and the following disclaimer.
22
.\" 2. Redistributions in binary form must reproduce the above copyright
23
.\"    notice, this list of conditions and the following disclaimer in the
24
.\"    documentation and/or other materials provided with the distribution.
25
.\"
26
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
27
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
28
.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
29
.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
30
.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
31
.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
32
.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
33
.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36
.\"
37
.\" $OpenBSD: sshd.8,v 1.215 2006/02/01 09:11:41 jmc Exp $
38
.Dd September 25, 1999
39
.Dt SSHD 8
40
.Os
41
.Sh NAME
42
.Nm sshd
43
.Nd OpenSSH SSH daemon
44
.Sh SYNOPSIS
45
.Nm sshd
46
.Bk -words
47
.Op Fl 46Ddeiqt
48
.Op Fl b Ar bits
49
.Op Fl f Ar config_file
50
.Op Fl g Ar login_grace_time
51
.Op Fl h Ar host_key_file
52
.Op Fl k Ar key_gen_time
53
.Op Fl o Ar option
54
.Op Fl p Ar port
55
.Op Fl u Ar len
56
.Ek
57
.Sh DESCRIPTION
58
.Nm
59
(OpenSSH Daemon) is the daemon program for
60
.Xr ssh 1 .
61
Together these programs replace rlogin and rsh, and
62
provide secure encrypted communications between two untrusted hosts
63
over an insecure network.
64
.Pp
65
.Nm
66
listens for connections from clients.
67
It is normally started at boot from
68
.Pa /etc/rc .
69
It forks a new
70
daemon for each incoming connection.
71
The forked daemons handle
72
key exchange, encryption, authentication, command execution,
73
and data exchange.
74
.Pp
75
.Nm
76
can be configured using command-line options or a configuration file
77
(by default
78
.Xr sshd_config 5 ) ;
79
command-line options override values specified in the
80
configuration file.
81
.Nm
82
rereads its configuration file when it receives a hangup signal,
83
.Dv SIGHUP ,
84
by executing itself with the name and options it was started with, e.g.,
85
.Pa /usr/sbin/sshd .
86
.Pp
87
The options are as follows:
88
.Bl -tag -width Ds
89
.It Fl 4
90
Forces
91
.Nm
92
to use IPv4 addresses only.
93
.It Fl 6
94
Forces
95
.Nm
96
to use IPv6 addresses only.
97
.It Fl b Ar bits
98
Specifies the number of bits in the ephemeral protocol version 1
99
server key (default 768).
100
.It Fl D
101
When this option is specified,
102
.Nm
103
will not detach and does not become a daemon.
104
This allows easy monitoring of
105
.Nm sshd .
106
.It Fl d
107
Debug mode.
108
The server sends verbose debug output to the system
109
log, and does not put itself in the background.
110
The server also will not fork and will only process one connection.
111
This option is only intended for debugging for the server.
112
Multiple
113
.Fl d
114
options increase the debugging level.
115
Maximum is 3.
116
.It Fl e
117
When this option is specified,
118
.Nm
119
will send the output to the standard error instead of the system log.
120
.It Fl f Ar configuration_file
121
Specifies the name of the configuration file.
122
The default is
123
.Pa /usr/etc/sshd_config .
124
.Nm
125
refuses to start if there is no configuration file.
126
.It Fl g Ar login_grace_time
127
Gives the grace time for clients to authenticate themselves (default
128
120 seconds).
129
If the client fails to authenticate the user within
130
this many seconds, the server disconnects and exits.
131
A value of zero indicates no limit.
132
.It Fl h Ar host_key_file
133
Specifies a file from which a host key is read.
134
This option must be given if
135
.Nm
136
is not run as root (as the normal
137
host key files are normally not readable by anyone but root).
138
The default is
139
.Pa /usr/etc/ssh_host_key
140
for protocol version 1, and
141
.Pa /usr/etc/ssh_host_rsa_key
142
and
143
.Pa /usr/etc/ssh_host_dsa_key
144
for protocol version 2.
145
It is possible to have multiple host key files for
146
the different protocol versions and host key algorithms.
147
.It Fl i
148
Specifies that
149
.Nm
150
is being run from
151
.Xr inetd 8 .
152
.Nm
153
is normally not run
154
from inetd because it needs to generate the server key before it can
155
respond to the client, and this may take tens of seconds.
156
Clients would have to wait too long if the key was regenerated every time.
157
However, with small key sizes (e.g., 512) using
158
.Nm
159
from inetd may
160
be feasible.
161
.It Fl k Ar key_gen_time
162
Specifies how often the ephemeral protocol version 1 server key is
163
regenerated (default 3600 seconds, or one hour).
164
The motivation for regenerating the key fairly
165
often is that the key is not stored anywhere, and after about an hour
166
it becomes impossible to recover the key for decrypting intercepted
167
communications even if the machine is cracked into or physically
168
seized.
169
A value of zero indicates that the key will never be regenerated.
170
.It Fl o Ar option
171
Can be used to give options in the format used in the configuration file.
172
This is useful for specifying options for which there is no separate
173
command-line flag.
174
For full details of the options, and their values, see
175
.Xr sshd_config 5 .
176
.It Fl p Ar port
177
Specifies the port on which the server listens for connections
178
(default 22).
179
Multiple port options are permitted.
180
Ports specified in the configuration file with the
181
.Cm Port
182
option are ignored when a command-line port is specified.
183
Ports specified using the
184
.Cm ListenAddress
185
option override command-line ports.
186
.It Fl q
187
Quiet mode.
188
Only fatal errors are sent to the system log.
189
Normally the beginning,
190
authentication, and termination of each connection is logged.
191
If a second 
192
.Fl q
193
is given then nothing is sent to the system log.
194
.It Fl t
195
Test mode.
196
Only check the validity of the configuration file and sanity of the keys.
197
This is useful for updating
198
.Nm
199
reliably as configuration options may change.
200
.It Fl u Ar len
201
This option is used to specify the size of the field
202
in the
203
.Li utmp
204
structure that holds the remote host name.
205
If the resolved host name is longer than
206
.Ar len ,
207
the dotted decimal value will be used instead.
208
This allows hosts with very long host names that
209
overflow this field to still be uniquely identified.
210
Specifying
211
.Fl u0
212
indicates that only dotted decimal addresses
213
should be put into the
214
.Pa utmp
215
file.
216
.Fl u0
217
may also be used to prevent
218
.Nm
219
from making DNS requests unless the authentication
220
mechanism or configuration requires it.
221
Authentication mechanisms that may require DNS include
222
.Cm RhostsRSAAuthentication ,
223
.Cm HostbasedAuthentication ,
224
and using a
225
.Cm from="pattern-list"
226
option in a key file.
227
Configuration options that require DNS include using a
228
USER@HOST pattern in
229
.Cm AllowUsers
230
or
231
.Cm DenyUsers .
232
.El
233
.Sh AUTHENTICATION
234
The OpenSSH SSH daemon supports SSH protocols 1 and 2.
235
Both protocols are supported by default,
236
though this can be changed via the
237
.Cm Protocol
238
option in
239
.Xr sshd_config 5 .
240
Protocol 2 supports both RSA and DSA keys;
241
protocol 1 only supports RSA keys.
242
For both protocols,
243
each host has a host-specific key,
244
normally 2048 bits,
245
used to identify the host.
246
.Pp
247
Forward security for protocol 1 is provided through
248
an additional server key,
249
normally 768 bits,
250
generated when the server starts.
251
This key is normally regenerated every hour if it has been used, and
252
is never stored on disk.
253
Whenever a client connects, the daemon responds with its public
254
host and server keys.
255
The client compares the
256
RSA host key against its own database to verify that it has not changed.
257
The client then generates a 256-bit random number.
258
It encrypts this
259
random number using both the host key and the server key, and sends
260
the encrypted number to the server.
261
Both sides then use this
262
random number as a session key which is used to encrypt all further
263
communications in the session.
264
The rest of the session is encrypted
265
using a conventional cipher, currently Blowfish or 3DES, with 3DES
266
being used by default.
267
The client selects the encryption algorithm
268
to use from those offered by the server.
269
.Pp
270
For protocol 2,
271
forward security is provided through a Diffie-Hellman key agreement.
272
This key agreement results in a shared session key.
273
The rest of the session is encrypted using a symmetric cipher, currently
274
128-bit AES, Blowfish, 3DES, CAST128, Arcfour, 192-bit AES, or 256-bit AES.
275
The client selects the encryption algorithm
276
to use from those offered by the server.
277
Additionally, session integrity is provided
278
through a cryptographic message authentication code
279
(hmac-sha1 or hmac-md5).
280
.Pp
281
Finally, the server and the client enter an authentication dialog.
282
The client tries to authenticate itself using
283
host-based authentication,
284
public key authentication,
285
challenge-response authentication,
286
or password authentication.
287
.Pp
288
Regardless of the authentication type, the account is checked to
289
ensure that it is accessible.  An account is not accessible if it is
290
locked, listed in
291
.Cm DenyUsers
292
or its group is listed in
293
.Cm DenyGroups
294
\&.  The definition of a locked account is system dependant. Some platforms
295
have their own account database (eg AIX) and some modify the passwd field (
296
.Ql \&*LK\&*
297
on Solaris and UnixWare,
298
.Ql \&*
299
on HP-UX, containing
300
.Ql Nologin
301
on Tru64,
302
a leading
303
.Ql \&*LOCKED\&*
304
on FreeBSD and a leading
305
.Ql \&!!
306
on Linux).  If there is a requirement to disable password authentication
307
for the account while allowing still public-key, then the passwd field
308
should be set to something other than these values (eg
309
.Ql NP
310
or
311
.Ql \&*NP\&*
312
).
313
.Pp
314
System security is not improved unless
315
.Nm rshd ,
316
.Nm rlogind ,
317
and
318
.Nm rexecd
319
are disabled (thus completely disabling
320
.Xr rlogin
321
and
322
.Xr rsh
323
into the machine).
324
.Sh COMMAND EXECUTION AND DATA FORWARDING
325
If the client successfully authenticates itself, a dialog for
326
preparing the session is entered.
327
At this time the client may request
328
things like allocating a pseudo-tty, forwarding X11 connections,
329
forwarding TCP connections, or forwarding the authentication agent
330
connection over the secure channel.
331
.Pp
332
Finally, the client either requests a shell or execution of a command.
333
The sides then enter session mode.
334
In this mode, either side may send
335
data at any time, and such data is forwarded to/from the shell or
336
command on the server side, and the user terminal in the client side.
337
.Pp
338
When the user program terminates and all forwarded X11 and other
339
connections have been closed, the server sends command exit status to
340
the client, and both sides exit.
341
.Sh LOGIN PROCESS
342
When a user successfully logs in,
343
.Nm
344
does the following:
345
.Bl -enum -offset indent
346
.It
347
If the login is on a tty, and no command has been specified,
348
prints last login time and
349
.Pa /etc/motd
350
(unless prevented in the configuration file or by
351
.Pa ~/.hushlogin ;
352
see the
353
.Sx FILES
354
section).
355
.It
356
If the login is on a tty, records login time.
357
.It
358
Checks
359
.Pa /etc/nologin ;
360
if it exists, prints contents and quits
361
(unless root).
362
.It
363
Changes to run with normal user privileges.
364
.It
365
Sets up basic environment.
366
.It
367
Reads the file
368
.Pa ~/.ssh/environment ,
369
if it exists, and users are allowed to change their environment.
370
See the
371
.Cm PermitUserEnvironment
372
option in
373
.Xr sshd_config 5 .
374
.It
375
Changes to user's home directory.
376
.It
377
If
378
.Pa ~/.ssh/rc
379
exists, runs it; else if
380
.Pa /etc/ssh/sshrc
381
exists, runs
382
it; otherwise runs xauth.
383
The
384
.Dq rc
385
files are given the X11
386
authentication protocol and cookie in standard input.
387
.It
388
Runs user's shell or command.
389
.El
390
.Sh AUTHORIZED_KEYS FILE FORMAT
391
.Pa ~/.ssh/authorized_keys
392
is the default file that lists the public keys that are
393
permitted for RSA authentication in protocol version 1
394
and for public key authentication (PubkeyAuthentication)
395
in protocol version 2.
396
.Cm AuthorizedKeysFile
397
may be used to specify an alternative file.
398
.Pp
399
Each line of the file contains one
400
key (empty lines and lines starting with a
401
.Ql #
402
are ignored as
403
comments).
404
Each RSA public key consists of the following fields, separated by
405
spaces: options, bits, exponent, modulus, comment.
406
Each protocol version 2 public key consists of:
407
options, keytype, base64 encoded key, comment.
408
The options field
409
is optional; its presence is determined by whether the line starts
410
with a number or not (the options field never starts with a number).
411
The bits, exponent, modulus and comment fields give the RSA key for
412
protocol version 1; the
413
comment field is not used for anything (but may be convenient for the
414
user to identify the key).
415
For protocol version 2 the keytype is
416
.Dq ssh-dss
417
or
418
.Dq ssh-rsa .
419
.Pp
420
Note that lines in this file are usually several hundred bytes long
421
(because of the size of the public key encoding) up to a limit of
422
8 kilobytes, which permits DSA keys up to 8 kilobits and RSA
423
keys up to 16 kilobits.
424
You don't want to type them in; instead, copy the
425
.Pa identity.pub ,
426
.Pa id_dsa.pub
427
or the
428
.Pa id_rsa.pub
429
file and edit it.
430
.Pp
431
.Nm
432
enforces a minimum RSA key modulus size for protocol 1
433
and protocol 2 keys of 768 bits.
434
.Pp
435
The options (if present) consist of comma-separated option
436
specifications.
437
No spaces are permitted, except within double quotes.
438
The following option specifications are supported (note
439
that option keywords are case-insensitive):
440
.Bl -tag -width Ds
441
.It Cm from="pattern-list"
442
Specifies that in addition to public key authentication, the canonical name
443
of the remote host must be present in the comma-separated list of
444
patterns
445
.Pf ( Ql \&*
446
and
447
.Ql \&?
448
serve as wildcards).
449
The list may also contain
450
patterns negated by prefixing them with
451
.Ql \&! ;
452
if the canonical host name matches a negated pattern, the key is not accepted.
453
The purpose
454
of this option is to optionally increase security: public key authentication
455
by itself does not trust the network or name servers or anything (but
456
the key); however, if somebody somehow steals the key, the key
457
permits an intruder to log in from anywhere in the world.
458
This additional option makes using a stolen key more difficult (name
459
servers and/or routers would have to be compromised in addition to
460
just the key).
461
.It Cm command="command"
462
Specifies that the command is executed whenever this key is used for
463
authentication.
464
The command supplied by the user (if any) is ignored.
465
The command is run on a pty if the client requests a pty;
466
otherwise it is run without a tty.
467
If an 8-bit clean channel is required,
468
one must not request a pty or should specify
469
.Cm no-pty .
470
A quote may be included in the command by quoting it with a backslash.
471
This option might be useful
472
to restrict certain public keys to perform just a specific operation.
473
An example might be a key that permits remote backups but nothing else.
474
Note that the client may specify TCP and/or X11
475
forwarding unless they are explicitly prohibited.
476
Note that this option applies to shell, command or subsystem execution.
477
.It Cm environment="NAME=value"
478
Specifies that the string is to be added to the environment when
479
logging in using this key.
480
Environment variables set this way
481
override other default environment values.
482
Multiple options of this type are permitted.
483
Environment processing is disabled by default and is
484
controlled via the
485
.Cm PermitUserEnvironment
486
option.
487
This option is automatically disabled if
488
.Cm UseLogin
489
is enabled.
490
.It Cm no-port-forwarding
491
Forbids TCP forwarding when this key is used for authentication.
492
Any port forward requests by the client will return an error.
493
This might be used, e.g., in connection with the
494
.Cm command
495
option.
496
.It Cm no-X11-forwarding
497
Forbids X11 forwarding when this key is used for authentication.
498
Any X11 forward requests by the client will return an error.
499
.It Cm no-agent-forwarding
500
Forbids authentication agent forwarding when this key is used for
501
authentication.
502
.It Cm no-pty
503
Prevents tty allocation (a request to allocate a pty will fail).
504
.It Cm permitopen="host:port"
505
Limit local
506
.Li ``ssh -L''
507
port forwarding such that it may only connect to the specified host and
508
port.
509
IPv6 addresses can be specified with an alternative syntax:
510
.Ar host Ns / Ns Ar port .
511
Multiple
512
.Cm permitopen
513
options may be applied separated by commas.
514
No pattern matching is performed on the specified hostnames,
515
they must be literal domains or addresses.
516
.It Cm tunnel="n"
517
Force a
518
.Xr tun 4
519
device on the server.
520
Without this option, the next available device will be used if
521
the client requests a tunnel.
522
.El
523
.Ss Examples
524
1024 33 12121...312314325 ylo@foo.bar
525
.Pp
526
from="*.niksula.hut.fi,!pc.niksula.hut.fi" 1024 35 23...2334 ylo@niksula
527
.Pp
528
command="dump /home",no-pty,no-port-forwarding 1024 33 23...2323 backup.hut.fi
529
.Pp
530
permitopen="10.2.1.55:80",permitopen="10.2.1.56:25" 1024 33 23...2323
531
.Pp
532
tunnel="0",command="sh /etc/netstart tun0" ssh-rsa AAAA...== reyk@openbsd.org
533
.Sh SSH_KNOWN_HOSTS FILE FORMAT
534
The
535
.Pa /usr/etc/ssh_known_hosts
536
and
537
.Pa ~/.ssh/known_hosts
538
files contain host public keys for all known hosts.
539
The global file should
540
be prepared by the administrator (optional), and the per-user file is
541
maintained automatically: whenever the user connects from an unknown host
542
its key is added to the per-user file.
543
.Pp
544
Each line in these files contains the following fields: hostnames,
545
bits, exponent, modulus, comment.
546
The fields are separated by spaces.
547
.Pp
548
Hostnames is a comma-separated list of patterns
549
.Pf ( Ql \&*
550
and
551
.Ql \&?
552
act as
553
wildcards); each pattern in turn is matched against the canonical host
554
name (when authenticating a client) or against the user-supplied
555
name (when authenticating a server).
556
A pattern may also be preceded by
557
.Ql \&!
558
to indicate negation: if the host name matches a negated
559
pattern, it is not accepted (by that line) even if it matched another
560
pattern on the line.
561
.Pp
562
Alternately, hostnames may be stored in a hashed form which hides host names
563
and addresses should the file's contents be disclosed.
564
Hashed hostnames start with a
565
.Ql |
566
character.
567
Only one hashed hostname may appear on a single line and none of the above
568
negation or wildcard operators may be applied.
569
.Pp
570
Bits, exponent, and modulus are taken directly from the RSA host key; they
571
can be obtained, e.g., from
572
.Pa /usr/etc/ssh_host_key.pub .
573
The optional comment field continues to the end of the line, and is not used.
574
.Pp
575
Lines starting with
576
.Ql #
577
and empty lines are ignored as comments.
578
.Pp
579
When performing host authentication, authentication is accepted if any
580
matching line has the proper key.
581
It is thus permissible (but not
582
recommended) to have several lines or different host keys for the same
583
names.
584
This will inevitably happen when short forms of host names
585
from different domains are put in the file.
586
It is possible
587
that the files contain conflicting information; authentication is
588
accepted if valid information can be found from either file.
589
.Pp
590
Note that the lines in these files are typically hundreds of characters
591
long, and you definitely don't want to type in the host keys by hand.
592
Rather, generate them by a script
593
or by taking
594
.Pa /usr/etc/ssh_host_key.pub
595
and adding the host names at the front.
596
.Ss Examples
597
.Bd -literal
598
closenet,...,130.233.208.41 1024 37 159...93 closenet.hut.fi
599
cvs.openbsd.org,199.185.137.3 ssh-rsa AAAA1234.....=
600
.Ed
601
.Bd -literal
602
# A hashed hostname
603
|1|JfKTdBh7rNbXkVAQCRp4OQoPfmI=|USECr3SWf1JUPsms5AqfD5QfxkM= ssh-rsa
604
AAAA1234.....=
605
.Ed
606
.Sh FILES
607
.Bl -tag -width Ds
608
.It Pa /usr/etc/sshd_config
609
Contains configuration data for
610
.Nm sshd .
611
The file format and configuration options are described in
612
.Xr sshd_config 5 .
613
.It Pa /usr/etc/ssh_host_key, /usr/etc/ssh_host_dsa_key, /usr/etc/ssh_host_rsa_key
614
These three files contain the private parts of the host keys.
615
These files should only be owned by root, readable only by root, and not
616
accessible to others.
617
Note that
618
.Nm
619
does not start if this file is group/world-accessible.
620
.It Pa /usr/etc/ssh_host_key.pub, /usr/etc/ssh_host_dsa_key.pub, /usr/etc/ssh_host_rsa_key.pub
621
These three files contain the public parts of the host keys.
622
These files should be world-readable but writable only by
623
root.
624
Their contents should match the respective private parts.
625
These files are not
626
really used for anything; they are provided for the convenience of
627
the user so their contents can be copied to known hosts files.
628
These files are created using
629
.Xr ssh-keygen 1 .
630
.It Pa /usr/etc/moduli
631
Contains Diffie-Hellman groups used for the "Diffie-Hellman Group Exchange".
632
The file format is described in
633
.Xr moduli 5 .
634
.It Pa /var/empty
635
.Xr chroot 2
636
directory used by
637
.Nm
638
during privilege separation in the pre-authentication phase.
639
The directory should not contain any files and must be owned by root
640
and not group or world-writable.
641
.It Pa /var/run/sshd.pid
642
Contains the process ID of the
643
.Nm
644
listening for connections (if there are several daemons running
645
concurrently for different ports, this contains the process ID of the one
646
started last).
647
The content of this file is not sensitive; it can be world-readable.
648
.It Pa ~/.ssh/authorized_keys
649
Lists the public keys (RSA or DSA) that can be used to log into the user's account.
650
This file must be readable by root (which may on some machines imply
651
it being world-readable if the user's home directory resides on an NFS
652
volume).
653
It is recommended that it not be accessible by others.
654
The format of this file is described above.
655
Users will place the contents of their
656
.Pa identity.pub ,
657
.Pa id_dsa.pub
658
and/or
659
.Pa id_rsa.pub
660
files into this file, as described in
661
.Xr ssh-keygen 1 .
662
.It Pa "/usr/etc/ssh_known_hosts", "~/.ssh/known_hosts"
663
These files are consulted when using rhosts with RSA host
664
authentication or protocol version 2 hostbased authentication
665
to check the public key of the host.
666
The key must be listed in one of these files to be accepted.
667
The client uses the same files
668
to verify that it is connecting to the correct remote host.
669
These files should be writable only by root/the owner.
670
.Pa /usr/etc/ssh_known_hosts
671
should be world-readable, and
672
.Pa ~/.ssh/known_hosts
673
can, but need not be, world-readable.
674
.It Pa /etc/motd
675
See
676
.Xr motd 5 .
677
.It Pa ~/.hushlogin
678
This file is used to suppress printing the last login time and
679
.Pa /etc/motd ,
680
if
681
.Cm PrintLastLog
682
and
683
.Cm PrintMotd ,
684
respectively,
685
are enabled.
686
It does not suppress printing of the banner specified by
687
.Cm Banner .
688
.It Pa /etc/nologin
689
If this file exists,
690
.Nm
691
refuses to let anyone except root log in.
692
The contents of the file
693
are displayed to anyone trying to log in, and non-root connections are
694
refused.
695
The file should be world-readable.
696
.It Pa /etc/hosts.allow, /etc/hosts.deny
697
Access controls that should be enforced by tcp-wrappers are defined here.
698
Further details are described in
699
.Xr hosts_access 5 .
700
.It Pa ~/.rhosts
701
This file is used during
702
.Cm RhostsRSAAuthentication
703
and
704
.Cm HostbasedAuthentication
705
and contains host-username pairs, separated by a space, one per
706
line.
707
The given user on the corresponding host is permitted to log in
708
without a password.
709
The same file is used by rlogind and rshd.
710
The file must
711
be writable only by the user; it is recommended that it not be
712
accessible by others.
713
.Pp
714
It is also possible to use netgroups in the file.
715
Either host or user
716
name may be of the form +@groupname to specify all hosts or all users
717
in the group.
718
.It Pa ~/.shosts
719
For ssh,
720
this file is exactly the same as for
721
.Pa .rhosts .
722
However, this file is
723
not used by rlogin and rshd, so using this permits access using SSH only.
724
.It Pa /etc/hosts.equiv
725
This file is used during
726
.Cm RhostsRSAAuthentication
727
and
728
.Cm HostbasedAuthentication
729
authentication.
730
In the simplest form, this file contains host names, one per line.
731
Users on
732
those hosts are permitted to log in without a password, provided they
733
have the same user name on both machines.
734
The host name may also be
735
followed by a user name; such users are permitted to log in as
736
.Em any
737
user on this machine (except root).
738
Additionally, the syntax
739
.Dq +@group
740
can be used to specify netgroups.
741
Negated entries start with
742
.Ql \&- .
743
.Pp
744
If the client host/user is successfully matched in this file, login is
745
automatically permitted provided the client and server user names are the
746
same.
747
Additionally, successful client host key authentication is required.
748
This file must be writable only by root; it is recommended
749
that it be world-readable.
750
.Pp
751
.Sy "Warning: It is almost never a good idea to use user names in"
752
.Pa hosts.equiv .
753
Beware that it really means that the named user(s) can log in as
754
.Em anybody ,
755
which includes bin, daemon, adm, and other accounts that own critical
756
binaries and directories.
757
Using a user name practically grants the user root access.
758
The only valid use for user names that I can think
759
of is in negative entries.
760
.Pp
761
Note that this warning also applies to rsh/rlogin.
762
.It Pa /usr/etc/shosts.equiv
763
This is processed exactly as
764
.Pa /etc/hosts.equiv .
765
However, this file may be useful in environments that want to run both
766
rsh/rlogin and ssh.
767
.It Pa ~/.ssh/environment
768
This file is read into the environment at login (if it exists).
769
It can only contain empty lines, comment lines (that start with
770
.Ql # ) ,
771
and assignment lines of the form name=value.
772
The file should be writable
773
only by the user; it need not be readable by anyone else.
774
Environment processing is disabled by default and is
775
controlled via the
776
.Cm PermitUserEnvironment
777
option.
778
.It Pa ~/.ssh/rc
779
If this file exists, it is run with
780
.Pa /bin/sh
781
after reading the
782
environment files but before starting the user's shell or command.
783
It must not produce any output on stdout; stderr must be used
784
instead.
785
If X11 forwarding is in use, it will receive the "proto cookie" pair in
786
its standard input (and
787
.Ev DISPLAY
788
in its environment).
789
The script must call
790
.Xr xauth 1
791
because
792
.Nm
793
will not run xauth automatically to add X11 cookies.
794
.Pp
795
The primary purpose of this file is to run any initialization routines
796
which may be needed before the user's home directory becomes
797
accessible; AFS is a particular example of such an environment.
798
.Pp
799
This file will probably contain some initialization code followed by
800
something similar to:
801
.Bd -literal
802
if read proto cookie && [ -n "$DISPLAY" ]; then
803
	if [ `echo $DISPLAY | cut -c1-10` = 'localhost:' ]; then
804
		# X11UseLocalhost=yes
805
		echo add unix:`echo $DISPLAY |
806
		    cut -c11-` $proto $cookie
807
	else
808
		# X11UseLocalhost=no
809
		echo add $DISPLAY $proto $cookie
810
	fi | xauth -q -
811
fi
812
.Ed
813
.Pp
814
If this file does not exist,
815
.Pa /etc/ssh/sshrc
816
is run, and if that
817
does not exist either, xauth is used to add the cookie.
818
.Pp
819
This file should be writable only by the user, and need not be
820
readable by anyone else.
821
.It Pa /etc/ssh/sshrc
822
Like
823
.Pa ~/.ssh/rc .
824
This can be used to specify
825
machine-specific login-time initializations globally.
826
This file should be writable only by root, and should be world-readable.
827
.El
828
.Sh SEE ALSO
829
.Xr scp 1 ,
830
.Xr sftp 1 ,
831
.Xr ssh 1 ,
832
.Xr ssh-add 1 ,
833
.Xr ssh-agent 1 ,
834
.Xr ssh-keygen 1 ,
835
.Xr chroot 2 ,
836
.Xr hosts_access 5 ,
837
.Xr login.conf 5 ,
838
.Xr moduli 5 ,
839
.Xr sshd_config 5 ,
840
.Xr inetd 8 ,
841
.Xr sftp-server 8
842
.Rs
843
.%A T. Ylonen
844
.%A T. Kivinen
845
.%A M. Saarinen
846
.%A T. Rinne
847
.%A S. Lehtinen
848
.%T "SSH Protocol Architecture"
849
.%N draft-ietf-secsh-architecture-12.txt
850
.%D January 2002
851
.%O work in progress material
852
.Re
853
.Rs
854
.%A M. Friedl
855
.%A N. Provos
856
.%A W. A. Simpson
857
.%T "Diffie-Hellman Group Exchange for the SSH Transport Layer Protocol"
858
.%N draft-ietf-secsh-dh-group-exchange-02.txt
859
.%D January 2002
860
.%O work in progress material
861
.Re
862
.Sh AUTHORS
863
OpenSSH is a derivative of the original and free
864
ssh 1.2.12 release by Tatu Ylonen.
865
Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos,
866
Theo de Raadt and Dug Song
867
removed many bugs, re-added newer features and
868
created OpenSSH.
869
Markus Friedl contributed the support for SSH
870
protocol versions 1.5 and 2.0.
871
Niels Provos and Markus Friedl contributed support
872
for privilege separation.
(-)/home/lb/net/src/openssh-4.3p2/sshd_config.5.out (+851 lines)
Line 0 Link Here
1
.\"  -*- nroff -*-
2
.\"
3
.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4
.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5
.\"                    All rights reserved
6
.\"
7
.\" As far as I am concerned, the code I have written for this software
8
.\" can be used freely for any purpose.  Any derived versions of this
9
.\" software must be clearly marked as such, and if the derived work is
10
.\" incompatible with the protocol description in the RFC file, it must be
11
.\" called by a name other than "ssh" or "Secure Shell".
12
.\"
13
.\" Copyright (c) 1999,2000 Markus Friedl.  All rights reserved.
14
.\" Copyright (c) 1999 Aaron Campbell.  All rights reserved.
15
.\" Copyright (c) 1999 Theo de Raadt.  All rights reserved.
16
.\"
17
.\" Redistribution and use in source and binary forms, with or without
18
.\" modification, are permitted provided that the following conditions
19
.\" are met:
20
.\" 1. Redistributions of source code must retain the above copyright
21
.\"    notice, this list of conditions and the following disclaimer.
22
.\" 2. Redistributions in binary form must reproduce the above copyright
23
.\"    notice, this list of conditions and the following disclaimer in the
24
.\"    documentation and/or other materials provided with the distribution.
25
.\"
26
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
27
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
28
.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
29
.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
30
.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
31
.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
32
.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
33
.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36
.\"
37
.\" $OpenBSD: sshd_config.5,v 1.48 2006/01/02 17:09:49 jmc Exp $
38
.Dd September 25, 1999
39
.Dt SSHD_CONFIG 5
40
.Os
41
.Sh NAME
42
.Nm sshd_config
43
.Nd OpenSSH SSH daemon configuration file
44
.Sh SYNOPSIS
45
.Bl -tag -width Ds -compact
46
.It Pa /usr/etc/sshd_config
47
.El
48
.Sh DESCRIPTION
49
.Nm sshd
50
reads configuration data from
51
.Pa /usr/etc/sshd_config
52
(or the file specified with
53
.Fl f
54
on the command line).
55
The file contains keyword-argument pairs, one per line.
56
Lines starting with
57
.Ql #
58
and empty lines are interpreted as comments.
59
.Pp
60
The possible
61
keywords and their meanings are as follows (note that
62
keywords are case-insensitive and arguments are case-sensitive):
63
.Bl -tag -width Ds
64
.It Cm AcceptEnv
65
Specifies what environment variables sent by the client will be copied into
66
the session's
67
.Xr environ 7 .
68
See
69
.Cm SendEnv
70
in
71
.Xr ssh_config 5
72
for how to configure the client.
73
Note that environment passing is only supported for protocol 2.
74
Variables are specified by name, which may contain the wildcard characters
75
.Ql \&*
76
and
77
.Ql \&? .
78
Multiple environment variables may be separated by whitespace or spread
79
across multiple
80
.Cm AcceptEnv
81
directives.
82
Be warned that some environment variables could be used to bypass restricted
83
user environments.
84
For this reason, care should be taken in the use of this directive.
85
The default is not to accept any environment variables.
86
.It Cm AddressFamily
87
Specifies which address family should be used by
88
.Nm sshd .
89
Valid arguments are
90
.Dq any ,
91
.Dq inet
92
(use IPv4 only) or
93
.Dq inet6
94
(use IPv6 only).
95
The default is
96
.Dq any .
97
.It Cm AllowGroups
98
This keyword can be followed by a list of group name patterns, separated
99
by spaces.
100
If specified, login is allowed only for users whose primary
101
group or supplementary group list matches one of the patterns.
102
.Ql \&*
103
and
104
.Ql \&?
105
can be used as
106
wildcards in the patterns.
107
Only group names are valid; a numerical group ID is not recognized.
108
By default, login is allowed for all groups.
109
.It Cm AllowTcpForwarding
110
Specifies whether TCP forwarding is permitted.
111
The default is
112
.Dq yes .
113
Note that disabling TCP forwarding does not improve security unless
114
users are also denied shell access, as they can always install their
115
own forwarders.
116
.It Cm AllowUsers
117
This keyword can be followed by a list of user name patterns, separated
118
by spaces.
119
If specified, login is allowed only for user names that
120
match one of the patterns.
121
.Ql \&*
122
and
123
.Ql \&?
124
can be used as
125
wildcards in the patterns.
126
Only user names are valid; a numerical user ID is not recognized.
127
By default, login is allowed for all users.
128
If the pattern takes the form USER@HOST then USER and HOST
129
are separately checked, restricting logins to particular
130
users from particular hosts.
131
.It Cm AuthorizedKeysFile
132
Specifies the file that contains the public keys that can be used
133
for user authentication.
134
.Cm AuthorizedKeysFile
135
may contain tokens of the form %T which are substituted during connection
136
set-up.
137
The following tokens are defined: %% is replaced by a literal '%',
138
%h is replaced by the home directory of the user being authenticated and
139
%u is replaced by the username of that user.
140
After expansion,
141
.Cm AuthorizedKeysFile
142
is taken to be an absolute path or one relative to the user's home
143
directory.
144
The default is
145
.Dq .ssh/authorized_keys .
146
.It Cm Banner
147
In some jurisdictions, sending a warning message before authentication
148
may be relevant for getting legal protection.
149
The contents of the specified file are sent to the remote user before
150
authentication is allowed.
151
This option is only available for protocol version 2.
152
By default, no banner is displayed.
153
.It Cm ChallengeResponseAuthentication
154
Specifies whether challenge response authentication is allowed.
155
All authentication styles from
156
.Xr login.conf 5
157
are supported.
158
The default is
159
.Dq yes .
160
.It Cm Ciphers
161
Specifies the ciphers allowed for protocol version 2.
162
Multiple ciphers must be comma-separated.
163
The supported ciphers are
164
.Dq 3des-cbc ,
165
.Dq aes128-cbc ,
166
.Dq aes192-cbc ,
167
.Dq aes256-cbc ,
168
.Dq aes128-ctr ,
169
.Dq aes192-ctr ,
170
.Dq aes256-ctr ,
171
.Dq arcfour128 ,
172
.Dq arcfour256 ,
173
.Dq arcfour ,
174
.Dq blowfish-cbc ,
175
and
176
.Dq cast128-cbc .
177
The default is
178
.Bd -literal
179
  ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,
180
    arcfour256,arcfour,aes192-cbc,aes256-cbc,aes128-ctr,
181
    aes192-ctr,aes256-ctr''
182
.Ed
183
.It Cm ClientAliveCountMax
184
Sets the number of client alive messages (see below) which may be
185
sent without
186
.Nm sshd
187
receiving any messages back from the client.
188
If this threshold is reached while client alive messages are being sent,
189
.Nm sshd
190
will disconnect the client, terminating the session.
191
It is important to note that the use of client alive messages is very
192
different from
193
.Cm TCPKeepAlive
194
(below).
195
The client alive messages are sent through the encrypted channel
196
and therefore will not be spoofable.
197
The TCP keepalive option enabled by
198
.Cm TCPKeepAlive
199
is spoofable.
200
The client alive mechanism is valuable when the client or
201
server depend on knowing when a connection has become inactive.
202
.Pp
203
The default value is 3.
204
If
205
.Cm ClientAliveInterval
206
(see below) is set to 15, and
207
.Cm ClientAliveCountMax
208
is left at the default, unresponsive ssh clients
209
will be disconnected after approximately 45 seconds.
210
.It Cm ClientAliveInterval
211
Sets a timeout interval in seconds after which if no data has been received
212
from the client,
213
.Nm sshd
214
will send a message through the encrypted
215
channel to request a response from the client.
216
The default
217
is 0, indicating that these messages will not be sent to the client.
218
This option applies to protocol version 2 only.
219
.It Cm Compression
220
Specifies whether compression is allowed, or delayed until
221
the user has authenticated successfully.
222
The argument must be
223
.Dq yes ,
224
.Dq delayed ,
225
or
226
.Dq no .
227
The default is
228
.Dq delayed .
229
.It Cm DenyGroups
230
This keyword can be followed by a list of group name patterns, separated
231
by spaces.
232
Login is disallowed for users whose primary group or supplementary
233
group list matches one of the patterns.
234
.Ql \&*
235
and
236
.Ql \&?
237
can be used as
238
wildcards in the patterns.
239
Only group names are valid; a numerical group ID is not recognized.
240
By default, login is allowed for all groups.
241
.It Cm DenyUsers
242
This keyword can be followed by a list of user name patterns, separated
243
by spaces.
244
Login is disallowed for user names that match one of the patterns.
245
.Ql \&*
246
and
247
.Ql \&?
248
can be used as wildcards in the patterns.
249
Only user names are valid; a numerical user ID is not recognized.
250
By default, login is allowed for all users.
251
If the pattern takes the form USER@HOST then USER and HOST
252
are separately checked, restricting logins to particular
253
users from particular hosts.
254
.It Cm GatewayPorts
255
Specifies whether remote hosts are allowed to connect to ports
256
forwarded for the client.
257
By default,
258
.Nm sshd
259
binds remote port forwardings to the loopback address.
260
This prevents other remote hosts from connecting to forwarded ports.
261
.Cm GatewayPorts
262
can be used to specify that
263
.Nm sshd
264
should allow remote port forwardings to bind to non-loopback addresses, thus
265
allowing other hosts to connect.
266
The argument may be
267
.Dq no
268
to force remote port forwardings to be available to the local host only,
269
.Dq yes
270
to force remote port forwardings to bind to the wildcard address, or
271
.Dq clientspecified
272
to allow the client to select the address to which the forwarding is bound.
273
The default is
274
.Dq no .
275
.It Cm GSSAPIAuthentication
276
Specifies whether user authentication based on GSSAPI is allowed.
277
The default is
278
.Dq no .
279
Note that this option applies to protocol version 2 only.
280
.It Cm GSSAPIKeyExchange
281
Specifies whether key exchange based on GSSAPI is allowed. GSSAPI key exchange 
282
doesn't rely on ssh keys to verify host identity.
283
The default is
284
.Dq no .
285
Note that this option applies to protocol version 2 only.
286
.It Cm GSSAPICleanupCredentials
287
Specifies whether to automatically destroy the user's credentials cache
288
on logout.
289
The default is
290
.Dq yes .
291
Note that this option applies to protocol version 2 only.
292
.It Cm HostbasedAuthentication
293
Specifies whether rhosts or /etc/hosts.equiv authentication together
294
with successful public key client host authentication is allowed
295
(hostbased authentication).
296
This option is similar to
297
.Cm RhostsRSAAuthentication
298
and applies to protocol version 2 only.
299
The default is
300
.Dq no .
301
.It Cm HostKey
302
Specifies a file containing a private host key
303
used by SSH.
304
The default is
305
.Pa /usr/etc/ssh_host_key
306
for protocol version 1, and
307
.Pa /usr/etc/ssh_host_rsa_key
308
and
309
.Pa /usr/etc/ssh_host_dsa_key
310
for protocol version 2.
311
Note that
312
.Nm sshd
313
will refuse to use a file if it is group/world-accessible.
314
It is possible to have multiple host key files.
315
.Dq rsa1
316
keys are used for version 1 and
317
.Dq dsa
318
or
319
.Dq rsa
320
are used for version 2 of the SSH protocol.
321
.It Cm IgnoreRhosts
322
Specifies that
323
.Pa .rhosts
324
and
325
.Pa .shosts
326
files will not be used in
327
.Cm RhostsRSAAuthentication
328
or
329
.Cm HostbasedAuthentication .
330
.Pp
331
.Pa /etc/hosts.equiv
332
and
333
.Pa /usr/etc/shosts.equiv
334
are still used.
335
The default is
336
.Dq yes .
337
.It Cm IgnoreUserKnownHosts
338
Specifies whether
339
.Nm sshd
340
should ignore the user's
341
.Pa ~/.ssh/known_hosts
342
during
343
.Cm RhostsRSAAuthentication
344
or
345
.Cm HostbasedAuthentication .
346
The default is
347
.Dq no .
348
.It Cm KerberosAuthentication
349
Specifies whether the password provided by the user for
350
.Cm PasswordAuthentication
351
will be validated through the Kerberos KDC.
352
To use this option, the server needs a
353
Kerberos servtab which allows the verification of the KDC's identity.
354
Default is
355
.Dq no .
356
.It Cm KerberosGetAFSToken
357
If AFS is active and the user has a Kerberos 5 TGT, attempt to acquire
358
an AFS token before accessing the user's home directory.
359
Default is
360
.Dq no .
361
.It Cm KerberosOrLocalPasswd
362
If set then if password authentication through Kerberos fails then
363
the password will be validated via any additional local mechanism
364
such as
365
.Pa /etc/passwd .
366
Default is
367
.Dq yes .
368
.It Cm KerberosTicketCleanup
369
Specifies whether to automatically destroy the user's ticket cache
370
file on logout.
371
Default is
372
.Dq yes .
373
.It Cm KeyRegenerationInterval
374
In protocol version 1, the ephemeral server key is automatically regenerated
375
after this many seconds (if it has been used).
376
The purpose of regeneration is to prevent
377
decrypting captured sessions by later breaking into the machine and
378
stealing the keys.
379
The key is never stored anywhere.
380
If the value is 0, the key is never regenerated.
381
The default is 3600 (seconds).
382
.It Cm ListenAddress
383
Specifies the local addresses
384
.Nm sshd
385
should listen on.
386
The following forms may be used:
387
.Pp
388
.Bl -item -offset indent -compact
389
.It
390
.Cm ListenAddress
391
.Sm off
392
.Ar host No | Ar IPv4_addr No | Ar IPv6_addr
393
.Sm on
394
.It
395
.Cm ListenAddress
396
.Sm off
397
.Ar host No | Ar IPv4_addr No : Ar port
398
.Sm on
399
.It
400
.Cm ListenAddress
401
.Sm off
402
.Oo
403
.Ar host No | Ar IPv6_addr Oc : Ar port
404
.Sm on
405
.El
406
.Pp
407
If
408
.Ar port
409
is not specified,
410
.Nm sshd
411
will listen on the address and all prior
412
.Cm Port
413
options specified.
414
The default is to listen on all local addresses.
415
Multiple
416
.Cm ListenAddress
417
options are permitted.
418
Additionally, any
419
.Cm Port
420
options must precede this option for non port qualified addresses.
421
.It Cm LoginGraceTime
422
The server disconnects after this time if the user has not
423
successfully logged in.
424
If the value is 0, there is no time limit.
425
The default is 120 seconds.
426
.It Cm LogLevel
427
Gives the verbosity level that is used when logging messages from
428
.Nm sshd .
429
The possible values are:
430
QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3.
431
The default is INFO.
432
DEBUG and DEBUG1 are equivalent.
433
DEBUG2 and DEBUG3 each specify higher levels of debugging output.
434
Logging with a DEBUG level violates the privacy of users and is not recommended.
435
.It Cm MACs
436
Specifies the available MAC (message authentication code) algorithms.
437
The MAC algorithm is used in protocol version 2
438
for data integrity protection.
439
Multiple algorithms must be comma-separated.
440
The default is
441
.Dq hmac-md5,hmac-sha1,hmac-ripemd160,hmac-sha1-96,hmac-md5-96 .
442
.It Cm MaxAuthTries
443
Specifies the maximum number of authentication attempts permitted per
444
connection.
445
Once the number of failures reaches half this value,
446
additional failures are logged.
447
The default is 6.
448
.It Cm MaxStartups
449
Specifies the maximum number of concurrent unauthenticated connections to the
450
.Nm sshd
451
daemon.
452
Additional connections will be dropped until authentication succeeds or the
453
.Cm LoginGraceTime
454
expires for a connection.
455
The default is 10.
456
.Pp
457
Alternatively, random early drop can be enabled by specifying
458
the three colon separated values
459
.Dq start:rate:full
460
(e.g., "10:30:60").
461
.Nm sshd
462
will refuse connection attempts with a probability of
463
.Dq rate/100
464
(30%)
465
if there are currently
466
.Dq start
467
(10)
468
unauthenticated connections.
469
The probability increases linearly and all connection attempts
470
are refused if the number of unauthenticated connections reaches
471
.Dq full
472
(60).
473
.It Cm PasswordAuthentication
474
Specifies whether password authentication is allowed.
475
The default is
476
.Dq yes .
477
.It Cm PermitEmptyPasswords
478
When password authentication is allowed, it specifies whether the
479
server allows login to accounts with empty password strings.
480
The default is
481
.Dq no .
482
.It Cm PermitRootLogin
483
Specifies whether root can log in using
484
.Xr ssh 1 .
485
The argument must be
486
.Dq yes ,
487
.Dq without-password ,
488
.Dq forced-commands-only
489
or
490
.Dq no .
491
The default is
492
.Dq yes .
493
.Pp
494
If this option is set to
495
.Dq without-password
496
password authentication is disabled for root.
497
.Pp
498
If this option is set to
499
.Dq forced-commands-only
500
root login with public key authentication will be allowed,
501
but only if the
502
.Ar command
503
option has been specified
504
(which may be useful for taking remote backups even if root login is
505
normally not allowed).
506
All other authentication methods are disabled for root.
507
.Pp
508
If this option is set to
509
.Dq no
510
root is not allowed to log in.
511
.It Cm PermitTunnel
512
Specifies whether
513
.Xr tun 4
514
device forwarding is allowed.
515
The argument must be
516
.Dq yes ,
517
.Dq point-to-point ,
518
.Dq ethernet
519
or
520
.Dq no .
521
The default is
522
.Dq no .
523
.It Cm PermitUserEnvironment
524
Specifies whether
525
.Pa ~/.ssh/environment
526
and
527
.Cm environment=
528
options in
529
.Pa ~/.ssh/authorized_keys
530
are processed by
531
.Nm sshd .
532
The default is
533
.Dq no .
534
Enabling environment processing may enable users to bypass access
535
restrictions in some configurations using mechanisms such as
536
.Ev LD_PRELOAD .
537
.It Cm PidFile
538
Specifies the file that contains the process ID of the
539
.Nm sshd
540
daemon.
541
The default is
542
.Pa /var/run/sshd.pid .
543
.It Cm Port
544
Specifies the port number that
545
.Nm sshd
546
listens on.
547
The default is 22.
548
Multiple options of this type are permitted.
549
See also
550
.Cm ListenAddress .
551
.It Cm PrintLastLog
552
Specifies whether
553
.Nm sshd
554
should print the date and time of the last user login when a user logs
555
in interactively.
556
The default is
557
.Dq yes .
558
.It Cm PrintMotd
559
Specifies whether
560
.Nm sshd
561
should print
562
.Pa /etc/motd
563
when a user logs in interactively.
564
(On some systems it is also printed by the shell,
565
.Pa /etc/profile ,
566
or equivalent.)
567
The default is
568
.Dq yes .
569
.It Cm Protocol
570
Specifies the protocol versions
571
.Nm sshd
572
supports.
573
The possible values are
574
.Dq 1
575
and
576
.Dq 2 .
577
Multiple versions must be comma-separated.
578
The default is
579
.Dq 2,1 .
580
Note that the order of the protocol list does not indicate preference,
581
because the client selects among multiple protocol versions offered
582
by the server.
583
Specifying
584
.Dq 2,1
585
is identical to
586
.Dq 1,2 .
587
.It Cm PubkeyAuthentication
588
Specifies whether public key authentication is allowed.
589
The default is
590
.Dq yes .
591
Note that this option applies to protocol version 2 only.
592
.It Cm RhostsRSAAuthentication
593
Specifies whether rhosts or /etc/hosts.equiv authentication together
594
with successful RSA host authentication is allowed.
595
The default is
596
.Dq no .
597
This option applies to protocol version 1 only.
598
.It Cm RSAAuthentication
599
Specifies whether pure RSA authentication is allowed.
600
The default is
601
.Dq yes .
602
This option applies to protocol version 1 only.
603
.It Cm ServerKeyBits
604
Defines the number of bits in the ephemeral protocol version 1 server key.
605
The minimum value is 512, and the default is 768.
606
.It Cm StrictModes
607
Specifies whether
608
.Nm sshd
609
should check file modes and ownership of the
610
user's files and home directory before accepting login.
611
This is normally desirable because novices sometimes accidentally leave their
612
directory or files world-writable.
613
The default is
614
.Dq yes .
615
.It Cm Subsystem
616
Configures an external subsystem (e.g., file transfer daemon).
617
Arguments should be a subsystem name and a command to execute upon subsystem
618
request.
619
The command
620
.Xr sftp-server 8
621
implements the
622
.Dq sftp
623
file transfer subsystem.
624
By default no subsystems are defined.
625
Note that this option applies to protocol version 2 only.
626
.It Cm SyslogFacility
627
Gives the facility code that is used when logging messages from
628
.Nm sshd .
629
The possible values are: DAEMON, USER, AUTH, LOCAL0, LOCAL1, LOCAL2,
630
LOCAL3, LOCAL4, LOCAL5, LOCAL6, LOCAL7.
631
The default is AUTH.
632
.It Cm TCPKeepAlive
633
Specifies whether the system should send TCP keepalive messages to the
634
other side.
635
If they are sent, death of the connection or crash of one
636
of the machines will be properly noticed.
637
However, this means that
638
connections will die if the route is down temporarily, and some people
639
find it annoying.
640
On the other hand, if TCP keepalives are not sent,
641
sessions may hang indefinitely on the server, leaving
642
.Dq ghost
643
users and consuming server resources.
644
.Pp
645
The default is
646
.Dq yes
647
(to send TCP keepalive messages), and the server will notice
648
if the network goes down or the client host crashes.
649
This avoids infinitely hanging sessions.
650
.Pp
651
To disable TCP keepalive messages, the value should be set to
652
.Dq no .
653
.Pp
654
This option was formerly called
655
.Cm KeepAlive .
656
.It Cm UseDNS
657
Specifies whether
658
.Nm sshd
659
should look up the remote host name and check that
660
the resolved host name for the remote IP address maps back to the
661
very same IP address.
662
The default is
663
.Dq yes .
664
.It Cm UseLogin
665
Specifies whether
666
.Xr login 1
667
is used for interactive login sessions.
668
The default is
669
.Dq no .
670
Note that
671
.Xr login 1
672
is never used for remote command execution.
673
Note also, that if this is enabled,
674
.Cm X11Forwarding
675
will be disabled because
676
.Xr login 1
677
does not know how to handle
678
.Xr xauth 1
679
cookies.
680
If
681
.Cm UsePrivilegeSeparation
682
is specified, it will be disabled after authentication.
683
.It Cm UsePAM
684
Enables the Pluggable Authentication Module interface.
685
If set to
686
.Dq yes
687
this will enable PAM authentication using
688
.Cm ChallengeResponseAuthentication
689
and PAM account and session module processing for all authentication types.
690
.Pp
691
Because PAM challenge-response authentication usually serves an equivalent
692
role to password authentication, you should disable either
693
.Cm PasswordAuthentication
694
or
695
.Cm ChallengeResponseAuthentication.
696
.Pp
697
If
698
.Cm UsePAM
699
is enabled, you will not be able to run
700
.Xr sshd 8
701
as a non-root user.
702
The default is
703
.Dq no .
704
.It Cm UsePrivilegeSeparation
705
Specifies whether
706
.Nm sshd
707
separates privileges by creating an unprivileged child process
708
to deal with incoming network traffic.
709
After successful authentication, another process will be created that has
710
the privilege of the authenticated user.
711
The goal of privilege separation is to prevent privilege
712
escalation by containing any corruption within the unprivileged processes.
713
The default is
714
.Dq yes .
715
.It Cm X11DisplayOffset
716
Specifies the first display number available for
717
.Nm sshd Ns 's
718
X11 forwarding.
719
This prevents
720
.Nm sshd
721
from interfering with real X11 servers.
722
The default is 10.
723
.It Cm X11Forwarding
724
Specifies whether X11 forwarding is permitted.
725
The argument must be
726
.Dq yes
727
or
728
.Dq no .
729
The default is
730
.Dq no .
731
.Pp
732
When X11 forwarding is enabled, there may be additional exposure to
733
the server and to client displays if the
734
.Nm sshd
735
proxy display is configured to listen on the wildcard address (see
736
.Cm X11UseLocalhost
737
below), however this is not the default.
738
Additionally, the authentication spoofing and authentication data
739
verification and substitution occur on the client side.
740
The security risk of using X11 forwarding is that the client's X11
741
display server may be exposed to attack when the ssh client requests
742
forwarding (see the warnings for
743
.Cm ForwardX11
744
in
745
.Xr ssh_config 5 ) .
746
A system administrator may have a stance in which they want to
747
protect clients that may expose themselves to attack by unwittingly
748
requesting X11 forwarding, which can warrant a
749
.Dq no
750
setting.
751
.Pp
752
Note that disabling X11 forwarding does not prevent users from
753
forwarding X11 traffic, as users can always install their own forwarders.
754
X11 forwarding is automatically disabled if
755
.Cm UseLogin
756
is enabled.
757
.It Cm X11UseLocalhost
758
Specifies whether
759
.Nm sshd
760
should bind the X11 forwarding server to the loopback address or to
761
the wildcard address.
762
By default,
763
.Nm sshd
764
binds the forwarding server to the loopback address and sets the
765
hostname part of the
766
.Ev DISPLAY
767
environment variable to
768
.Dq localhost .
769
This prevents remote hosts from connecting to the proxy display.
770
However, some older X11 clients may not function with this
771
configuration.
772
.Cm X11UseLocalhost
773
may be set to
774
.Dq no
775
to specify that the forwarding server should be bound to the wildcard
776
address.
777
The argument must be
778
.Dq yes
779
or
780
.Dq no .
781
The default is
782
.Dq yes .
783
.It Cm XAuthLocation
784
Specifies the full pathname of the
785
.Xr xauth 1
786
program.
787
The default is
788
.Pa /usr/bin/xauth .
789
.El
790
.Ss Time Formats
791
.Nm sshd
792
command-line arguments and configuration file options that specify time
793
may be expressed using a sequence of the form:
794
.Sm off
795
.Ar time Op Ar qualifier ,
796
.Sm on
797
where
798
.Ar time
799
is a positive integer value and
800
.Ar qualifier
801
is one of the following:
802
.Pp
803
.Bl -tag -width Ds -compact -offset indent
804
.It Cm <none>
805
seconds
806
.It Cm s | Cm S
807
seconds
808
.It Cm m | Cm M
809
minutes
810
.It Cm h | Cm H
811
hours
812
.It Cm d | Cm D
813
days
814
.It Cm w | Cm W
815
weeks
816
.El
817
.Pp
818
Each member of the sequence is added together to calculate
819
the total time value.
820
.Pp
821
Time format examples:
822
.Pp
823
.Bl -tag -width Ds -compact -offset indent
824
.It 600
825
600 seconds (10 minutes)
826
.It 10m
827
10 minutes
828
.It 1h30m
829
1 hour 30 minutes (90 minutes)
830
.El
831
.Sh FILES
832
.Bl -tag -width Ds
833
.It Pa /usr/etc/sshd_config
834
Contains configuration data for
835
.Nm sshd .
836
This file should be writable by root only, but it is recommended
837
(though not necessary) that it be world-readable.
838
.El
839
.Sh SEE ALSO
840
.Xr sshd 8
841
.Sh AUTHORS
842
OpenSSH is a derivative of the original and free
843
ssh 1.2.12 release by Tatu Ylonen.
844
Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos,
845
Theo de Raadt and Dug Song
846
removed many bugs, re-added newer features and
847
created OpenSSH.
848
Markus Friedl contributed the support for SSH
849
protocol versions 1.5 and 2.0.
850
Niels Provos and Markus Friedl contributed support
851
for privilege separation.
(-)/home/lb/net/src/openssh-4.3p2/sshd_config.out (+105 lines)
Line 0 Link Here
1
#	$OpenBSD: sshd_config,v 1.73 2005/12/06 22:38:28 reyk Exp $
2
3
# This is the sshd server system-wide configuration file.  See
4
# sshd_config(5) for more information.
5
6
# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
7
8
# The strategy used for options in the default sshd_config shipped with
9
# OpenSSH is to specify options with their default value where
10
# possible, but leave them commented.  Uncommented options change a
11
# default value.
12
13
#Port 22
14
#Protocol 2,1
15
#AddressFamily any
16
#ListenAddress 0.0.0.0
17
#ListenAddress ::
18
19
# HostKey for protocol version 1
20
#HostKey /usr/etc/ssh_host_key
21
# HostKeys for protocol version 2
22
#HostKey /usr/etc/ssh_host_rsa_key
23
#HostKey /usr/etc/ssh_host_dsa_key
24
25
# Lifetime and size of ephemeral version 1 server key
26
#KeyRegenerationInterval 1h
27
#ServerKeyBits 768
28
29
# Logging
30
# obsoletes QuietMode and FascistLogging
31
#SyslogFacility AUTH
32
#LogLevel INFO
33
34
# Authentication:
35
36
#LoginGraceTime 2m
37
#PermitRootLogin yes
38
#StrictModes yes
39
#MaxAuthTries 6
40
41
#RSAAuthentication yes
42
#PubkeyAuthentication yes
43
#AuthorizedKeysFile	.ssh/authorized_keys
44
45
# For this to work you will also need host keys in /usr/etc/ssh_known_hosts
46
#RhostsRSAAuthentication no
47
# similar for protocol version 2
48
#HostbasedAuthentication no
49
# Change to yes if you don't trust ~/.ssh/known_hosts for
50
# RhostsRSAAuthentication and HostbasedAuthentication
51
#IgnoreUserKnownHosts no
52
# Don't read the user's ~/.rhosts and ~/.shosts files
53
#IgnoreRhosts yes
54
55
# To disable tunneled clear text passwords, change to no here!
56
#PasswordAuthentication yes
57
#PermitEmptyPasswords no
58
59
# Change to no to disable s/key passwords
60
#ChallengeResponseAuthentication yes
61
62
# Kerberos options
63
#KerberosAuthentication no
64
#KerberosOrLocalPasswd yes
65
#KerberosTicketCleanup yes
66
#KerberosGetAFSToken no
67
68
# GSSAPI options
69
#GSSAPIAuthentication no
70
#GSSAPICleanupCredentials yes
71
72
# Set this to 'yes' to enable PAM authentication, account processing, 
73
# and session processing. If this is enabled, PAM authentication will 
74
# be allowed through the ChallengeResponseAuthentication mechanism. 
75
# Depending on your PAM configuration, this may bypass the setting of 
76
# PasswordAuthentication, PermitEmptyPasswords, and 
77
# "PermitRootLogin without-password". If you just want the PAM account and 
78
# session checks to run without PAM authentication, then enable this but set 
79
# ChallengeResponseAuthentication=no
80
#UsePAM no
81
82
#AllowTcpForwarding yes
83
#GatewayPorts no
84
#X11Forwarding no
85
#X11DisplayOffset 10
86
#X11UseLocalhost yes
87
#PrintMotd yes
88
#PrintLastLog yes
89
#TCPKeepAlive yes
90
#UseLogin no
91
#UsePrivilegeSeparation yes
92
#PermitUserEnvironment no
93
#Compression delayed
94
#ClientAliveInterval 0
95
#ClientAliveCountMax 3
96
#UseDNS yes
97
#PidFile /var/run/sshd.pid
98
#MaxStartups 10
99
#PermitTunnel no
100
101
# no default banner path
102
#Banner /some/path
103
104
# override default of no subsystems
105
Subsystem	sftp	/usr/libexec/sftp-server
(-)/home/lb/net/src/openssh-4.3p2/ssh-keygen.1.out (+468 lines)
Line 0 Link Here
1
.\"	$OpenBSD: ssh-keygen.1,v 1.72 2005/11/28 05:16:53 dtucker Exp $
2
.\"
3
.\"  -*- nroff -*-
4
.\"
5
.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
6
.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
7
.\"                    All rights reserved
8
.\"
9
.\" As far as I am concerned, the code I have written for this software
10
.\" can be used freely for any purpose.  Any derived versions of this
11
.\" software must be clearly marked as such, and if the derived work is
12
.\" incompatible with the protocol description in the RFC file, it must be
13
.\" called by a name other than "ssh" or "Secure Shell".
14
.\"
15
.\"
16
.\" Copyright (c) 1999,2000 Markus Friedl.  All rights reserved.
17
.\" Copyright (c) 1999 Aaron Campbell.  All rights reserved.
18
.\" Copyright (c) 1999 Theo de Raadt.  All rights reserved.
19
.\"
20
.\" Redistribution and use in source and binary forms, with or without
21
.\" modification, are permitted provided that the following conditions
22
.\" are met:
23
.\" 1. Redistributions of source code must retain the above copyright
24
.\"    notice, this list of conditions and the following disclaimer.
25
.\" 2. Redistributions in binary form must reproduce the above copyright
26
.\"    notice, this list of conditions and the following disclaimer in the
27
.\"    documentation and/or other materials provided with the distribution.
28
.\"
29
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
30
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
31
.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
32
.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
33
.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
34
.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
35
.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
36
.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
37
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
38
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
39
.\"
40
.Dd September 25, 1999
41
.Dt SSH-KEYGEN 1
42
.Os
43
.Sh NAME
44
.Nm ssh-keygen
45
.Nd authentication key generation, management and conversion
46
.Sh SYNOPSIS
47
.Nm ssh-keygen
48
.Bk -words
49
.Op Fl q
50
.Op Fl b Ar bits
51
.Fl t Ar type
52
.Op Fl N Ar new_passphrase
53
.Op Fl C Ar comment
54
.Op Fl f Ar output_keyfile
55
.Ek
56
.Nm ssh-keygen
57
.Fl p
58
.Op Fl P Ar old_passphrase
59
.Op Fl N Ar new_passphrase
60
.Op Fl f Ar keyfile
61
.Nm ssh-keygen
62
.Fl i
63
.Op Fl f Ar input_keyfile
64
.Nm ssh-keygen
65
.Fl e
66
.Op Fl f Ar input_keyfile
67
.Nm ssh-keygen
68
.Fl y
69
.Op Fl f Ar input_keyfile
70
.Nm ssh-keygen
71
.Fl c
72
.Op Fl P Ar passphrase
73
.Op Fl C Ar comment
74
.Op Fl f Ar keyfile
75
.Nm ssh-keygen
76
.Fl l
77
.Op Fl f Ar input_keyfile
78
.Nm ssh-keygen
79
.Fl B
80
.Op Fl f Ar input_keyfile
81
.Nm ssh-keygen
82
.Fl D Ar reader
83
.Nm ssh-keygen
84
.Fl F Ar hostname
85
.Op Fl f Ar known_hosts_file
86
.Nm ssh-keygen
87
.Fl H
88
.Op Fl f Ar known_hosts_file
89
.Nm ssh-keygen
90
.Fl R Ar hostname
91
.Op Fl f Ar known_hosts_file
92
.Nm ssh-keygen
93
.Fl U Ar reader
94
.Op Fl f Ar input_keyfile
95
.Nm ssh-keygen
96
.Fl r Ar hostname
97
.Op Fl f Ar input_keyfile
98
.Op Fl g
99
.Nm ssh-keygen
100
.Fl G Ar output_file
101
.Op Fl v
102
.Op Fl b Ar bits
103
.Op Fl M Ar memory
104
.Op Fl S Ar start_point
105
.Nm ssh-keygen
106
.Fl T Ar output_file
107
.Fl f Ar input_file
108
.Op Fl v
109
.Op Fl a Ar num_trials
110
.Op Fl W Ar generator
111
.Sh DESCRIPTION
112
.Nm
113
generates, manages and converts authentication keys for
114
.Xr ssh 1 .
115
.Nm
116
can create RSA keys for use by SSH protocol version 1 and RSA or DSA
117
keys for use by SSH protocol version 2.
118
The type of key to be generated is specified with the
119
.Fl t
120
option.
121
If invoked without any arguments,
122
.Nm
123
will generate an RSA key for use in SSH protocol 2 connections.
124
.Pp
125
.Nm
126
is also used to generate groups for use in Diffie-Hellman group
127
exchange (DH-GEX).
128
See the
129
.Sx MODULI GENERATION
130
section for details.
131
.Pp
132
Normally each user wishing to use SSH
133
with RSA or DSA authentication runs this once to create the authentication
134
key in
135
.Pa ~/.ssh/identity ,
136
.Pa ~/.ssh/id_dsa
137
or
138
.Pa ~/.ssh/id_rsa .
139
Additionally, the system administrator may use this to generate host keys,
140
as seen in
141
.Pa /etc/rc .
142
.Pp
143
Normally this program generates the key and asks for a file in which
144
to store the private key.
145
The public key is stored in a file with the same name but
146
.Dq .pub
147
appended.
148
The program also asks for a passphrase.
149
The passphrase may be empty to indicate no passphrase
150
(host keys must have an empty passphrase), or it may be a string of
151
arbitrary length.
152
A passphrase is similar to a password, except it can be a phrase with a
153
series of words, punctuation, numbers, whitespace, or any string of
154
characters you want.
155
Good passphrases are 10-30 characters long, are
156
not simple sentences or otherwise easily guessable (English
157
prose has only 1-2 bits of entropy per character, and provides very bad
158
passphrases), and contain a mix of upper and lowercase letters,
159
numbers, and non-alphanumeric characters.
160
The passphrase can be changed later by using the
161
.Fl p
162
option.
163
.Pp
164
There is no way to recover a lost passphrase.
165
If the passphrase is
166
lost or forgotten, a new key must be generated and copied to the
167
corresponding public key to other machines.
168
.Pp
169
For RSA1 keys,
170
there is also a comment field in the key file that is only for
171
convenience to the user to help identify the key.
172
The comment can tell what the key is for, or whatever is useful.
173
The comment is initialized to
174
.Dq user@host
175
when the key is created, but can be changed using the
176
.Fl c
177
option.
178
.Pp
179
After a key is generated, instructions below detail where the keys
180
should be placed to be activated.
181
.Pp
182
The options are as follows:
183
.Bl -tag -width Ds
184
.It Fl a Ar trials
185
Specifies the number of primality tests to perform when screening DH-GEX
186
candidates using the
187
.Fl T
188
command.
189
.It Fl B
190
Show the bubblebabble digest of specified private or public key file.
191
.It Fl b Ar bits
192
Specifies the number of bits in the key to create.
193
For RSA keys, the minimum size is 768 bits and the default is 2048 bits.
194
Generally, 2048 bits is considered sufficient.
195
DSA keys must be exactly 1024 bits as specified by FIPS 186-2.
196
.It Fl C Ar comment
197
Provides a new comment.
198
.It Fl c
199
Requests changing the comment in the private and public key files.
200
This operation is only supported for RSA1 keys.
201
The program will prompt for the file containing the private keys, for
202
the passphrase if the key has one, and for the new comment.
203
.It Fl D Ar reader
204
Download the RSA public key stored in the smartcard in
205
.Ar reader .
206
.It Fl e
207
This option will read a private or public OpenSSH key file and
208
print the key in a
209
.Sq SECSH Public Key File Format
210
to stdout.
211
This option allows exporting keys for use by several commercial
212
SSH implementations.
213
.It Fl F Ar hostname
214
Search for the specified
215
.Ar hostname
216
in a
217
.Pa known_hosts
218
file, listing any occurrences found.
219
This option is useful to find hashed host names or addresses and may also be
220
used in conjunction with the
221
.Fl H
222
option to print found keys in a hashed format.
223
.It Fl f Ar filename
224
Specifies the filename of the key file.
225
.It Fl G Ar output_file
226
Generate candidate primes for DH-GEX.
227
These primes must be screened for
228
safety (using the
229
.Fl T
230
option) before use.
231
.It Fl g
232
Use generic DNS format when printing fingerprint resource records using the
233
.Fl r
234
command.
235
.It Fl H
236
Hash a
237
.Pa known_hosts
238
file.
239
This replaces all hostnames and addresses with hashed representations
240
within the specified file; the original content is moved to a file with
241
a .old suffix.
242
These hashes may be used normally by
243
.Nm ssh
244
and
245
.Nm sshd ,
246
but they do not reveal identifying information should the file's contents
247
be disclosed.
248
This option will not modify existing hashed hostnames and is therefore safe
249
to use on files that mix hashed and non-hashed names.
250
.It Fl i
251
This option will read an unencrypted private (or public) key file
252
in SSH2-compatible format and print an OpenSSH compatible private
253
(or public) key to stdout.
254
.Nm
255
also reads the
256
.Sq SECSH Public Key File Format .
257
This option allows importing keys from several commercial
258
SSH implementations.
259
.It Fl l
260
Show fingerprint of specified public key file.
261
Private RSA1 keys are also supported.
262
For RSA and DSA keys
263
.Nm
264
tries to find the matching public key file and prints its fingerprint.
265
.It Fl M Ar memory
266
Specify the amount of memory to use (in megabytes) when generating
267
candidate moduli for DH-GEX.
268
.It Fl N Ar new_passphrase
269
Provides the new passphrase.
270
.It Fl P Ar passphrase
271
Provides the (old) passphrase.
272
.It Fl p
273
Requests changing the passphrase of a private key file instead of
274
creating a new private key.
275
The program will prompt for the file
276
containing the private key, for the old passphrase, and twice for the
277
new passphrase.
278
.It Fl q
279
Silence
280
.Nm ssh-keygen .
281
Used by
282
.Pa /etc/rc
283
when creating a new key.
284
.It Fl R Ar hostname
285
Removes all keys belonging to
286
.Ar hostname
287
from a
288
.Pa known_hosts
289
file.
290
This option is useful to delete hashed hosts (see the
291
.Fl H
292
option above).
293
.It Fl r Ar hostname
294
Print the SSHFP fingerprint resource record named
295
.Ar hostname
296
for the specified public key file.
297
.It Fl S Ar start
298
Specify start point (in hex) when generating candidate moduli for DH-GEX.
299
.It Fl T Ar output_file
300
Test DH group exchange candidate primes (generated using the
301
.Fl G
302
option) for safety.
303
.It Fl t Ar type
304
Specifies the type of key to create.
305
The possible values are
306
.Dq rsa1
307
for protocol version 1 and
308
.Dq rsa
309
or
310
.Dq dsa
311
for protocol version 2.
312
.It Fl U Ar reader
313
Upload an existing RSA private key into the smartcard in
314
.Ar reader .
315
.It Fl v
316
Verbose mode.
317
Causes
318
.Nm
319
to print debugging messages about its progress.
320
This is helpful for debugging moduli generation.
321
Multiple
322
.Fl v
323
options increase the verbosity.
324
The maximum is 3.
325
.It Fl W Ar generator
326
Specify desired generator when testing candidate moduli for DH-GEX.
327
.It Fl y
328
This option will read a private
329
OpenSSH format file and print an OpenSSH public key to stdout.
330
.El
331
.Sh MODULI GENERATION
332
.Nm
333
may be used to generate groups for the Diffie-Hellman Group Exchange
334
(DH-GEX) protocol.
335
Generating these groups is a two-step process: first, candidate
336
primes are generated using a fast, but memory intensive process.
337
These candidate primes are then tested for suitability (a CPU-intensive
338
process).
339
.Pp
340
Generation of primes is performed using the
341
.Fl G
342
option.
343
The desired length of the primes may be specified by the
344
.Fl b
345
option.
346
For example:
347
.Pp
348
.Dl # ssh-keygen -G moduli-2048.candidates -b 2048
349
.Pp
350
By default, the search for primes begins at a random point in the
351
desired length range.
352
This may be overridden using the
353
.Fl S
354
option, which specifies a different start point (in hex).
355
.Pp
356
Once a set of candidates have been generated, they must be tested for
357
suitability.
358
This may be performed using the
359
.Fl T
360
option.
361
In this mode
362
.Nm
363
will read candidates from standard input (or a file specified using the
364
.Fl f
365
option).
366
For example:
367
.Pp
368
.Dl # ssh-keygen -T moduli-2048 -f moduli-2048.candidates
369
.Pp
370
By default, each candidate will be subjected to 100 primality tests.
371
This may be overridden using the
372
.Fl a
373
option.
374
The DH generator value will be chosen automatically for the
375
prime under consideration.
376
If a specific generator is desired, it may be requested using the
377
.Fl W
378
option.
379
Valid generator values are 2, 3, and 5.
380
.Pp
381
Screened DH groups may be installed in
382
.Pa /etc/moduli .
383
It is important that this file contains moduli of a range of bit lengths and
384
that both ends of a connection share common moduli.
385
.Sh FILES
386
.Bl -tag -width Ds
387
.It Pa ~/.ssh/identity
388
Contains the protocol version 1 RSA authentication identity of the user.
389
This file should not be readable by anyone but the user.
390
It is possible to
391
specify a passphrase when generating the key; that passphrase will be
392
used to encrypt the private part of this file using 3DES.
393
This file is not automatically accessed by
394
.Nm
395
but it is offered as the default file for the private key.
396
.Xr ssh 1
397
will read this file when a login attempt is made.
398
.It Pa ~/.ssh/identity.pub
399
Contains the protocol version 1 RSA public key for authentication.
400
The contents of this file should be added to
401
.Pa ~/.ssh/authorized_keys
402
on all machines
403
where the user wishes to log in using RSA authentication.
404
There is no need to keep the contents of this file secret.
405
.It Pa ~/.ssh/id_dsa
406
Contains the protocol version 2 DSA authentication identity of the user.
407
This file should not be readable by anyone but the user.
408
It is possible to
409
specify a passphrase when generating the key; that passphrase will be
410
used to encrypt the private part of this file using 3DES.
411
This file is not automatically accessed by
412
.Nm
413
but it is offered as the default file for the private key.
414
.Xr ssh 1
415
will read this file when a login attempt is made.
416
.It Pa ~/.ssh/id_dsa.pub
417
Contains the protocol version 2 DSA public key for authentication.
418
The contents of this file should be added to
419
.Pa ~/.ssh/authorized_keys
420
on all machines
421
where the user wishes to log in using public key authentication.
422
There is no need to keep the contents of this file secret.
423
.It Pa ~/.ssh/id_rsa
424
Contains the protocol version 2 RSA authentication identity of the user.
425
This file should not be readable by anyone but the user.
426
It is possible to
427
specify a passphrase when generating the key; that passphrase will be
428
used to encrypt the private part of this file using 3DES.
429
This file is not automatically accessed by
430
.Nm
431
but it is offered as the default file for the private key.
432
.Xr ssh 1
433
will read this file when a login attempt is made.
434
.It Pa ~/.ssh/id_rsa.pub
435
Contains the protocol version 2 RSA public key for authentication.
436
The contents of this file should be added to
437
.Pa ~/.ssh/authorized_keys
438
on all machines
439
where the user wishes to log in using public key authentication.
440
There is no need to keep the contents of this file secret.
441
.It Pa /etc/moduli
442
Contains Diffie-Hellman groups used for DH-GEX.
443
The file format is described in
444
.Xr moduli 5 .
445
.El
446
.Sh SEE ALSO
447
.Xr ssh 1 ,
448
.Xr ssh-add 1 ,
449
.Xr ssh-agent 1 ,
450
.Xr moduli 5 ,
451
.Xr sshd 8
452
.Rs
453
.%A J. Galbraith
454
.%A R. Thayer
455
.%T "SECSH Public Key File Format"
456
.%N draft-ietf-secsh-publickeyfile-01.txt
457
.%D March 2001
458
.%O work in progress material
459
.Re
460
.Sh AUTHORS
461
OpenSSH is a derivative of the original and free
462
ssh 1.2.12 release by Tatu Ylonen.
463
Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos,
464
Theo de Raadt and Dug Song
465
removed many bugs, re-added newer features and
466
created OpenSSH.
467
Markus Friedl contributed the support for SSH
468
protocol versions 1.5 and 2.0.
(-)/home/lb/net/src/openssh-4.3p2/ssh-keyscan.1.out (+168 lines)
Line 0 Link Here
1
.\"	$OpenBSD: ssh-keyscan.1,v 1.21 2005/09/30 20:34:26 jaredy Exp $
2
.\"
3
.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>.
4
.\"
5
.\" Modification and redistribution in source and binary forms is
6
.\" permitted provided that due credit is given to the author and the
7
.\" OpenBSD project by leaving this copyright notice intact.
8
.\"
9
.Dd January 1, 1996
10
.Dt SSH-KEYSCAN 1
11
.Os
12
.Sh NAME
13
.Nm ssh-keyscan
14
.Nd gather ssh public keys
15
.Sh SYNOPSIS
16
.Nm ssh-keyscan
17
.Bk -words
18
.Op Fl 46Hv
19
.Op Fl f Ar file
20
.Op Fl p Ar port
21
.Op Fl T Ar timeout
22
.Op Fl t Ar type
23
.Op Ar host | addrlist namelist
24
.Op Ar ...
25
.Ek
26
.Sh DESCRIPTION
27
.Nm
28
is a utility for gathering the public ssh host keys of a number of
29
hosts.
30
It was designed to aid in building and verifying
31
.Pa ssh_known_hosts
32
files.
33
.Nm
34
provides a minimal interface suitable for use by shell and perl
35
scripts.
36
.Pp
37
.Nm
38
uses non-blocking socket I/O to contact as many hosts as possible in
39
parallel, so it is very efficient.
40
The keys from a domain of 1,000
41
hosts can be collected in tens of seconds, even when some of those
42
hosts are down or do not run ssh.
43
For scanning, one does not need
44
login access to the machines that are being scanned, nor does the
45
scanning process involve any encryption.
46
.Pp
47
The options are as follows:
48
.Bl -tag -width Ds
49
.It Fl 4
50
Forces
51
.Nm
52
to use IPv4 addresses only.
53
.It Fl 6
54
Forces
55
.Nm
56
to use IPv6 addresses only.
57
.It Fl f Ar file
58
Read hosts or
59
.Pa addrlist namelist
60
pairs from this file, one per line.
61
If
62
.Pa -
63
is supplied instead of a filename,
64
.Nm
65
will read hosts or
66
.Pa addrlist namelist
67
pairs from the standard input.
68
.It Fl H
69
Hash all hostnames and addresses in the output.
70
Hashed names may be used normally by
71
.Nm ssh
72
and
73
.Nm sshd ,
74
but they do not reveal identifying information should the file's contents
75
be disclosed.
76
.It Fl p Ar port
77
Port to connect to on the remote host.
78
.It Fl T Ar timeout
79
Set the timeout for connection attempts.
80
If
81
.Pa timeout
82
seconds have elapsed since a connection was initiated to a host or since the
83
last time anything was read from that host, then the connection is
84
closed and the host in question considered unavailable.
85
Default is 5 seconds.
86
.It Fl t Ar type
87
Specifies the type of the key to fetch from the scanned hosts.
88
The possible values are
89
.Dq rsa1
90
for protocol version 1 and
91
.Dq rsa
92
or
93
.Dq dsa
94
for protocol version 2.
95
Multiple values may be specified by separating them with commas.
96
The default is
97
.Dq rsa1 .
98
.It Fl v
99
Verbose mode.
100
Causes
101
.Nm
102
to print debugging messages about its progress.
103
.El
104
.Sh SECURITY
105
If a ssh_known_hosts file is constructed using
106
.Nm
107
without verifying the keys, users will be vulnerable to
108
.Em man in the middle
109
attacks.
110
On the other hand, if the security model allows such a risk,
111
.Nm
112
can help in the detection of tampered keyfiles or man in the middle
113
attacks which have begun after the ssh_known_hosts file was created.
114
.Sh FILES
115
.Pa Input format:
116
.Bd -literal
117
1.2.3.4,1.2.4.4 name.my.domain,name,n.my.domain,n,1.2.3.4,1.2.4.4
118
.Ed
119
.Pp
120
.Pa Output format for rsa1 keys:
121
.Bd -literal
122
host-or-namelist bits exponent modulus
123
.Ed
124
.Pp
125
.Pa Output format for rsa and dsa keys:
126
.Bd -literal
127
host-or-namelist keytype base64-encoded-key
128
.Ed
129
.Pp
130
Where
131
.Pa keytype
132
is either
133
.Dq ssh-rsa
134
or
135
.Dq ssh-dss .
136
.Pp
137
.Pa /usr/etc/ssh_known_hosts
138
.Sh EXAMPLES
139
Print the
140
.Pa rsa1
141
host key for machine
142
.Pa hostname :
143
.Bd -literal
144
$ ssh-keyscan hostname
145
.Ed
146
.Pp
147
Find all hosts from the file
148
.Pa ssh_hosts
149
which have new or different keys from those in the sorted file
150
.Pa ssh_known_hosts :
151
.Bd -literal
152
$ ssh-keyscan -t rsa,dsa -f ssh_hosts | \e
153
	sort -u - ssh_known_hosts | diff ssh_known_hosts -
154
.Ed
155
.Sh SEE ALSO
156
.Xr ssh 1 ,
157
.Xr sshd 8
158
.Sh AUTHORS
159
.An -nosplit
160
.An David Mazieres Aq dm@lcs.mit.edu
161
wrote the initial version, and
162
.An Wayne Davison Aq wayned@users.sourceforge.net
163
added support for protocol version 2.
164
.Sh BUGS
165
It generates "Connection closed by remote host" messages on the consoles
166
of all the machines it scans if the server is older than version 2.9.
167
This is because it opens a connection to the ssh port, reads the public
168
key, and drops the connection as soon as it gets the key.
(-)/home/lb/net/src/openssh-4.3p2/ssh-keysign.8.out (+82 lines)
Line 0 Link Here
1
.\" $OpenBSD: ssh-keysign.8,v 1.7 2003/06/10 09:12:11 jmc Exp $
2
.\"
3
.\" Copyright (c) 2002 Markus Friedl.  All rights reserved.
4
.\"
5
.\" Redistribution and use in source and binary forms, with or without
6
.\" modification, are permitted provided that the following conditions
7
.\" are met:
8
.\" 1. Redistributions of source code must retain the above copyright
9
.\"    notice, this list of conditions and the following disclaimer.
10
.\" 2. Redistributions in binary form must reproduce the above copyright
11
.\"    notice, this list of conditions and the following disclaimer in the
12
.\"    documentation and/or other materials provided with the distribution.
13
.\"
14
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16
.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17
.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18
.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19
.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20
.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21
.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24
.\"
25
.Dd May 24, 2002
26
.Dt SSH-KEYSIGN 8
27
.Os
28
.Sh NAME
29
.Nm ssh-keysign
30
.Nd ssh helper program for hostbased authentication
31
.Sh SYNOPSIS
32
.Nm
33
.Sh DESCRIPTION
34
.Nm
35
is used by
36
.Xr ssh 1
37
to access the local host keys and generate the digital signature
38
required during hostbased authentication with SSH protocol version 2.
39
.Pp
40
.Nm
41
is disabled by default and can only be enabled in the
42
global client configuration file
43
.Pa /usr/etc/ssh_config
44
by setting
45
.Cm EnableSSHKeysign
46
to
47
.Dq yes .
48
.Pp
49
.Nm
50
is not intended to be invoked by the user, but from
51
.Xr ssh 1 .
52
See
53
.Xr ssh 1
54
and
55
.Xr sshd 8
56
for more information about hostbased authentication.
57
.Sh FILES
58
.Bl -tag -width Ds
59
.It Pa /usr/etc/ssh_config
60
Controls whether
61
.Nm
62
is enabled.
63
.It Pa /usr/etc/ssh_host_dsa_key, /usr/etc/ssh_host_rsa_key
64
These files contain the private parts of the host keys used to
65
generate the digital signature.
66
They should be owned by root, readable only by root, and not
67
accessible to others.
68
Since they are readable only by root,
69
.Nm
70
must be set-uid root if hostbased authentication is used.
71
.El
72
.Sh SEE ALSO
73
.Xr ssh 1 ,
74
.Xr ssh-keygen 1 ,
75
.Xr ssh_config 5 ,
76
.Xr sshd 8
77
.Sh HISTORY
78
.Nm
79
first appeared in
80
.Ox 3.2 .
81
.Sh AUTHORS
82
.An Markus Friedl Aq markus@openbsd.org
(-)/home/lb/net/src/openssh-4.3p2/ssh_prng_cmds (+75 lines)
Line 0 Link Here
1
# entropy gathering commands
2
3
# Format is: "program-name args" path rate
4
5
# The "rate" represents the number of bits of usuable entropy per
6
# byte of command output. Be conservative.
7
#
8
# $Id: ssh_prng_cmds.in,v 1.9 2003/11/21 12:48:56 djm Exp $
9
10
"ls -alni /var/log"			/bin/ls	0.02
11
"ls -alni /var/adm"			/bin/ls	0.02
12
"ls -alni /usr/adm"                     /bin/ls       0.02
13
"ls -alni /var/mail"			/bin/ls	0.02
14
"ls -alni /usr/mail"                    /bin/ls       0.02
15
"ls -alni /var/adm/syslog"		/bin/ls	0.02
16
"ls -alni /usr/adm/syslog"		/bin/ls	0.02
17
"ls -alni /var/spool/mail"		/bin/ls	0.02
18
"ls -alni /proc"			/bin/ls	0.02
19
"ls -alni /tmp"				/bin/ls	0.02
20
"ls -alni /var/tmp"			/bin/ls	0.02
21
"ls -alni /usr/tmp"			/bin/ls	0.02
22
"ls -alTi /var/log"			/bin/ls	0.02
23
"ls -alTi /var/adm"			/bin/ls	0.02
24
"ls -alTi /var/mail"			/bin/ls	0.02
25
"ls -alTi /var/adm/syslog"		/bin/ls	0.02
26
"ls -alTi /var/spool/mail"		/bin/ls	0.02
27
"ls -alTi /proc"			/bin/ls	0.02
28
"ls -alTi /tmp"				/bin/ls	0.02
29
"ls -alTi /var/tmp"			/bin/ls	0.02
30
"ls -alTi /usr/tmp"			/bin/ls	0.02
31
32
"netstat -an"				/bin/netstat	0.05
33
"netstat -in"				/bin/netstat	0.05
34
"netstat -rn"				/bin/netstat	0.02
35
"netstat -pn"				/bin/netstat	0.02
36
"netstat -ia"                           /bin/netstat  0.05
37
"netstat -s"				/bin/netstat	0.02
38
"netstat -is"				/bin/netstat	0.07
39
40
"arp -n -a"				/usr/sbin/arp	0.02
41
42
"ifconfig -a"				/sbin/ifconfig	0.02
43
44
"ps laxww"				/bin/ps	0.03
45
"ps -al"				/bin/ps	0.03
46
"ps -efl"				/bin/ps	0.03
47
"jstat"				        /usr/bin/jstat    0.07
48
49
"w"					/usr/bin/w	0.05
50
51
"who -i"				/usr/bin/who	0.01
52
53
"last"					/usr/bin/last	0.01
54
55
"lastlog"				/usr/bin/lastlog	0.01
56
57
"df"					/bin/df	0.01
58
"df -i"					/bin/df	0.01
59
60
"sar -d"				undef	0.04
61
62
"vmstat"				/usr/bin/vmstat	0.01
63
"uptime"				/usr/bin/uptime	0.01
64
65
"ipcs -a"				/usr/bin/ipcs	0.01
66
67
"tail -200 /var/log/messages"		/usr/bin/tail	0.01
68
"tail -200 /var/log/syslog"		/usr/bin/tail	0.01
69
"tail -200 /var/adm/messages"		/usr/bin/tail	0.01
70
"tail -200 /var/adm/syslog"		/usr/bin/tail	0.01
71
"tail -200 /var/adm/syslog/syslog.log"	/usr/bin/tail	0.01
72
"tail -200 /var/log/maillog"		/usr/bin/tail	0.01
73
"tail -200 /var/adm/maillog"		/usr/bin/tail	0.01
74
"tail -200 /var/adm/syslog/mail.log"	/usr/bin/tail	0.01
75
(-)/home/lb/net/src/openssh-4.3p2/ssh-rand-helper.8.out (+94 lines)
Line 0 Link Here
1
.\" $Id: ssh-rand-helper.8,v 1.2 2003/11/21 12:48:56 djm Exp $
2
.\"
3
.\" Copyright (c) 2002 Damien Miller.  All rights reserved.
4
.\"
5
.\" Redistribution and use in source and binary forms, with or without
6
.\" modification, are permitted provided that the following conditions
7
.\" are met:
8
.\" 1. Redistributions of source code must retain the above copyright
9
.\"    notice, this list of conditions and the following disclaimer.
10
.\" 2. Redistributions in binary form must reproduce the above copyright
11
.\"    notice, this list of conditions and the following disclaimer in the
12
.\"    documentation and/or other materials provided with the distribution.
13
.\"
14
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16
.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17
.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18
.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19
.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20
.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21
.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24
.\"
25
.Dd April 14, 2002
26
.Dt SSH-RAND-HELPER 8
27
.Os
28
.Sh NAME
29
.Nm ssh-rand-helper
30
.Nd Random number gatherer for OpenSSH
31
.Sh SYNOPSIS
32
.Nm ssh-rand-hlper
33
.Op Fl vxXh
34
.Op Fl b Ar bytes
35
.Sh DESCRIPTION
36
.Nm
37
is a small helper program used by
38
.Xr ssh 1 ,
39
.Xr ssh-add 1 ,
40
.Xr ssh-agent 1 ,
41
.Xr ssh-keygen 1 ,
42
.Xr ssh-keyscan 1
43
and
44
.Xr sshd 8
45
to gather random numbers of cryptographic quality if the
46
.Xr openssl 4
47
library has not been configured to provide them itself.
48
.Pp
49
Normally
50
.Nm
51
will generate a strong random seed and provide it to the calling
52
program via standard output. If standard output is a tty,
53
.Nm
54
will instead print the seed in hexidecimal format unless told otherwise.
55
.Pp
56
.Nm
57
will by default gather random numbers from the system commands listed
58
in
59
.Pa /usr/etc/ssh_prng_cmds .
60
The output of each of the commands listed will be hashed and used to
61
generate a random seed for the calling program.
62
.Nm
63
will also store seed files in
64
.Pa ~/.ssh/prng_seed
65
between executions.
66
.Pp
67
Alternately,
68
.Nm
69
may be configured at build time to collect random numbers from a
70
EGD/PRNGd server via a unix domain or localhost tcp socket.
71
.Pp
72
This program is not intended to be run by the end-user, so the few
73
commandline options are for debugging purposes only.
74
.Bl -tag -width Ds
75
.It Fl b Ar bytes
76
Specify the number of random bytes to include in the output.
77
.It Fl x
78
Output a hexidecimal instead of a binary seed.
79
.It Fl X
80
Force output of a binary seed, even if standard output is a tty
81
.It Fl v
82
Turn on debugging message. Multiple
83
.Fl v
84
options will increase the debugging level.
85
.Fl h
86
Display a summary of options.
87
.El
88
.Sh AUTHORS
89
Damien Miller <djm@mindrot.org>
90
.Sh SEE ALSO
91
.Xr ssh 1 ,
92
.Xr ssh-add 1 ,
93
.Xr ssh-keygen 1 ,
94
.Xr sshd 8
(-)/home/lb/net/src/openssh-4.3p2/survey.sh (+69 lines)
Line 0 Link Here
1
#!/bin/sh
2
#
3
# Copyright (c) 2004, 2005 Darren Tucker
4
#
5
# Permission to use, copy, modify, and distribute this software for any
6
# purpose with or without fee is hereby granted, provided that the above
7
# copyright notice and this permission notice appear in all copies.
8
#
9
# THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
10
# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
11
# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
12
# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
13
# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
14
# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15
# OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16
17
host="x86_64-unknown-linux-gnu"
18
AWK="gawk"
19
CC="gcc"
20
CPP="gcc -E"
21
CFLAGS="-g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wno-pointer-sign -std=gnu99 "
22
CPPFLAGS=""
23
LDFLAGS=""
24
LIBS="-lcrypto -lutil -lz -lnsl  -lcrypt -lresolv -lresolv"
25
26
# Note format:
27
# identifier: [data] CRCR
28
29
echo "openssh-survey-version: 1"
30
echo
31
echo "openssh-version: `./ssh -V 2>&1`"
32
echo
33
configinv=`$AWK '/^  \\\$.*configure/' config.log | sed 's/^  \\\$ //g'`
34
echo "configure-invocation: $configinv"
35
echo
36
echo "host: $host"
37
echo
38
echo "uname: `uname`"
39
echo
40
echo "uname-r: `uname -r`"
41
echo
42
echo "uname-m: `uname -m`"
43
echo
44
echo "uname-p: `uname -p`"
45
echo
46
echo "oslevel: `oslevel 2>/dev/null`"
47
echo
48
echo "oslevel-r: `oslevel -r 2>/dev/null`"
49
echo
50
echo "cc: $CC"
51
echo
52
echo "cflags: $CFLAGS"
53
echo
54
echo "cppflags: $CPPFLAGS"
55
echo
56
echo "ldflags: $LDFLAGS"
57
echo
58
echo "libs: $LIBS"
59
echo
60
echo "ccver-v: `$CC -v 2>&1 | sed '/^[ \t]*$/d'`"
61
echo
62
echo "ccver-V: `$CC -V 2>&1 | sed '/^[ \t]*$/d'`"
63
echo
64
echo "cppdefines:"
65
${CPP} -dM - </dev/null
66
echo
67
echo "config.h:"
68
egrep '#define|#undef' config.h
69
echo

Return to bug 1295