<?Pub UDT _bookmark _target?><?Pub EntList bsol dash hellip gt lt minus?><?Pub CX solbook(book(title()bookinfo()part(4)part(title()partintro()chapter()?><chapter id="sshref-1"><?Pub Tag atict:info tracking="off" ref="0"
restricted="off"?><?Pub Tag atict:user user="sharonr" fullname="Sharon Veach"?><title>Solaris Secure Shell (Reference)</title><highlights><itemizedlist><para>This chapter describes the configuration options in Solaris Secure Shell. The following
is a list of the reference information in this chapter.</para><listitem><para><olink targetptr="sshref-3" remap="internal">A Typical Solaris Secure Shell
Session</olink></para>
</listitem><listitem><para><olink targetptr="sshref-4" remap="internal">Client and Server Configuration
in Solaris Secure Shell</olink></para>
</listitem><listitem><para><olink targetptr="sshref-10" remap="internal">Keywords in Solaris Secure Shell</olink></para>
</listitem><listitem><para><olink targetptr="sshref-11" remap="internal">Maintaining Known Hosts in Solaris
Secure Shell</olink></para>
</listitem><listitem><para><olink targetptr="sshref-28" remap="internal">Solaris Secure Shell Packages
and Initialization</olink></para>
</listitem><listitem><para><olink targetptr="sshref-2" remap="internal">Solaris Secure Shell Files</olink></para>
</listitem><listitem><para><olink targetptr="sshref-13" remap="internal">Solaris Secure Shell Commands</olink></para>
</listitem>
</itemizedlist><para>For procedures to configure Solaris Secure Shell, see <olink targetptr="sshuser-1" remap="internal">Chapter&nbsp;19, Using Solaris Secure Shell (Tasks)</olink>.</para>
</highlights><sect1 id="sshref-3"><title>A Typical Solaris Secure Shell Session</title><indexterm><primary>keywords</primary><seealso>specific keyword</seealso>
</indexterm><indexterm><primary>Solaris Secure Shell</primary><secondary>administering</secondary>
</indexterm><indexterm><primary>administering</primary><secondary>Solaris Secure Shell</secondary><tertiary>overview</tertiary>
</indexterm><indexterm><primary>Solaris Secure Shell</primary><secondary>typical session</secondary>
</indexterm><indexterm><primary>daemons</primary><secondary><command>sshd</command></secondary>
</indexterm><para>The Solaris Secure Shell daemon (<command>sshd</command>) is normally started at boot
time when network services are started. The daemon listens for connections
from clients. A Solaris Secure Shell session begins when the user runs an <command>ssh</command>, <command>scp</command>, or <command>sftp</command> command. A new <command>sshd</command> daemon
is forked for each incoming connection. The forked daemons handle key exchange,
encryption, authentication, command execution, and data exchange with the
client. These session characteristics are determined by client-side configuration
files and server-side configuration files. Command-line arguments can override
the settings in the configuration files.</para><para>The client and server must authenticate themselves to each other. After
successful authentication, the user can execute commands remotely and copy
data between hosts.</para><sect2 id="sshref-12"><title>Session Characteristics in Solaris Secure Shell</title><para><indexterm><primary>configuration files</primary><secondary>Solaris Secure Shell</secondary></indexterm>The server-side behavior of the <command>sshd</command> daemon
is controlled by keyword settings in the <filename>/etc/ssh/sshd_config</filename> file.
For example, the <filename>sshd_config</filename> file controls which types
of authentication are permitted for accessing the server. The server-side
behavior can also be controlled by the command-line options when the <command>sshd</command> daemon is started.</para><itemizedlist><para><indexterm><primary>clients</primary><secondary>configuring for Solaris Secure Shell</secondary></indexterm>The behavior on the client side is controlled by Solaris Secure Shell keywords
in this order of precedence:</para><listitem><para>Command-line options</para>
</listitem><listitem><para>User's configuration file, <filename>~/.ssh/config</filename></para>
</listitem><listitem><para>System-wide configuration file, <filename>/etc/ssh/ssh_config</filename></para>
</listitem>
</itemizedlist><para>For example, a user can override a system-wide configuration <literal>Cipher</literal> setting of <literal>blowfish</literal> by specifying <option>c
3des</option> on the command line.</para>
</sect2><sect2 id="sshref-14"><title>Authentication and Key Exchange in Solaris Secure Shell</title><indexterm><primary>authentication</primary><secondary>Solaris Secure Shell</secondary><tertiary>process</tertiary>
</indexterm><indexterm><primary>Solaris Secure Shell</primary><secondary>authentication steps</secondary>
</indexterm><para>The Solaris Secure Shell protocols, v1 and v2, both support client user/host authentication
and server host authentication. Both protocols involve the exchange of session
cryptographic keys for the protection of Solaris Secure Shell sessions. Each protocol provides
various methods for authentication and key exchange. Some methods are optional. Solaris Secure Shell supports
a number of client authentication mechanisms, as shown in <olink targetptr="sshuser-tbl-1" remap="internal">Table&nbsp;19&ndash;1</olink>. Servers are authenticated
by using known host public keys.</para><para>For the v1 protocol, Solaris Secure Shell supports user authentication with passwords.
The protocol also supports user public keys and authentication with trusted
host public keys. Server authentication is done with a host public key. For
the v1 protocol, all public keys are <olink targetptr="glossary-159" remap="internal">RSA</olink> keys.
Session key exchanges involve the use of an ephemeral server key that is periodically
regenerated.</para><para>For the v2 protocol, Solaris Secure Shell supports user authentication and generic
interactive authentication, which usually involves passwords. The protocol
also supports authentication with user public keys and with trusted host public
keys. The keys can be RSA or <olink targetptr="glossary-145" remap="internal">DSA</olink>.
Session key exchanges consist of Diffie-Hellman ephemeral key exchanges that
are signed in the server authentication step. Additionally, Solaris Secure Shell can use
GSS credentials for authentication.</para><sect3 id="sshref-15"><title>Acquiring GSS Credentials in Solaris Secure Shell</title><para><indexterm><primary>GSS-API</primary><secondary>credentials in Solaris Secure Shell</secondary></indexterm>To use GSS-API for authentication in Solaris Secure Shell, the server must have
GSS-API acceptor credentials and the client must have GSS-API initiator credentials.
Support is available for <literal>mech_dh</literal> and for <literal>mech_krb5</literal>.</para><para><indexterm><primary><literal>mech_dh</literal> mechanism</primary><secondary>GSS-API credentials</secondary></indexterm>For <literal>mech_dh</literal>, the server has GSS-API acceptor
credentials if <literal>root</literal> has run the <command>keylogin</command> command.</para><para><indexterm><primary><literal>mech_krb</literal> mechanism</primary><secondary>GSS-API credentials</secondary></indexterm>For <literal>mech_krb5</literal>, the server has GSS-API acceptor
credentials when the host principal that corresponds to the server has a valid
entry in <filename>/etc/krb5/krb5.keytab</filename>.</para><itemizedlist><para>The client has initiator credentials for <literal>mech_dh</literal> if
one of the following has been done:</para><listitem><para>The <command>keylogin</command> command has been run.</para>
</listitem><listitem><para>The <literal>pam_dhkeys</literal> module is used in the <filename>pam.conf</filename> file.</para>
</listitem>
</itemizedlist><itemizedlist><para>The client has initiator credentials for <literal>mech_krb5</literal> if
one of the following has been done:</para><listitem><para>The <command>kinit</command> command has been run.</para>
</listitem><listitem><para>The <literal>pam_krb5</literal> module is used in the <filename>pam.conf</filename> file.</para>
</listitem>
</itemizedlist><para>For the use of <literal>mech_dh</literal> in secure RPC, see <olink targetptr="auth-1" remap="internal">Chapter&nbsp;16, Using Authentication Services (Tasks)</olink>.
For the use of <literal>mech_krb5</literal>, see <olink targetptr="intro-1" remap="internal">Chapter&nbsp;21, Introduction to the Kerberos Service</olink>. For more information on mechanisms,
see the <olink targetdoc="group-refman" targetptr="mech-4" remap="external"><citerefentry><refentrytitle>mech</refentrytitle><manvolnum>4</manvolnum></citerefentry></olink> and <olink targetdoc="group-refman" targetptr="mech-spnego-5" remap="external"><citerefentry><refentrytitle>mech_spnego</refentrytitle><manvolnum>5</manvolnum></citerefentry></olink> man pages.</para>
</sect3>
</sect2><sect2 id="sshref-16"><title>Command Execution and Data Forwarding in Solaris Secure Shell</title><indexterm><primary>Solaris Secure Shell</primary><secondary>command execution</secondary>
</indexterm><indexterm><primary>command execution</primary><secondary>Solaris Secure Shell</secondary>
</indexterm><indexterm><primary>Solaris Secure Shell</primary><secondary>data forwarding</secondary>
</indexterm><indexterm><primary>data forwarding</primary><secondary>Solaris Secure Shell</secondary>
</indexterm><indexterm><primary>X11 forwarding</primary><secondary>in Solaris Secure Shell</secondary>
</indexterm><indexterm><primary>TCP</primary><secondary>Solaris Secure Shell and</secondary>
</indexterm><indexterm><primary>pseudo-tty</primary><secondary>use in Solaris Secure Shell</secondary>
</indexterm><para><indexterm><primary>components</primary><secondary>Solaris Secure Shell user session</secondary></indexterm>After authentication is complete, the user can use Solaris Secure Shell, generally
by requesting a shell or executing a command. Through the <command>ssh</command> command
options, the user can make requests. Requests can include allocating a pseudo-tty,
forwarding X11 connections or TCP/IP connections, or enabling an <command>ssh-agent</command> authentication program over a secure connection.</para><orderedlist><para>The basic components of a user session are as follows:</para><listitem><para>The user requests a shell or the execution of a command, which
begins the session mode.</para><para>In this mode, data is sent or received
through the terminal on the client side. On the server side, data is sent
through the shell or a command.</para>
</listitem><listitem><para>When data transfer is complete, the user program terminates.</para>
</listitem><listitem><para>All X11 forwarding and TCP/IP forwarding is stopped, except
for those connections that already exist. Existing X11 connections and TCP/IP
connections remain open.</para>
</listitem><listitem><para>The server sends an exit status message to the client. When
all connections are closed, such as forwarded ports that had remained open,
the client closes the connection to the server. Then, the client exits.</para>
</listitem>
</orderedlist>
</sect2>
</sect1><sect1 id="sshref-4"><title>Client and Server Configuration in Solaris Secure Shell</title><para>The characteristics of a Solaris Secure Shell session are controlled by configuration
files. The configuration files can be overridden to a certain degree by options
on the command line.</para><sect2 id="sshref-18"><title>Client Configuration in Solaris Secure Shell</title><indexterm><primary>Solaris Secure Shell</primary><secondary>configuring clients</secondary>
</indexterm><indexterm><primary>configuring</primary><secondary>Solaris Secure Shell</secondary><tertiary>clients</tertiary>
</indexterm><indexterm><primary>administering</primary><secondary>Solaris Secure Shell</secondary><tertiary>clients</tertiary>
</indexterm><indexterm><primary>clients</primary><secondary>configuring for Solaris Secure Shell</secondary>
</indexterm><indexterm><primary><filename>ssh_config</filename> file</primary><secondary>configuring Solaris Secure Shell</secondary>
</indexterm><indexterm><primary><filename>/etc/ssh/ssh_config</filename> file</primary><secondary>configuring Solaris Secure Shell</secondary>
</indexterm><para>In most cases, the client-side characteristics of a Solaris Secure Shell session are
governed by the system-wide configuration file, <filename>/etc/ssh/ssh_config</filename>.
The settings in the <filename>ssh_config</filename> file can be overridden
by the user's configuration file, <filename>~/.ssh/config</filename>. In addition,
the user can override both configuration files on the command line.</para><para>The settings in the server's <filename>/etc/ssh/sshd_config</filename> file
determine which client requests are permitted by the server. For a list of
server configuration settings, see <olink targetptr="sshref-10" remap="internal">Keywords in
Solaris Secure Shell</olink>. For detailed information, see the <olink targetdoc="group-refman" targetptr="sshd-config-4" remap="external"><citerefentry><refentrytitle>sshd_config</refentrytitle><manvolnum>4</manvolnum></citerefentry></olink> man page.</para><para>The keywords in the client configuration file are listed in <olink targetptr="sshref-10" remap="internal">Keywords in Solaris Secure Shell</olink>. If the keyword
has a default value, the value is given. These keywords are described in detail
in the <olink targetdoc="group-refman" targetptr="ssh-1" remap="external"><citerefentry><refentrytitle>ssh</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink>, <olink targetdoc="group-refman" targetptr="scp-1" remap="external"><citerefentry><refentrytitle>scp</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink>, <olink targetdoc="group-refman" targetptr="sftp-1" remap="external"><citerefentry><refentrytitle>sftp</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink>, and <olink targetdoc="group-refman" targetptr="ssh-config-4" remap="external"><citerefentry><refentrytitle>ssh_config</refentrytitle><manvolnum>4</manvolnum></citerefentry></olink> man
pages. For a list of keywords in alphabetical order and their equivalent command-line
overrides, see <olink targetptr="sshref-27" remap="internal">Table&nbsp;20&ndash;8</olink>.</para>
</sect2><sect2 id="sshref-20"><title>Server Configuration in Solaris Secure Shell</title><indexterm><primary><filename>sshd_config</filename> file</primary><secondary>keywords</secondary><see>specific keyword</see>
</indexterm><indexterm><primary>Solaris Secure Shell</primary><secondary>configuring server</secondary>
</indexterm><indexterm><primary>servers</primary><secondary>configuring for Solaris Secure Shell</secondary>
</indexterm><indexterm><primary>configuring</primary><secondary>Solaris Secure Shell</secondary><tertiary>servers</tertiary>
</indexterm><indexterm><primary>administering</primary><secondary>Solaris Secure Shell</secondary><tertiary>servers</tertiary>
</indexterm><para>The server-side characteristics of a Solaris Secure Shell session are governed by the <filename>/etc/ssh/sshd_config</filename> file. The keywords in the server configuration
file are listed in <olink targetptr="sshref-10" remap="internal">Keywords in Solaris Secure
Shell</olink>. If the keyword has a default value, the value is given. For
a full description of the keywords, see the <olink targetdoc="group-refman" targetptr="sshd-config-4" remap="external"><citerefentry><refentrytitle>sshd_config</refentrytitle><manvolnum>4</manvolnum></citerefentry></olink> man page.</para>
</sect2>
</sect1><sect1 id="sshref-10"><title>Keywords in Solaris Secure Shell</title><indexterm><primary>Solaris Secure Shell</primary><secondary>keywords</secondary>
</indexterm><indexterm><primary>keywords</primary><secondary>Solaris Secure Shell</secondary>
</indexterm><indexterm><primary><filename>sshd_config</filename> file</primary><secondary>keywords</secondary>
</indexterm><indexterm><primary><filename>/etc/ssh/ssh_config</filename> file</primary><secondary>keywords</secondary>
</indexterm><indexterm><primary><filename>ssh_config</filename> file</primary><secondary>keywords</secondary>
</indexterm><indexterm><primary><filename>/etc/ssh/sshd_config</filename> file</primary><secondary>keywords</secondary>
</indexterm><para>The following tables list the keywords and their default values, if
any. The keywords are in alphabetical order. The location of keywords on the
client is the <filename>ssh_config</filename> file. Keywords that apply to
the server are in the <filename>sshd_config</filename> file. Some keywords
are set in both files. If the keyword applies to only one protocol version,
the version is listed.</para><table frame="topbot" id="sshref-tbl-3"><title>Keywords in Solaris Secure Shell Configuration
Files (A to Escape)</title><tgroup cols="4" colsep="0" rowsep="0"><colspec colwidth="38.85*"/><colspec colwidth="39.59*"/><colspec colname="colspec0" colwidth="13.11*"/><colspec colname="colspec2" colwidth="8.47*"/><thead><row rowsep="1"><entry><para>Keyword</para>
</entry><entry><para>Default Value</para>
</entry><entry><para>Location</para>
</entry><entry><para>Protocol</para>
</entry>
</row>
</thead><tbody><row><entry><para><indexterm><primary><literal>AllowGroups</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>AllowGroups</literal></para>
</entry><entry><para>No default.</para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>AllowTcpForwarding</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>AllowTcpForwarding</literal></para>
</entry><entry><para><literal>no</literal></para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>AllowUsers</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>AllowUsers</literal></para>
</entry><entry><para>No default.</para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>AuthorizedKeysFile</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>AuthorizedKeysFile</literal></para>
</entry><entry><para><filename>~/.ssh/authorized_keys</filename></para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>Banner</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>Banner</literal></para>
</entry><entry><para><filename>/etc/issue</filename></para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>Batchmode</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>Batchmode</literal></para>
</entry><entry><para><literal>no</literal></para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>BindAddress</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>BindAddress</literal></para>
</entry><entry><para>No default.</para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>CheckHostIP</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><indexterm><primary>IP addresses</primary><secondary>Solaris Secure Shell checking</secondary></indexterm><literal>CheckHostIP</literal></para>
</entry><entry><para><literal>yes</literal></para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>Cipher</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>Cipher</literal></para>
</entry><entry><para><indexterm><primary>encryption</primary><secondary>specifying algorithms in <filename>ssh_config</filename> file</secondary></indexterm><indexterm><primary>Blowfish encryption algorithm</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><indexterm><primary><literal>3des</literal> encryption algorithm</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>blowfish</literal>, <literal>3des</literal></para>
</entry><entry><para>Client</para>
</entry><entry><para>v1</para>
</entry>
</row><row><entry><para><indexterm><primary><literal>Ciphers</literal> keyword</primary><secondary>Solaris Secure Shell</secondary></indexterm><literal>Ciphers</literal></para>
</entry><entry><para><indexterm><primary><literal>3des-cbc</literal> encryption algorithm</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><indexterm><primary><literal>blowfish-cbc</literal> encryption algorithm</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><indexterm><primary><literal>aes128-cbc</literal> encryption algorithm</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><indexterm><primary><literal>aes128-ctr</literal> encryption algorithm</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><indexterm><primary><literal>arcfour</literal> encryption algorithm</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>aes128-ctr, aes128-cbc, 3des-cbc, blowfish-cbc, arcfour</literal></para>
</entry><entry><para>Both</para>
</entry><entry><para>v2</para>
</entry>
</row><row><entry><para><indexterm><primary><literal>ClearAllForwardings</literal> keyword</primary><secondary>Solaris Secure Shell port forwarding</secondary></indexterm><literal>ClearAllForwardings</literal></para>
</entry><entry><para>No default.</para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>ClientAliveInterval</literal> keyword</primary><secondary>Solaris Secure Shell port forwarding</secondary></indexterm><literal>ClientAliveInterval</literal></para>
</entry><entry><para><literal>0</literal></para>
</entry><entry><para>Server</para>
</entry><entry><para>v2</para>
</entry>
</row><row><entry><para><indexterm><primary><literal>ClientAliveCountMax</literal> keyword</primary><secondary>Solaris Secure Shell port forwarding</secondary></indexterm><literal>ClientAliveCountMax</literal></para>
</entry><entry><para><literal>3</literal></para>
</entry><entry><para>Server</para>
</entry><entry><para>v2</para>
</entry>
</row><row><entry><para><indexterm><primary><literal>Compression</literal> keyword</primary><secondary>Solaris Secure Shell</secondary></indexterm><literal>Compression</literal></para>
</entry><entry><para><literal>yes</literal></para>
</entry><entry><para>Both</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>CompressionLevel</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>CompressionLevel</literal></para>
</entry><entry><para>No default.</para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>ConnectionAttempts</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>ConnectionAttempts</literal></para>
</entry><entry><para><literal>1</literal></para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>DenyGroups</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>DenyGroups</literal></para>
</entry><entry><para>No default.</para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>DenyUsers</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>DenyUsers</literal></para>
</entry><entry><para>No default.</para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>DynamicForward</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>DynamicForward</literal></para>
</entry><entry><para>No default.</para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>EscapeChar</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>EscapeChar</literal></para>
</entry><entry><para><literal>~</literal></para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row>
</tbody>
</tgroup>
</table><table frame="topbot" id="sshref-tbl-4"><title>Keywords in Solaris Secure Shell Configuration
Files (Fall to Local)</title><tgroup cols="4" colsep="0" rowsep="0"><colspec colwidth="50.34*"/><colspec colwidth="32.26*"/><colspec colname="colspec0" colwidth="10.59*"/><colspec colname="colspec2" colwidth="6.82*"/><thead><row rowsep="1"><entry><para>Keyword</para>
</entry><entry><para>Default Value</para>
</entry><entry><para>Location</para>
</entry><entry><para>Protocol</para>
</entry>
</row>
</thead><tbody><row><entry><para><indexterm><primary><literal>FallBackToRsh</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>FallBackToRsh</literal></para>
</entry><entry><para><literal>no</literal></para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>ForwardAgent</literal> keyword</primary><secondary>Solaris Secure Shell forwarded authentication</secondary></indexterm><literal>ForwardAgent</literal></para>
</entry><entry><para><literal>no</literal></para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>ForwardX11</literal> keyword</primary><secondary>Solaris Secure Shell port forwarding</secondary></indexterm><indexterm><primary>X11 forwarding</primary><secondary>configuring in <filename>ssh_config</filename> file</secondary></indexterm><literal>ForwardX11</literal></para>
</entry><entry><para><literal>no</literal></para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>GatewayPorts</literal> keyword</primary><secondary>Solaris Secure Shell</secondary></indexterm><literal>GatewayPorts</literal></para>
</entry><entry><para><literal>no</literal></para>
</entry><entry><para>Both</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>GlobalKnownHostsFile</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><indexterm><primary><literal>GlobalKnownHostsFile2</literal> keyword</primary><see><literal>GlobalKnownHostsFile</literal> keyword</see></indexterm><literal>GlobalKnownHostsFile</literal></para>
</entry><entry><para><filename>/etc/ssh/ssh_known_hosts</filename></para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>GSSAPIAuthentication</literal> keyword</primary><secondary>Solaris Secure Shell</secondary></indexterm><literal>GSSAPIAuthentication</literal> </para>
</entry><entry><para><literal>yes</literal></para>
</entry><entry><para>Both</para>
</entry><entry><para>v2</para>
</entry>
</row><row><entry><para><indexterm><primary><literal>GSSAPIDelegateCredentials</literal> keyword</primary><secondary>Solaris Secure Shell</secondary></indexterm><literal>GSSAPIDelegateCredentials</literal></para>
</entry><entry><para><literal>no</literal></para>
</entry><entry><para>Client</para>
</entry><entry><para>v2</para>
</entry>
</row><row><entry><para><indexterm><primary><literal>GSSAPIKeyExchange</literal> keyword</primary><secondary>Solaris Secure Shell</secondary></indexterm><literal>GSSAPIKeyExchange</literal></para>
</entry><entry><para><literal>yes</literal></para>
</entry><entry><para>Both</para>
</entry><entry><para>v2</para>
</entry>
</row><row><entry><para><indexterm><primary><literal>GSSAPIStoreDelegatedCredentials</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>GSSAPIStoreDelegateCredentials</literal></para>
</entry><entry><para><literal>no</literal></para>
</entry><entry><para>Client</para>
</entry><entry><para>v2</para>
</entry>
</row><row><entry><para><indexterm><primary><literal>Host</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>Host</literal></para>
</entry><entry><para><literal>*</literal> For more information, see <olink targetptr="sshref-23" remap="internal">Host-Specific Parameters in Solaris Secure Shell</olink>.</para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>HostbasedAuthentication</literal> keyword</primary><secondary>Solaris Secure Shell</secondary></indexterm><literal>HostbasedAuthentication</literal></para>
</entry><entry><para><literal>no</literal></para>
</entry><entry><para>Both</para>
</entry><entry><para>v2</para>
</entry>
</row><row><entry><para><indexterm><primary><literal>HostbasedUsesNamesFromPacketOnly</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>HostbasedUsesNamesFromPacketOnly</literal></para>
</entry><entry><para><literal>no</literal></para>
</entry><entry><para>Server</para>
</entry><entry><para>v2</para>
</entry>
</row><row><entry><para><indexterm><primary><literal>HostKey</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>HostKey</literal></para>
</entry><entry><para><filename>/etc/ssh/ssh_host_key</filename></para>
</entry><entry><para>Server</para>
</entry><entry><para>v1</para>
</entry>
</row><row><entry><para><literal>HostKey</literal></para>
</entry><entry><para><filename>/etc/ssh/host_rsa_key</filename>, <filename>/etc/ssh/host_dsa_key</filename></para>
</entry><entry><para>Server</para>
</entry><entry><para>v2</para>
</entry>
</row><row><entry><para><indexterm><primary><literal>HostKeyAlgorithms</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>HostKeyAlgorithms</literal></para>
</entry><entry><para><literal>ssh-rsa, ssh-dss</literal></para>
</entry><entry><para>Client</para>
</entry><entry><para>v2</para>
</entry>
</row><row><entry><para><indexterm><primary><literal>HostKeyAlias</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>HostKeyAlias</literal></para>
</entry><entry><para>No default.</para>
</entry><entry><para>Client</para>
</entry><entry><para>v2</para>
</entry>
</row><row><entry><para><indexterm><primary><literal>IdentityFile</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>IdentityFile</literal></para>
</entry><entry><para><filename>~/.ssh/identity</filename></para>
</entry><entry><para>Client</para>
</entry><entry><para>v1</para>
</entry>
</row><row><entry><para><literal>IdentityFile</literal></para>
</entry><entry><para><filename>~/.ssh/id_dsa, ~/.ssh/id_rsa</filename></para>
</entry><entry><para>Client</para>
</entry><entry><para>v2</para>
</entry>
</row><row><entry><para><indexterm><primary><literal>IgnoreRhosts</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>IgnoreRhosts</literal></para>
</entry><entry><para><literal>yes</literal></para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>IgnoreUserKnownHosts</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>IgnoreUserKnownHosts</literal></para>
</entry><entry><para><literal>yes</literal></para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>KbdInteractiveAuthentication</literal> keyword</primary><secondary>Solaris Secure Shell</secondary></indexterm><indexterm><primary><literal>ChallengeResponseAuthentication</literal> keyword</primary><see><literal>KbdInteractiveAuthentication</literal> keyword</see></indexterm><literal>KbdInteractiveAuthentication</literal></para>
</entry><entry><para><literal>yes</literal></para>
</entry><entry><para>Both</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>KeepAlive</literal> keyword</primary><secondary>Solaris Secure Shell</secondary></indexterm><literal>KeepAlive</literal></para>
</entry><entry><para><literal>yes</literal></para>
</entry><entry><para>Both</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>KeyRegenerationInterval</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>KeyRegenerationInterval</literal></para>
</entry><entry><para><literal>3600</literal> (seconds)</para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>ListenAddress</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>ListenAddress</literal></para>
</entry><entry><para>No default.</para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>LocalForward</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>LocalForward</literal></para>
</entry><entry><para>No default.</para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row>
</tbody>
</tgroup>
</table><table frame="topbot" id="sshref-tbl-5"><title>Keywords in Solaris Secure Shell Configuration
Files (Login to R)</title><tgroup cols="4" colsep="0" rowsep="0"><colspec colwidth="47.54*"/><colspec colwidth="32.39*"/><colspec colname="colspec0" colwidth="12.20*"/><colspec colname="colspec2" colwidth="7.88*"/><thead><row rowsep="1"><entry><para>Keyword</para>
</entry><entry><para>Default Value</para>
</entry><entry><para>Location</para>
</entry><entry><para>Protocol</para>
</entry>
</row>
</thead><tbody><row><entry><para><indexterm><primary><literal>LoginGraceTime</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>LoginGraceTime</literal></para>
</entry><entry><para><literal>600</literal> (seconds)</para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>LogLevel</literal> keyword</primary><secondary>Solaris Secure Shell</secondary></indexterm><literal>LogLevel</literal></para>
</entry><entry><para><literal>info</literal></para>
</entry><entry><para>Both</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>LookupClientHostname</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>LookupClientHostname</literal></para>
</entry><entry><para><literal>yes</literal></para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>MACS</literal> keyword</primary><secondary>Solaris Secure Shell</secondary></indexterm><literal>MACs</literal></para>
</entry><entry><para><indexterm><primary><literal>hmac-md5</literal> algorithm</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><indexterm><primary><literal>hmac-sha1</literal> encryption algorithm</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>hmac-sha1,hmac-md5</literal></para>
</entry><entry><para>Both</para>
</entry><entry><para>v2</para>
</entry>
</row><row><entry><para><indexterm><primary><literal>MaxAuthTries</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>MaxAuthTries</literal></para>
</entry><entry><para><literal>6</literal></para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>MaxAuthTriesLog</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>MaxAuthTriesLog</literal></para>
</entry><entry><para>No default.</para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>MaxStartups</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>MaxStartups</literal></para>
</entry><entry><para><literal>10:30:60</literal></para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>NoHostAuthenticationForLocalHost</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>NoHostAuthenticationForLocalHost</literal></para>
</entry><entry><para><literal>no</literal></para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>NumberOfPasswordPrompts</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>NumberOfPasswordPrompts</literal></para>
</entry><entry><para><literal>3</literal></para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>PAMAuthenticationViaKBDInt</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>PAMAuthenticationViaKBDInt</literal></para>
</entry><entry><para><literal>yes</literal></para>
</entry><entry><para>Server</para>
</entry><entry><para>v2</para>
</entry>
</row><row><entry><para><indexterm><primary><literal>PasswordAuthentication</literal> keyword</primary><secondary>Solaris Secure Shell</secondary></indexterm><literal>PasswordAuthentication</literal></para>
</entry><entry><para><literal>yes</literal></para>
</entry><entry><para>Both</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>PermitEmptyPasswords</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>PermitEmptyPasswords</literal></para>
</entry><entry><para><literal>no</literal></para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>PermitRootLogin</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>PermitRootLogin</literal></para>
</entry><entry><para><literal>no</literal></para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>PermitUserEnvironment</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>PermitUserEnvironment</literal></para>
</entry><entry><para><literal>no</literal></para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>PreferredAuthentications</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>PreferredAuthentications</literal></para>
</entry><entry><para><literal>gssapi-keyex, gssapi-with-mic, hostbased, publickey, keyboard-interactive,
password</literal></para>
</entry><entry><para>Client</para>
</entry><entry><para>v2</para>
</entry>
</row><row><entry><para><indexterm><primary><literal>Port</literal> keyword</primary><secondary>Solaris Secure Shell</secondary></indexterm><literal>Port</literal></para>
</entry><entry><para><literal>22</literal></para>
</entry><entry><para>Both</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>PrintMotd</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>PrintMotd</literal></para>
</entry><entry><para><literal>no</literal></para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>Protocol</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>Protocol</literal></para>
</entry><entry><para><literal>2</literal></para>
</entry><entry><para>Both</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>ProxyCommand</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>ProxyCommand</literal></para>
</entry><entry><para>No default.</para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>PubkeyAuthentication</literal> keyword</primary><secondary>Solaris Secure Shell</secondary></indexterm><indexterm><primary><literal>DSAAuthentication</literal> keyword</primary><see><literal>PubkeyAuthentication</literal> keyword</see></indexterm><literal>PubkeyAuthentication</literal></para>
</entry><entry><para><literal>yes</literal></para>
</entry><entry><para>Both</para>
</entry><entry><para>v2</para>
</entry>
</row><row><entry><para><indexterm><primary><literal>RemoteForward</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>RemoteForward</literal></para>
</entry><entry><para>No default.</para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>RhostsAuthentication</literal> keyword</primary><secondary>Solaris Secure Shell</secondary></indexterm><literal>RhostsAuthentication</literal></para>
</entry><entry><para><literal>no</literal></para>
</entry><entry><para>Both</para>
</entry><entry><para>v1</para>
</entry>
</row><row><entry><para><indexterm><primary><literal>RhostsRSAAuthentication</literal> keyword</primary><secondary>Solaris Secure Shell</secondary></indexterm><literal>RhostsRSAAuthentication</literal></para>
</entry><entry><para><literal>no</literal></para>
</entry><entry><para>Both</para>
</entry><entry><para>v1</para>
</entry>
</row><row><entry><para><indexterm><primary><literal>RSAAuthentication</literal> keyword</primary><secondary>Solaris Secure Shell</secondary></indexterm><literal>RSAAuthentication</literal></para>
</entry><entry><para><literal>no</literal></para>
</entry><entry><para>Both</para>
</entry><entry><para>v1</para>
</entry>
</row>
</tbody>
</tgroup>
</table><table frame="topbot" id="sshref-tbl-6"><title>Keywords in Solaris Secure Shell Configuration
Files (S to X)</title><tgroup cols="4" colsep="0" rowsep="0"><colspec colwidth="47.54*"/><colspec colwidth="32.39*"/><colspec colname="colspec0" colwidth="12.20*"/><colspec colname="colspec2" colwidth="7.88*"/><thead><row rowsep="1"><entry><para>Keyword</para>
</entry><entry><para>Default Value</para>
</entry><entry><para>Location</para>
</entry><entry><para>Protocol</para>
</entry>
</row>
</thead><tbody><row><entry><para><indexterm><primary><literal>ServerKeyBits</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>ServerKeyBits</literal></para>
</entry><entry><para><literal>768</literal></para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>StrictHostKeyChecking</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>StrictHostKeyChecking</literal></para>
</entry><entry><para><literal>ask</literal></para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>StrictModes</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>StrictModes</literal></para>
</entry><entry><para><literal>yes</literal></para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>Subsystem</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>Subsystem</literal></para>
</entry><entry><para><literal>sftp /usr/lib/ssh/sftp-server</literal></para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>SyslogFacility</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>SyslogFacility</literal></para>
</entry><entry><para><literal>auth</literal></para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>UseLogin</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>UseLogin</literal></para>
</entry><entry><para><literal>no</literal> Deprecated and ignored.</para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>User</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>User</literal></para>
</entry><entry><para>No default.</para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>UserKnownHostsFile</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><indexterm><primary><literal>UserKnownHostsFile2</literal> keyword</primary><see><literal>UserKnownHostsFile</literal> keyword</see></indexterm><literal>UserKnownHostsFile</literal></para>
</entry><entry><para><filename>~/.ssh/known_hosts</filename></para>
</entry><entry><para>Client</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>VerifyReverseMapping</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary></indexterm><literal>VerifyReverseMapping</literal></para>
</entry><entry><para><literal>no</literal></para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>X11Forwarding</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>X11Forwarding</literal></para>
</entry><entry><para><literal>yes</literal></para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>X11DisplayOffset</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>X11DisplayOffset</literal></para>
</entry><entry><para><literal>10</literal></para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>X11UseLocalHost</literal> keyword</primary><secondary><filename>sshd_config</filename> file</secondary></indexterm><literal>X11UseLocalHost</literal></para>
</entry><entry><para><literal>yes</literal></para>
</entry><entry><para>Server</para>
</entry><entry>
</entry>
</row><row><entry><para><indexterm><primary><literal>XAuthLocation</literal> keyword</primary><secondary>Solaris Secure Shell port forwarding</secondary></indexterm><indexterm><primary><command>xauth</command> command</primary><secondary>X11 forwarding</secondary></indexterm><literal>XAuthLocation</literal></para>
</entry><entry><para>No default.</para>
</entry><entry><para>Both</para>
</entry><entry>
</entry>
</row>
</tbody>
</tgroup>
</table><sect2 id="sshref-23"><title>Host-Specific Parameters in Solaris Secure Shell</title><indexterm><primary><filename>ssh_config</filename> file</primary><secondary>host-specific parameters</secondary>
</indexterm><indexterm><primary><filename>/etc/ssh/ssh_config</filename> file</primary><secondary>host-specific parameters</secondary>
</indexterm><indexterm><primary><filename>ssh_config</filename> file</primary><secondary>keywords</secondary><see>specific keyword</see>
</indexterm><indexterm><primary><literal>Host</literal> keyword</primary><secondary><filename>ssh_config</filename> file</secondary>
</indexterm><para>If it is useful to have different Solaris Secure Shell characteristics for different
local hosts, the administrator can define separate sets of parameters in the <filename>/etc/ssh/ssh_config</filename> file to be applied according to host or regular
expression. This task is done by grouping entries in the file by <literal>Host</literal> keyword.
If the <literal>Host</literal> keyword is not used, the entries in the client
configuration file apply to whichever local host a user is working on.</para>
</sect2><sect2 id="sshref-17"><title>Solaris Secure Shell and Login Environment Variables</title><indexterm><primary>Solaris Secure Shell</primary><secondary>login environment variables and</secondary>
</indexterm><indexterm><primary>variables</primary><secondary><command>login</command> and Solaris Secure Shell</secondary>
</indexterm><indexterm><primary><filename>sshd_config</filename> file</primary><secondary>overrides of <filename>/etc/default/login</filename> entries</secondary>
</indexterm><indexterm><primary><filename>/etc/default/login</filename> file</primary><secondary>Solaris Secure Shell and</secondary>
</indexterm><indexterm><primary><command>login</command> environment variables</primary><secondary>Solaris Secure Shell and</secondary>
</indexterm><indexterm><primary>environment variables</primary><secondary>Solaris Secure Shell and</secondary>
</indexterm><para>When the following Solaris Secure Shell keywords are not set in the <filename>sshd_config</filename> file,
they get their value from equivalent entries in the <filename>/etc/default/login</filename> file:</para><informaltable frame="topbot"><tgroup cols="2" colsep="0" rowsep="0"><colspec colwidth="41.49*"/><colspec colwidth="58.51*"/><thead><row rowsep="1"><entry><para>Entry in <filename>/etc/default/login</filename></para>
</entry><entry><para>Keyword and Value in <filename>sshd_config</filename></para>
</entry>
</row>
</thead><tbody><row><entry><para><indexterm><primary><envar>CONSOLE</envar> in Solaris Secure Shell</primary></indexterm><literal>CONSOLE=*</literal></para>
</entry><entry><para><literal>PermitRootLogin=without-password</literal></para>
</entry>
</row><row><entry><para><literal>#CONSOLE=*</literal></para>
</entry><entry><para><literal>PermitRootLogin=yes</literal></para>
</entry>
</row><row><entry><para><indexterm><primary><envar>PASSREQ</envar> in Solaris Secure Shell</primary></indexterm><literal>PASSREQ=YES</literal></para>
</entry><entry><para><literal>PermitEmptyPasswords=no</literal></para>
</entry>
</row><row><entry><para><literal>PASSREQ=NO</literal></para>
</entry><entry><para><literal>PermitEmptyPasswords=yes</literal></para>
</entry>
</row><row><entry><para><literal>#PASSREQ</literal></para>
</entry><entry><para><literal>PermitEmptyPasswords=no</literal></para>
</entry>
</row><row><entry><para><indexterm><primary><envar>TIMEOUT</envar> in Solaris Secure Shell</primary></indexterm><literal>TIMEOUT=</literal><replaceable>secs</replaceable></para>
</entry><entry><para><literal>LoginGraceTime=</literal><replaceable>secs</replaceable></para>
</entry>
</row><row><entry><para><literal>#TIMEOUT</literal></para>
</entry><entry><para><literal>LoginGraceTime=300</literal></para>
</entry>
</row><row><entry><para><indexterm><primary><envar>RETRIES</envar> in Solaris Secure Shell</primary></indexterm><indexterm><primary><envar>SYSLOG_FAILED_LOGINS</envar></primary><secondary>in Solaris Secure Shell</secondary></indexterm><literal>RETRIES</literal> and <literal>SYSLOG_FAILED_LOGINS</literal></para>
</entry><entry><para>Apply only to <literal>password</literal> and <literal>keyboard-interactive</literal> authentication methods.</para>
</entry>
</row>
</tbody>
</tgroup>
</informaltable><para><indexterm><primary>variables</primary><secondary>setting in Solaris Secure Shell</secondary></indexterm>When the following variables are set by the <command>login</command> command,
the <command>sshd</command> daemon uses those values. When the variables are
not set, the daemon uses the default value.</para><variablelist><varlistentry><term><envar>TIMEZONE</envar></term><listitem><para><indexterm><primary><envar>TZ</envar> in Solaris Secure Shell</primary></indexterm>Controls the setting of the <envar>TZ</envar> environment variable.
When not set, the <command>sshd</command> daemon uses value of <envar>TZ</envar> when
the daemon was started.</para>
</listitem>
</varlistentry><varlistentry><term><envar>ALTSHELL</envar></term><listitem><para><indexterm><primary><envar>ALTSHELL</envar> in Solaris Secure Shell</primary></indexterm>Controls the setting of the <envar>SHELL</envar> environment variable.
The default is <literal>ALTSHELL=YES</literal>, where the <command>sshd</command> daemon
uses the value of the user's shell. When <literal>ALTSHELL=NO</literal>, the <envar>SHELL</envar> value is not set.</para>
</listitem>
</varlistentry><varlistentry><term><envar>PATH</envar></term><listitem><para><indexterm><primary><envar>PATH</envar> in Solaris Secure Shell</primary></indexterm>Controls the setting of the <envar>PATH</envar> environment variable.
When the value is not set, the default path is <literal>/usr/bin</literal>.</para>
</listitem>
</varlistentry><varlistentry><term><envar>SUPATH</envar></term><listitem><para><indexterm><primary><envar>SUPATH</envar> in Solaris Secure Shell</primary></indexterm>Controls the setting of the <envar>PATH</envar> environment variable
for <literal>root</literal>. When the value is not set, the default path is <literal>/usr/sbin:/usr/bin</literal>.</para>
</listitem>
</varlistentry>
</variablelist><para>For more information, see the <olink targetdoc="group-refman" targetptr="login-1" remap="external"><citerefentry><refentrytitle>login</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink> and <olink targetdoc="group-refman" targetptr="sshd-1m" remap="external"><citerefentry><refentrytitle>sshd</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink> man pages.</para>
</sect2>
</sect1><sect1 id="sshref-11"><title>Maintaining Known Hosts in Solaris Secure Shell</title><para><indexterm><primary><filename>/etc/ssh/ssh_known_hosts</filename> file</primary><secondary>controlling distribution</secondary></indexterm><indexterm><primary><filename>known_hosts</filename> file</primary><secondary>controlling distribution</secondary></indexterm>Each host that needs to communicate securely with another host
must have the server's public key stored in the local host's <filename>/etc/ssh/ssh_known_hosts</filename> file. Although a script could be used to update the <filename>/etc/ssh/ssh_known_hosts</filename> files, such a practice is heavily discouraged because a script
opens a major security vulnerability.</para><itemizedlist><para><indexterm><primary><filename>/etc/ssh/ssh_known_hosts</filename> file</primary><secondary>secure distribution</secondary></indexterm>The <filename>/etc/ssh/ssh_known_hosts</filename> file should
only be distributed by a secure mechanism as follows:</para><listitem><para>Over a secure connection, such as Solaris Secure Shell, IPsec, or Kerberized <command>ftp</command> from a known and trusted machine</para>
</listitem><listitem><para>At system install time</para>
</listitem>
</itemizedlist><para>To avoid the possibility of an intruder gaining access by inserting
bogus public keys into a <filename>known_hosts</filename> file, you should
use a <trademark>JumpStart</trademark> server as the known and trusted source
of the <filename>ssh_known_hosts</filename> file. The <filename>ssh_known_hosts</filename> file
can be distributed during installation. Later, scripts that use the <command>scp</command> command
can be used to pull in the latest version. This approach is secure because
each host already has the public key from the JumpStart server.</para>
</sect1><sect1 id="sshref-28"><title>Solaris Secure Shell Packages and Initialization</title><indexterm><primary>packages</primary><secondary>Solaris Secure Shell</secondary>
</indexterm><indexterm><primary>Solaris Secure Shell</primary><secondary>packages</secondary>
</indexterm><indexterm><primary>Solaris Secure Shell</primary><secondary>adding to system</secondary>
</indexterm><itemizedlist><para>Solaris Secure Shell depends on core Solaris packages and the following packages:</para><listitem><para><literal>SUNWgss</literal> &ndash; Contains Generic Security
Service (GSS) software</para>
</listitem><listitem><para><literal>SUNWtcpd</literal> &ndash; Contains TCP wrappers</para>
</listitem><listitem><para><literal>SUNWopenssl-libraries</literal> &ndash; Contains
OpenSSL libraries</para>
</listitem><listitem><para><literal>SUNWzlib</literal> &ndash; Contains the zip compression
library</para>
</listitem>
</itemizedlist><itemizedlist><para>The following packages install Solaris Secure Shell:</para><listitem><para><literal>SUNWsshr</literal> &ndash; Contains client files
and utilities for the root (<filename>/</filename>) directory</para>
</listitem><listitem><para><literal>SUNWsshdr</literal> &ndash; Contains server files
and utilities for the root (<filename>/</filename>) directory</para>
</listitem><listitem><para><literal>SUNWsshcu</literal> &ndash; Contains common source
files for the <filename>/usr</filename> directory</para>
</listitem><listitem><para><literal>SUNWsshdu</literal> &ndash; Contains server files
for the <filename>/usr</filename> directory</para>
</listitem><listitem><para><literal>SUNWsshu</literal> &ndash; Contains client files
and utilities for the <filename>/usr</filename> directory</para>
</listitem>
</itemizedlist><para>Upon reboot after installation, the <command>sshd</command> daemon is
running. The daemon creates host keys on the system. A Solaris system that
runs the <command>sshd</command> daemon is a Solaris Secure Shell server.</para>
</sect1><sect1 id="sshref-2"><title>Solaris Secure Shell Files</title><para><indexterm><primary>Solaris Secure Shell</primary><secondary>files</secondary></indexterm><indexterm><primary>files</primary><secondary>for administering Solaris Secure Shell</secondary></indexterm><indexterm><primary>private keys</primary><secondary>Solaris Secure Shell identity files</secondary></indexterm><indexterm><primary>public keys</primary><secondary>Solaris Secure Shell identity files</secondary></indexterm><indexterm><primary>identity files (Solaris Secure Shell)</primary><secondary>naming conventions</secondary></indexterm><indexterm><primary>naming conventions</primary><secondary>Solaris Secure Shell identity files</secondary></indexterm><indexterm><primary>Solaris Secure Shell</primary><secondary>naming identity files</secondary></indexterm>The following table shows the important Solaris Secure Shell files and the suggested
file permissions.</para><table frame="topbot" pgwide="1" id="sshref-tbl-1"><title>Solaris Secure Shell Files</title><tgroup cols="3" colsep="0" rowsep="0"><?PubTbl tgroup dispwid="6.53in"?><colspec colname="colspec0" colwidth="34.12*"/><colspec colname="colspec2" colwidth="42.27*"/><colspec colname="colspec3" colwidth="22.60*"/><thead><row rowsep="1"><entry><para>File Name</para>
</entry><entry><para>Description</para>
</entry><entry><para>Suggested Permissions and Owner</para>
</entry>
</row>
</thead><tbody><row><entry><para><indexterm><primary><filename>/etc/ssh/sshd_config</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>sshd_config</filename> file</primary><secondary>description</secondary></indexterm><filename>/etc/ssh/sshd_config</filename></para>
</entry><entry><para>Contains configuration data for <command>sshd</command>, the Solaris Secure Shell daemon.</para>
</entry><entry><para><literal>-rw-r--r--  root</literal></para>
</entry>
</row><row><entry><para><indexterm><primary><filename>/etc/ssh/ssh_host_key</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>ssh_host_key</filename> file</primary><secondary>description</secondary></indexterm><filename>/etc/ssh/ssh_host_key</filename></para>
</entry><entry><para>Contains the host private key (v1).</para>
</entry><entry><para><literal>-rw-r--r--  root</literal></para>
</entry>
</row><row><entry><para><indexterm><primary><filename>/etc/ssh/ssh_host_dsa_key</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>ssh_host_dsa_key</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>/etc/ssh/ssh_host_rsa_key</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>ssh_host_rsa_key</filename> file</primary><secondary>description</secondary></indexterm><filename>/etc/ssh/ssh_host_dsa_key</filename> or <filename>/etc/ssh/ssh_host_rsa_key</filename></para>
</entry><entry><para>Contains the host private key (v2).</para>
</entry><entry><para><literal>-rw-r--r--  root</literal></para>
</entry>
</row><row><entry><para><indexterm><primary><filename>/etc/ssh_host_key.pub</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>ssh_host_key.pub</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>/etc/ssh_host_dsa_key.pub</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>ssh_host_dsa_key.pub</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>/etc/ssh_host_rsa_key.pub</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>ssh_host_rsa_key.pub</filename> file</primary><secondary>description</secondary></indexterm><replaceable>host-private-key</replaceable><filename>.pub</filename></para>
</entry><entry><para>Contains the host public key, for example, <filename>/etc/ssh/ssh_host_rsa_key.pub</filename>. Is used to copy the host key to the local <filename>known_hosts</filename> file.</para>
</entry><entry><para><literal>-rw-r--r--  root</literal></para>
</entry>
</row><row><entry><para><indexterm><primary><filename>/var/run/sshd.pid</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>sshd.pid</filename> file</primary><secondary>description</secondary></indexterm><filename>/var/run/sshd.pid</filename></para>
</entry><entry><para>Contains the process ID of the Solaris Secure Shell daemon, <command>sshd</command>.
If multiple daemons are running, the file contains the last daemon that was
started.</para>
</entry><entry><para><literal>-rw-r--r--  root</literal></para>
</entry>
</row><row><entry><para><indexterm><primary><filename>authorized_keys</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>~/.ssh/authorized_keys</filename> file</primary><secondary>description</secondary></indexterm><filename>~/.ssh/authorized_keys</filename></para>
</entry><entry><para>Holds the public keys of the user who is allowed to log in to the user
account.</para>
</entry><entry><para><literal>-rw-rw-r--</literal> <replaceable>username</replaceable></para>
</entry>
</row><row><entry><para><indexterm><primary><filename>/etc/ssh/ssh_known_hosts</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>ssh_known_hosts</filename> file</primary></indexterm><filename>/etc/ssh/ssh_known_hosts</filename></para>
</entry><entry><para>Contains the host public keys for all hosts with which the client can
communicate securely. The file is populated by the administrator.</para>
</entry><entry><para><literal>-rw-r--r--  root</literal></para>
</entry>
</row><row><entry><para><indexterm><primary><filename>~/.ssh/known_hosts</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary sortas="ssh/known_hosts"><filename>.ssh/known_hosts</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>known_hosts</filename> file</primary><secondary>description</secondary></indexterm><filename>~/.ssh/known_hosts</filename></para>
</entry><entry><para>Contains the host public keys for all hosts with which the client can
communicate securely. The file is maintained automatically. Whenever the user
connects with an unknown host, the remote host key is added to the file.</para>
</entry><entry><para><literal>-rw-r--r--</literal> <replaceable>username</replaceable></para>
</entry>
</row><row><entry><para><indexterm><primary><filename>/etc/default/login</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>default/login</filename> file</primary><secondary>description</secondary></indexterm><filename>/etc/default/login</filename></para>
</entry><entry><para>Provides defaults for the <command>sshd</command> daemon when corresponding <filename>sshd_config</filename> parameters are not set.</para>
</entry><entry><para><literal>-r--r--r--  root</literal></para>
</entry>
</row><row><entry><para><indexterm><primary><filename>/etc/nologin</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>nologin</filename> file</primary><secondary>description</secondary></indexterm><filename>/etc/nologin</filename></para>
</entry><entry><para>If this file exists, the <command>sshd</command> daemon only permits <literal>root</literal> to log in. The contents of this file are displayed to users
who are attempting to log in.</para>
</entry><entry><para><literal>-rw-r--r--  root</literal></para>
</entry>
</row><row><entry><para><indexterm><primary><filename>.rhosts</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>~/.rhosts</filename> file</primary><secondary>description</secondary></indexterm><filename>~/.rhosts</filename></para>
</entry><entry><para>Contains the host-user name pairs that specify the hosts to which the
user can log in without a password. This file is also used by the <command>rlogind</command> and <command>rshd</command> daemons.</para>
</entry><entry><para><literal>-rw-r--r--</literal> <replaceable>username</replaceable></para>
</entry>
</row><row><entry><para><indexterm><primary><filename>.shosts</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>~/.shosts</filename> file</primary><secondary>description</secondary></indexterm><filename>~/.shosts</filename></para>
</entry><entry><para>Contains the host-user name pairs that specify the hosts to which the
user can log in without a password. This file is not used by other utilities.
For more information, see the <olink targetdoc="group-refman" targetptr="sshd-1m" remap="external"><citerefentry><refentrytitle>sshd</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink>man
page in the <literal>FILES</literal> section.</para>
</entry><entry><para><literal>-rw-r--r--</literal> <replaceable>username</replaceable></para>
</entry>
</row><row><entry><para><indexterm><primary><filename>/etc/hosts.equiv</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>hosts.equiv</filename> file</primary><secondary>description</secondary></indexterm><filename>/etc/hosts.equiv</filename></para>
</entry><entry><para>Contains the hosts that are used in <filename>.rhosts</filename> authentication.
This file is also used by the <command>rlogind</command> and <command>rshd</command> daemons.</para>
</entry><entry><para><literal>-rw-r--r--  root</literal></para>
</entry>
</row><row><entry><para><indexterm><primary><filename>/etc/ssh/shosts.equiv</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>shosts.equiv</filename> file</primary><secondary>description</secondary></indexterm><filename>/etc/ssh/shosts.equiv</filename></para>
</entry><entry><para>Contains the hosts that are used in host-based authentication. This
file is not used by other utilities.</para>
</entry><entry><para><literal>-rw-r--r--  root</literal></para>
</entry>
</row><row><entry><para><indexterm><primary><filename>~/.ssh/environment</filename> file </primary><secondary>description</secondary></indexterm><indexterm><primary sortas="ssh/environment"><filename>.ssh/environment</filename> file</primary><secondary>description</secondary></indexterm><filename>~/.ssh/environment</filename></para>
</entry><entry><para>Contains initial assignments at login. By default, this file is not
read. The <literal>PermitUserEnvironment</literal> keyword in the <filename>sshd_config</filename> file must be set to <literal>yes</literal> for this file to be
read.</para>
</entry><entry><para> <literal>-rw-------</literal> <replaceable>username</replaceable></para>
</entry>
</row><row><entry><para><indexterm><primary><filename>~/.ssh/rc</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary sortas="ssh/rc"><filename>.ssh/rc</filename> file</primary><secondary>description</secondary></indexterm><filename>~/.ssh/rc</filename></para>
</entry><entry><para>Contains initialization routines that are run before the user shell
starts. For a sample initialization routine, see the sshd man page.</para>
</entry><entry><para> <literal>-rw-------</literal> <replaceable>username</replaceable></para>
</entry>
</row><row><entry><para><indexterm><primary><filename>/etc/ssh/sshrc</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary><filename>sshrc</filename> file</primary><secondary>description</secondary></indexterm><filename>/etc/ssh/sshrc</filename></para>
</entry><entry><para>Contains host-specific initialization routines that are specified by
an administrator.</para>
</entry><entry><para><literal>-rw-r--r--  root</literal></para>
</entry>
</row><row><entry><para><indexterm><primary><filename>/etc/ssh/ssh_config</filename> file</primary><secondary>description</secondary></indexterm><filename>/etc/ssh/ssh_config</filename></para>
</entry><entry><para>Configures system settings on the client system.</para>
</entry><entry><para><literal>-rw-r--r--  root</literal></para>
</entry>
</row><row><entry><para><indexterm><primary><filename>~/.ssh/config</filename> file</primary><secondary>description</secondary></indexterm><indexterm><primary sortas="ssh/config"><filename>.ssh/config</filename> file</primary><secondary>description</secondary></indexterm><filename>~/.ssh/config</filename></para>
</entry><entry><para>Configures user settings. Overrides system settings.</para>
</entry><entry><para> <literal>-rw-------</literal> <replaceable>username</replaceable></para>
</entry>
</row>
</tbody>
</tgroup>
</table><para>The following table lists the Solaris Secure Shell files that can be overridden by
keywords or command options.</para><table frame="topbot" pgwide="1" id="sshref-26"><title>Overrides for the Location
of Solaris Secure Shell Files</title><tgroup cols="3" colsep="0" rowsep="0"><?PubTbl tgroup dispwid="6.53in"?><colspec colname="colspec0" colwidth="34.08*"/><colspec colname="colspec2" colwidth="38.45*"/><colspec colname="colspec3" colwidth="26.46*"/><thead><row rowsep="1"><entry><para>File Name</para>
</entry><entry><para>Keyword Override</para>
</entry><entry><para>Command-Line Override</para>
</entry>
</row>
</thead><tbody><row><entry rowsep="1"><para><indexterm><primary><filename>/etc/ssh/ssh_config</filename> file</primary><secondary>override</secondary></indexterm><indexterm><primary><filename>ssh_config</filename> file</primary><secondary>override</secondary></indexterm><filename>/etc/ssh/ssh_config</filename></para>
</entry><entry rowsep="1"><para></para>
</entry><entry rowsep="1"><para><command>ssh -F</command> <replaceable>config-file</replaceable></para><para><command>scp -F</command> <replaceable>config-file</replaceable></para>
</entry>
</row><row><entry rowsep="1"><para><indexterm><primary><filename>~/.ssh/config</filename> file</primary><secondary>override</secondary></indexterm><indexterm><primary sortas="ssh/config"><filename>.ssh/config</filename> file</primary><secondary>override</secondary></indexterm><filename>~/.ssh/config</filename></para>
</entry><entry rowsep="1"><para></para>
</entry><entry rowsep="1"><para><command>ssh -F</command> <replaceable>config-file</replaceable></para>
</entry>
</row><row><entry rowsep="1"><para><indexterm><primary><filename>/etc/ssh/ssh_host_key</filename> file</primary><secondary>override</secondary></indexterm><indexterm><primary><filename>ssh_host_key</filename> file</primary><secondary>override</secondary></indexterm><filename>/etc/ssh/host_rsa_key</filename></para><para><filename>/etc/ssh/host_dsa_key</filename></para>
</entry><entry rowsep="1"><para><literal>HostKey</literal></para>
</entry><entry rowsep="1"><para></para>
</entry>
</row><row><entry rowsep="1"><para><indexterm><primary><filename>~/.ssh/identity</filename> file</primary><secondary>override</secondary></indexterm><indexterm><primary sortas="ssh/identity"><filename>.ssh/identity</filename> file</primary></indexterm><filename>~/.ssh/identity</filename></para><para><indexterm><primary><filename>~/.ssh/id_dsa</filename> file</primary><secondary>override</secondary></indexterm><indexterm><primary sortas="ssh/id_dsa"><filename>.ssh/id_dsa</filename>  file</primary></indexterm><filename>~/.ssh/id_dsa</filename> <indexterm><primary><filename>~/.ssh/id_rsa</filename> file</primary><secondary>override</secondary></indexterm><indexterm><primary sortas="ssh/id_rsa"><filename>.ssh/id_rsa</filename>  file</primary></indexterm><filename>~/.ssh/id_rsa</filename></para>
</entry><entry rowsep="1"><para><literal>IdentityFile</literal></para>
</entry><entry rowsep="1"><para><command>ssh -i</command> <replaceable>id-file</replaceable></para><para><command>scp -i</command> <replaceable>id-file</replaceable></para>
</entry>
</row><row><entry rowsep="1"><para><indexterm><primary><filename>~/.ssh/authorized_keys</filename> file</primary><secondary>override</secondary></indexterm><filename>~/.ssh/authorized_keys</filename></para>
</entry><entry rowsep="1"><para><literal>AuthorizedKeysFile</literal></para>
</entry><entry rowsep="1"><para></para>
</entry>
</row><row><entry rowsep="1"><para><indexterm><primary><filename>/etc/ssh/ssh_known_hosts</filename> file</primary><secondary>override</secondary></indexterm><filename>/etc/ssh/ssh_known_hosts</filename></para>
</entry><entry rowsep="1"><para><literal>GlobalKnownHostsFile</literal></para>
</entry><entry rowsep="1"><para></para>
</entry>
</row><row><entry rowsep="1"><para><indexterm><primary><filename>~/.ssh/known_hosts</filename> file</primary><secondary>override</secondary></indexterm><indexterm><primary sortas="ssh/known_hosts"><filename>.ssh/known_hosts</filename> file</primary><secondary>override</secondary></indexterm><filename>~/.ssh/known_hosts</filename></para>
</entry><entry rowsep="1"><para><literal>UserKnownHostsFile</literal></para><para><literal>IgnoreUserKnownHosts</literal></para>
</entry><entry rowsep="1"><para></para>
</entry>
</row>
</tbody>
</tgroup>
</table>
</sect1><sect1 id="sshref-13"><title>Solaris Secure Shell Commands</title><indexterm><primary>commands</primary><secondary>Solaris Secure Shell commands</secondary>
</indexterm><para>The following table summarizes the major Solaris Secure Shell commands.</para><table frame="topbot" pgwide="1" id="sshref-tbl-2"><title>Commands in Solaris Secure Shell</title><tgroup cols="3" colsep="0" rowsep="0"><colspec colwidth="30.43*"/><colspec colwidth="117.83*"/><colspec colname="colspec0" colwidth="29.09*"/><thead><row rowsep="1"><entry><para>Command</para>
</entry><entry><para>Description</para>
</entry><entry><para>Man Page</para>
</entry>
</row>
</thead><tbody><row><entry><para><indexterm><primary><command>ssh</command> command</primary><secondary>description</secondary></indexterm><command>ssh</command></para>
</entry><entry><para>Logs a user in to a remote machine and securely executes commands on
a remote machine. This command is the Solaris Secure Shell replacement for the <command>rlogin</command> and <command>rsh</command> commands. The <command>ssh</command> command enables secure
encrypted communications between two untrusted hosts over an insecure network.
X11 connections and arbitrary TCP/IP ports can also be forwarded over the
secure channel.</para>
</entry><entry><para><olink targetdoc="group-refman" targetptr="ssh-1" remap="external"><citerefentry><refentrytitle>ssh</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>sshd</command> command</primary><secondary>description</secondary></indexterm><command>sshd</command></para>
</entry><entry><para>Is the daemon for Solaris Secure Shell. The daemon listens for connections from clients
and enables secure encrypted communications between two untrusted hosts over
an insecure network.</para>
</entry><entry><para><olink targetdoc="group-refman" targetptr="sshd-1m" remap="external"><citerefentry><refentrytitle>sshd</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>ssh-add</command> command</primary><secondary>description</secondary></indexterm><command>ssh-add</command></para>
</entry><entry><para>Adds RSA or DSA identities to the authentication agent, <command>ssh-agent</command>.
Identities are also called <emphasis>keys</emphasis>.</para>
</entry><entry><para><olink targetdoc="group-refman" targetptr="ssh-add-1" remap="external"><citerefentry><refentrytitle>ssh-add</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>ssh-agent</command> command</primary><secondary>description</secondary></indexterm><command>ssh-agent</command></para>
</entry><entry><para><indexterm><primary>environment variables</primary><secondary>use with <command>ssh-agent</command> command</secondary></indexterm>Holds private keys that are used for public key authentication.
The <command>ssh-agent</command> program is started at the beginning of an
X-session or a login session. All other windows and other  programs are started
as clients of the <command>ssh-agent</command> program. Through the use of
environment variables, the agent can be located and used for authentication
when users use the <command>ssh</command> command to log in to other systems.</para>
</entry><entry><para><olink targetdoc="group-refman" targetptr="ssh-agent-1" remap="external"><citerefentry><refentrytitle>ssh-agent</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>ssh-keygen</command> command</primary><secondary>description</secondary></indexterm><command>ssh-keygen</command></para>
</entry><entry><para>Generates and manages authentication keys for Solaris Secure Shell.</para>
</entry><entry><para><olink targetdoc="group-refman" targetptr="ssh-keygen-1" remap="external"><citerefentry><refentrytitle>ssh-keygen</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>ssh-keyscan</command> command</primary><secondary>description</secondary></indexterm><command>ssh-keyscan</command></para>
</entry><entry><para><indexterm><primary>new features</primary><secondary>commands</secondary><tertiary><command>ssh-keyscan</command></tertiary></indexterm>Gathers the public keys of a number of Solaris Secure Shell hosts. Aids in building
and verifying <filename>ssh_known_hosts</filename> files.</para>
</entry><entry><para><olink targetdoc="group-refman" targetptr="ssh-keyscan-1" remap="external"><citerefentry><refentrytitle>ssh-keyscan</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>ssh-keysign</command> command</primary><secondary>description</secondary></indexterm><command>ssh-keysign</command></para>
</entry><entry><para><indexterm><primary>new features</primary><secondary>commands</secondary><tertiary><command>ssh-keysign</command></tertiary></indexterm>Is used by the <command>ssh</command> command to access the host
keys on the local host. Generates the digital signature that is required during
host-based authentication with Solaris Secure Shell v2. The command is invoked by the <command>ssh</command> command, not by the user.</para>
</entry><entry><para><olink targetdoc="group-refman" targetptr="ssh-keysign-1m" remap="external"><citerefentry><refentrytitle>ssh-keysign</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>scp</command> command</primary><secondary>description</secondary></indexterm><command>scp</command></para>
</entry><entry><para>Securely copies files between hosts on a network over an encrypted <command>ssh</command> transport. Unlike the <command>rcp</command> command, the <command>scp</command> command prompts for passwords or passphrases, if password information
is needed for authentication.</para>
</entry><entry><para><olink targetdoc="group-refman" targetptr="scp-1" remap="external"><citerefentry><refentrytitle>scp</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>sftp</command> command</primary><secondary>description</secondary></indexterm><command>sftp</command></para>
</entry><entry><para>Is an interactive file transfer program that is similar to the <command>ftp</command> command. Unlike the <command>ftp</command> command, the <command>sftp</command> command
performs all operations over an encrypted <command>ssh</command> transport.
The command connects, logs in to the specified host name, and then enters
interactive command mode.</para>
</entry><entry><para><olink targetdoc="group-refman" targetptr="sftp-1" remap="external"><citerefentry><refentrytitle>sftp</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink></para>
</entry>
</row>
</tbody>
</tgroup>
</table><para><indexterm><primary>keywords</primary><secondary>command-line overrides in Solaris Secure Shell</secondary></indexterm><indexterm><primary><command>ssh</command> command</primary><secondary>overriding keyword settings</secondary></indexterm>The following table lists the command options that override Solaris Secure Shell keywords.
The keywords are specified in the <filename>ssh_config</filename> and <filename>sshd_config</filename> files.</para><table frame="topbot" pgwide="1" id="sshref-27"><title>Command-Line Equivalents
for Solaris Secure Shell Keywords</title><tgroup cols="3" colsep="0" rowsep="0"><?PubTbl tgroup dispwid="6.53in"?><colspec colname="colspec0" colwidth="32.46*"/><colspec colname="colspec1" colwidth="37.05*"/><colspec colname="colspec3" colwidth="37.05*"/><thead><row rowsep="1"><entry><para>Keyword</para>
</entry><entry><para><command>ssh</command> Command-Line Override</para>
</entry><entry><para><command>scp</command> Command-Line Override</para>
</entry>
</row>
</thead><tbody><row><entry rowsep="1"><para><literal>BatchMode</literal></para>
</entry><entry rowsep="1"><para></para>
</entry><entry rowsep="1"><para><command>scp -B</command></para>
</entry>
</row><row><entry rowsep="1"><para><literal>BindAddress</literal></para>
</entry><entry rowsep="1"><para><command>ssh -b</command> <replaceable>bind-addr</replaceable></para>
</entry><entry rowsep="1"><para><command>scp -a</command> <replaceable>bind-addr</replaceable></para>
</entry>
</row><row><entry rowsep="1"><para><literal>Cipher</literal></para>
</entry><entry rowsep="1"><para><command>ssh -c</command> <replaceable>cipher</replaceable></para>
</entry><entry rowsep="1"><para><command>scp -c</command> <replaceable>cipher</replaceable></para>
</entry>
</row><row><entry rowsep="1"><para><literal>Ciphers</literal></para>
</entry><entry rowsep="1"><para><command>ssh -c</command> <replaceable>cipher-spec</replaceable></para>
</entry><entry rowsep="1"><para><command>scp -c</command> <replaceable>cipher-spec</replaceable></para>
</entry>
</row><row><entry rowsep="1"><para><literal>Compression</literal></para>
</entry><entry rowsep="1"><para><command>ssh -C</command></para>
</entry><entry rowsep="1"><para><command>scp -C</command></para>
</entry>
</row><row><entry rowsep="1"><para><literal>DynamicForward</literal></para>
</entry><entry rowsep="1"><para><command>ssh -D</command> <replaceable>SOCKS4-port</replaceable></para>
</entry><entry rowsep="1"><para></para>
</entry>
</row><row><entry rowsep="1"><para><literal>EscapeChar</literal></para>
</entry><entry rowsep="1"><para><command>ssh -e</command> <replaceable>escape-char</replaceable></para>
</entry><entry rowsep="1"><para></para>
</entry>
</row><row><entry rowsep="1"><para><literal>ForwardAgent</literal></para>
</entry><entry rowsep="1"><para><command>ssh -A</command> to enable</para><para><command>ssh -a</command> to disable</para>
</entry><entry rowsep="1"><para></para>
</entry>
</row><row><entry rowsep="1"><para><literal>ForwardX11</literal></para>
</entry><entry rowsep="1"><para><command>ssh -X</command> to enable</para><para><command>ssh -x</command> to disable</para>
</entry><entry rowsep="1"><para></para>
</entry>
</row><row><entry rowsep="1"><para><literal>GatewayPorts</literal></para>
</entry><entry rowsep="1"><para><command>ssh -g</command></para>
</entry><entry rowsep="1"><para></para>
</entry>
</row><row><entry rowsep="1"><para><literal>IPv4</literal></para>
</entry><entry rowsep="1"><para><command>ssh -4</command></para>
</entry><entry rowsep="1"><para><command>scp -4</command></para>
</entry>
</row><row><entry rowsep="1"><para><literal>IPv6</literal></para>
</entry><entry rowsep="1"><para><command>ssh -6</command></para>
</entry><entry rowsep="1"><para><command>scp -6</command></para>
</entry>
</row><row><entry rowsep="1"><para><literal>LocalForward</literal></para>
</entry><entry rowsep="1"><para><command>ssh -L</command> <replaceable>localport:remotehost:remoteport</replaceable></para>
</entry><entry rowsep="1"><para></para>
</entry>
</row><row><entry rowsep="1"><para><literal>MACS</literal></para>
</entry><entry rowsep="1"><para><command>ssh -m</command> <replaceable>mac-spec</replaceable></para>
</entry><entry rowsep="1"><para></para>
</entry>
</row><row><entry rowsep="1"><para><literal>Port</literal></para>
</entry><entry rowsep="1"><para><command>ssh -p</command> <replaceable>port</replaceable></para>
</entry><entry rowsep="1"><para><command>scp -P</command> <replaceable>port</replaceable></para>
</entry>
</row><row><entry rowsep="1"><para><literal>Protocol</literal></para>
</entry><entry rowsep="1"><para><command>ssh -1</command> for v1 only</para><para><command>ssh -2</command> for v2 only</para>
</entry><entry rowsep="1"><para></para>
</entry>
</row><row><entry rowsep="1"><para><literal>RemoteForward</literal></para>
</entry><entry rowsep="1"><para><command>ssh -R</command> <replaceable>remoteport:localhost:localport</replaceable></para>
</entry><entry rowsep="1"><para></para>
</entry>
</row>
</tbody>
</tgroup>
</table>
</sect1>
</chapter><?Pub *0000087736 0?>