Index Index for
Section 8
Index Alphabetical
listing for S
Bottom of page Bottom of
page

sshd2(8)

NAME

sshd2, sshd - Secure Shell daemon

SYNOPSIS

sshd2 [-D debug_level_spec] [-f file] [-h host_key_file] [-o keyword] [-p port #] [-v] [-g login_grace_time] [-i] [-q]

OPTIONS

-D debug_level_spec Prints extensive debug information to stderr. The debug_level_spec argument is a number between 0 and 99, where 99 specifies that all debug information should be displayed, or a comma-separated list of assignments; for example, ModulePattern=debug_level. This option is intended only for debugging the server. -f file Specifies the name of the configuration file. The default is /etc/ssh2/sshd2_config. -h host_key_file Specifies the file from which the host key is read. The default file is /etc/ssh2/hostkey. If the sshd2 daemon is not run as root, the default host key file will be $HOME$/.ssh2/hostkey. -o keyword Specifies configuration keywords. This is useful for specifying keywords for which there is no separate command-line flag. The -o option has the same format as a line in the configuration file. Comment lines are not accepted. -p port # Specifies the port on which the system listens for connections. The default port is 22. -v Displays information in verbose mode. This option can also be specified in the configuration file. -q Disables warning messages. This option can also be specified in the configuration file. -g login_grace_time Gives the grace time for clients to authenticate themselves. If the client fails to authenticate the user within this many seconds, the system disconnects and exits. The default is 600 seconds. A value of zero indicates no limit. -i Specifies that the sshd2 daemon is being run from the inetd daemon.

DESCRIPTION

The sshd2 Secure Shell daemon. The sshd2 daemon must be running on the Secure Shell server. The sshd2 daemon forks a new daemon for each incoming client connection. The forked daemons handle key exchange, encryption, authentication, command execution, and data exchange. The sshd2 daemon can be configured using command-line options or in the sshd2_config configuration file. Command-line options override values specified in the configuration file. The sshd2 daemon is normally run as root. If it is not run as root, it can log in only as the user it is running as, and password authentication might not work if the system uses shadow passwords. An alternative host key file must also be used.

LOGIN PROCESS

When a user successfully logs in, the sshd2 daemon: 1. Changes to run with normal user privileges. 2. Sets up basic environment. 3. Changes to the user's home directory. 4. Runs the user's shell.

SSH WITH TCP WRAPPERS

When the sshd2 daemon is compiled with TCP wrapper libraries, the hosts.allow and hosts.deny files control who can connect to ports forwarded by the sshd2 daemon. The names in the hosts.allow and hosts.deny files are sshd2, sshdfwd- <portname>, and sshdfwd-X11 for forwarded ports on which the Secure Shell client or server is listening. If a port has a defined name, you must use it.

FILES

/etc/ssh2/sshd2_config Contains sshd2 daemon configuration information. This file should be writable by root only and readable by world (though not necessary). /etc/ssh2/hostkey Contains the private part of the host key. You can create this file by using the ssh-keygen2 command. This file should only be owned by root, readable only by root, and not accessible to others. /etc/ssh2/hostkey.pub Contains the public part of the host key. You can create this file by using the ssh-keygen2 command. This file should be writable by root only and readable by world. /etc/ssh2/random_seed Contains a seed for the random number generator. This file should be accessible only by root. $HOME/.ssh2/authorization Contains information on how the server will verify the identity of an user. See ssh2(1) for more information. $HOME/.hushlogin If this file exists, the sshd2 daemon will not print information during login. (This information is normally the user's last login time, message of the day, and mail check.) /etc/nologin If this file exists, the sshd2 daemon refuses to let anyone except root log in. The contents of the file are displayed to anyone trying to log in, and nonroot connections are refused. The file should be readable by world. $HOME/.rhosts Contains a list of remote users who are not required to supply a password when they use the ssh2 command to log in. Before the user can log in, the sshd2 daemon requires public host key authentication in addition to validating the host name retrieved from domain name servers. The file must be writable only by the user; it should not be accessible by others. You can use +@group to specify a netgroup. Negated entries start with a minus sign (-). This file is also used by the rlogind and rshd daemons. See .rhosts(4) for more information about the .rhosts file. $HOME/.shosts This file is the same as the .rhosts file except that only the sshd2 daemon uses it. /etc/hosts.equiv Contains the names of remote hosts and users that are equivalent to the local host or user. An equivalent host or user is allowed to use the ssh2 command to log in to such an account without supplying a password. Additionally, successful host-based authentication is normally required. This file must be writable only by root and should be readable by world. You can use +@group to specify a netgroup. Negated entries start with a minus sign (-). Note The only valid use for user names should be in negated entries. Specified user names in the hosts.equiv file can log in as anybody including bin, daemon, adm, and other accounts that own critical binaries and directories. This file is also used by the rlogind and rshd daemons. See hosts.equiv(4) for more information about the hosts.equiv file. /etc/shosts.equiv This file is the same as the hosts.equiv file except that only the sshd2 daemon uses it. $HOME/.ssh2/knownhosts/xxxxyyyy.pub Contains the public host keys of hosts that users need to log in to when using host based authentication. The xxxx is the fully qualified domain name (FQDN) and yyyy is the public key algorithm. Public key algorithms are ssh-dss and ssh-rsa. For example, if the FQDN for a host is server1.foo.fi and it has a key algorithm of ssh-dss, the host key would be server1.foo.fi.ssh-dss.pub in the knownhosts directory. A user must add the host name to a $HOME/.shosts file or an $HOME/.rhosts file. /etc/ssh2/knownhosts/xxxxyyyy.pub Same as the $HOME/.ssh2/knownhosts/xxxxyyyy.pub file, but system-wide. This file is overridden if the user puts a file with the same name in the $HOME/.ssh2/knownhosts directory.

LEGAL NOTICES

SSH is a registered trademark of SSH Communication Security Ltd.

SEE ALSO

Commands: rcp(1), rlogin(1), rsh(1), scp2(1), sftp(1), ssh2(1), ssh- agent2(1), ssh-add2(1), sshd2(8) Files: sshd2_config(4)

Index Index for
Section 8
Index Alphabetical
listing for S
Top of page Top of
page