亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? sshd_config.5

?? C++編寫
?? 5
?? 第 1 頁 / 共 2 頁
字號:
.\"  -*- nroff -*-.\".\" Author: Tatu Ylonen <ylo@cs.hut.fi>.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland.\"                    All rights reserved.\".\" As far as I am concerned, the code I have written for this software.\" can be used freely for any purpose.  Any derived versions of this.\" software must be clearly marked as such, and if the derived work is.\" incompatible with the protocol description in the RFC file, it must be.\" called by a name other than "ssh" or "Secure Shell"..\".\" Copyright (c) 1999,2000 Markus Friedl.  All rights reserved..\" Copyright (c) 1999 Aaron Campbell.  All rights reserved..\" Copyright (c) 1999 Theo de Raadt.  All rights reserved..\".\" Redistribution and use in source and binary forms, with or without.\" modification, are permitted provided that the following conditions.\" are met:.\" 1. Redistributions of source code must retain the above copyright.\"    notice, this list of conditions and the following disclaimer..\" 2. Redistributions in binary form must reproduce the above copyright.\"    notice, this list of conditions and the following disclaimer in the.\"    documentation and/or other materials provided with the distribution..\".\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED..\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE..\".\" $OpenBSD: sshd_config.5,v 1.15 2003/03/28 10:11:43 jmc Exp $.Dd September 25, 1999.Dt SSHD_CONFIG 5.Os.Sh NAME.Nm sshd_config.Nd OpenSSH SSH daemon configuration file.Sh SYNOPSIS.Bl -tag -width Ds -compact.It Pa /etc/ssh/sshd_config.El.Sh DESCRIPTION.Nm sshdreads configuration data from.Pa /etc/ssh/sshd_config(or the file specified with.Fl fon the command line).The file contains keyword-argument pairs, one per line.Lines starting with.Ql #and empty lines are interpreted as comments..PpThe possiblekeywords and their meanings are as follows (note thatkeywords are case-insensitive and arguments are case-sensitive):.Bl -tag -width Ds.It Cm AFSTokenPassingSpecifies whether an AFS token may be forwarded to the server.Default is.Dq no ..It Cm AllowGroupsThis keyword can be followed by a list of group name patterns, separatedby spaces.If specified, login is allowed only for users whose primarygroup or supplementary group list matches one of the patterns..Ql \&*and.Ql ?can be used aswildcards in the patterns.Only group names are valid; a numerical group ID is not recognized.By default, login is allowed for all groups..Pp.It Cm AllowTcpForwardingSpecifies whether TCP forwarding is permitted.The default is.Dq yes .Note that disabling TCP forwarding does not improve security unlessusers are also denied shell access, as they can always install theirown forwarders..Pp.It Cm AllowUsersThis keyword can be followed by a list of user name patterns, separatedby spaces.If specified, login is allowed only for user names thatmatch one of the patterns..Ql \&*and.Ql ?can be used aswildcards in the patterns.Only user names are valid; a numerical user ID is not recognized.By default, login is allowed for all users.If the pattern takes the form USER@HOST then USER and HOSTare separately checked, restricting logins to particularusers from particular hosts..Pp.It Cm AuthorizedKeysFileSpecifies the file that contains the public keys that can be usedfor user authentication..Cm AuthorizedKeysFilemay contain tokens of the form %T which are substituted during connectionset-up. The following tokens are defined: %% is replaced by a literal '%',%h is replaced by the home directory of the user being authenticated and%u is replaced by the username of that user.After expansion,.Cm AuthorizedKeysFileis taken to be an absolute path or one relative to the user's homedirectory.The default is.Dq .ssh/authorized_keys ..It Cm BannerIn some jurisdictions, sending a warning message before authenticationmay be relevant for getting legal protection.The contents of the specified file are sent to the remote user beforeauthentication is allowed.This option is only available for protocol version 2.By default, no banner is displayed..Pp.It Cm ChallengeResponseAuthenticationSpecifies whether challenge response authentication is allowed.All authentication styles from.Xr login.conf 5are supported.The default is.Dq yes ..It Cm CiphersSpecifies the ciphers allowed for protocol version 2.Multiple ciphers must be comma-separated.The default is.Pp.Bd -literal  ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,    aes192-cbc,aes256-cbc''.Ed.It Cm ClientAliveIntervalSets a timeout interval in seconds after which if no data has been receivedfrom the client,.Nm sshdwill send a message through the encryptedchannel to request a response from the client.The defaultis 0, indicating that these messages will not be sent to the client.This option applies to protocol version 2 only..It Cm ClientAliveCountMaxSets the number of client alive messages (see above) which may besent without.Nm sshdreceiving any messages back from the client. If this threshold isreached while client alive messages are being sent,.Nm sshdwill disconnect the client, terminating the session. It is importantto note that the use of client alive messages is very different from.Cm KeepAlive(below). The client alive messages are sent through theencrypted channel and therefore will not be spoofable. The TCP keepaliveoption enabled by.Cm KeepAliveis spoofable. The client alive mechanism is valuable when the client orserver depend on knowing when a connection has become inactive..PpThe default value is 3. If.Cm ClientAliveInterval(above) is set to 15, and.Cm ClientAliveCountMaxis left at the default, unresponsive ssh clientswill be disconnected after approximately 45 seconds..It Cm CompressionSpecifies whether compression is allowed.The argument must be.Dq yesor.Dq no .The default is.Dq yes ..It Cm DenyGroupsThis keyword can be followed by a list of group name patterns, separatedby spaces.Login is disallowed for users whose primary group or supplementarygroup list matches one of the patterns..Ql \&*and.Ql ?can be used aswildcards in the patterns.Only group names are valid; a numerical group ID is not recognized.By default, login is allowed for all groups..Pp.It Cm DenyUsersThis keyword can be followed by a list of user name patterns, separatedby spaces.Login is disallowed for user names that match one of the patterns..Ql \&*and.Ql ?can be used as wildcards in the patterns.Only user names are valid; a numerical user ID is not recognized.By default, login is allowed for all users.If the pattern takes the form USER@HOST then USER and HOSTare separately checked, restricting logins to particularusers from particular hosts..It Cm GatewayPortsSpecifies whether remote hosts are allowed to connect to portsforwarded for the client.By default,.Nm sshdbinds remote port forwardings to the loopback address.This prevents other remote hosts from connecting to forwarded ports..Cm GatewayPortscan be used to specify that.Nm sshdshould bind remote port forwardings to the wildcard address,thus allowing remote hosts to connect to forwarded ports.The argument must be.Dq yesor.Dq no .The default is.Dq no ..It Cm HostbasedAuthenticationSpecifies whether rhosts or /etc/hosts.equiv authentication togetherwith successful public key client host authentication is allowed(hostbased authentication).This option is similar to.Cm RhostsRSAAuthenticationand applies to protocol version 2 only.The default is.Dq no ..It Cm HostKeySpecifies a file containing a private host keyused by SSH.The default is.Pa /etc/ssh/ssh_host_keyfor protocol version 1, and.Pa /etc/ssh/ssh_host_rsa_keyand.Pa /etc/ssh/ssh_host_dsa_keyfor protocol version 2.Note that.Nm sshdwill refuse to use a file if it is group/world-accessible.It is possible to have multiple host key files..Dq rsa1keys are used for version 1 and.Dq dsaor.Dq rsaare used for version 2 of the SSH protocol..It Cm IgnoreRhostsSpecifies that.Pa .rhostsand.Pa .shostsfiles will not be used in.Cm RhostsAuthentication ,.Cm RhostsRSAAuthenticationor.Cm HostbasedAuthentication ..Pp.Pa /etc/hosts.equivand.Pa /etc/shosts.equivare still used.The default is.Dq yes ..It Cm IgnoreUserKnownHostsSpecifies whether.Nm sshdshould ignore the user's.Pa $HOME/.ssh/known_hostsduring.Cm RhostsRSAAuthenticationor.Cm HostbasedAuthentication .The default is.Dq no ..It Cm KeepAliveSpecifies whether the system should send TCP keepalive messages to theother side.If they are sent, death of the connection or crash of oneof the machines will be properly noticed.However, this means thatconnections will die if the route is down temporarily, and some peoplefind it annoying.On the other hand, if keepalives are not sent,sessions may hang indefinitely on the server, leaving.Dq ghostusers and consuming server resources..PpThe default is.Dq yes(to send keepalives), and the server will noticeif the network goes down or the client host crashes.This avoids infinitely hanging sessions..PpTo disable keepalives, the value should be set to.Dq no ..It Cm KerberosAuthenticationSpecifies whether Kerberos authentication is allowed.This can be in the form of a Kerberos ticket, or if.Cm PasswordAuthenticationis yes, the password provided by the user will be validated throughthe Kerberos KDC.To use this option, the server needs aKerberos servtab which allows the verification of the KDC's identity.Default is.Dq no ..It Cm KerberosOrLocalPasswdIf set then if password authentication through Kerberos fails thenthe password will be validated via any additional local mechanismsuch as.Pa /etc/passwd .Default is.Dq yes ..It Cm KerberosTgtPassingSpecifies whether a Kerberos TGT may be forwarded to the server.Default is.Dq no ,as this only works when the Kerberos KDC is actually an AFS kaserver..It Cm KerberosTicketCleanupSpecifies whether to automatically destroy the user's ticket cachefile on logout.Default is.Dq yes ..It Cm KeyRegenerationIntervalIn protocol version 1, the ephemeral server key is automatically regeneratedafter this many seconds (if it has been used).The purpose of regeneration is to preventdecrypting captured sessions by later breaking into the machine andstealing the keys.The key is never stored anywhere.If the value is 0, the key is never regenerated.The default is 3600 (seconds)..It Cm ListenAddressSpecifies the local addresses.Nm sshdshould listen on.The following forms may be used:.Pp.Bl -item -offset indent -compact.It.Cm ListenAddress.Sm off.Ar host No | Ar IPv4_addr No | Ar IPv6_addr.Sm on.It.Cm ListenAddress.Sm off.Ar host No | Ar IPv4_addr No : Ar port.Sm on.It.Cm ListenAddress.Sm off.Oo.Ar host No | Ar IPv6_addr Oc : Ar port.Sm on.El.PpIf.Ar portis not specified,.Nm sshdwill listen on the address and all prior.Cm Portoptions specified. The default is to listen on all localaddresses.Multiple.Cm ListenAddressoptions are permitted. Additionally, any.Cm Portoptions must precede this option for non port qualified addresses..It Cm LoginGraceTime

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久不见久久见中文字幕免费| 91精品国产乱| 精品日韩一区二区三区免费视频| 中文字幕亚洲在| 精彩视频一区二区| 欧美肥大bbwbbw高潮| 亚洲人成网站影音先锋播放| 国产一区二区剧情av在线| 欧美男男青年gay1069videost | 午夜精品成人在线视频| 成人晚上爱看视频| 久久久综合视频| 久久se这里有精品| 91精品国产色综合久久不卡电影| 亚洲精品国产无套在线观| 成人va在线观看| 欧美激情一二三区| 国产成人精品www牛牛影视| 精品国产乱码久久久久久夜甘婷婷| 丝袜美腿一区二区三区| 欧美日韩国产小视频在线观看| 亚洲色大成网站www久久九九| 成人黄色大片在线观看| 中文幕一区二区三区久久蜜桃| 国产精品自在在线| 久久综合九色综合欧美亚洲| 麻豆精品一区二区| 欧美α欧美αv大片| 精品在线免费视频| 精品国产乱码久久久久久影片| 免费人成精品欧美精品| 日韩欧美国产不卡| 久久99精品一区二区三区三区| 91精品婷婷国产综合久久性色| 日韩在线一二三区| 欧美一级二级三级乱码| 奇米四色…亚洲| 精品999在线播放| 国产精品18久久久久| 久久影院电视剧免费观看| 国产成+人+日韩+欧美+亚洲| 国产欧美一区在线| 91在线免费看| 亚洲成av人片www| 欧美福利视频一区| 国产美女精品人人做人人爽| 国产精品久久久久久久久果冻传媒| 99精品视频在线观看| 亚洲一区二区三区四区在线| 88在线观看91蜜桃国自产| 久久精品99国产精品| 久久久精品国产99久久精品芒果| 成人免费毛片片v| 亚洲黄色免费网站| 日韩一区二区精品葵司在线| 国产成人亚洲综合a∨猫咪| 亚洲欧美偷拍另类a∨色屁股| 在线视频综合导航| 激情都市一区二区| 亚洲伦理在线精品| 欧美一区二区三区在线看| 国产成人精品www牛牛影视| 亚洲一区二区在线免费观看视频| 欧美一级片免费看| 972aa.com艺术欧美| 久久精品国产一区二区三区免费看| 国产日本欧美一区二区| 欧美日韩一区精品| 国产成人精品午夜视频免费| 亚洲一区二区三区自拍| 国产午夜精品福利| 欧美电影一区二区| 北条麻妃国产九九精品视频| 美腿丝袜一区二区三区| 亚洲欧美日韩国产中文在线| 26uuu另类欧美亚洲曰本| 91社区在线播放| 国产一区中文字幕| 日韩精品乱码免费| 亚洲欧美日本在线| 国产欧美日韩综合精品一区二区| 欧美日韩成人激情| 91美女在线视频| 成人一区二区视频| 久久不见久久见中文字幕免费| 亚洲永久免费av| 国产精品麻豆久久久| 精品国产乱子伦一区| 91麻豆精品国产| 欧美三区免费完整视频在线观看| 懂色av中文一区二区三区 | 精品福利视频一区二区三区| 91激情在线视频| 丁香网亚洲国际| 国产精品资源在线| 久久er精品视频| 青青草成人在线观看| 天天做天天摸天天爽国产一区| 综合亚洲深深色噜噜狠狠网站| 国产欧美日韩麻豆91| 久久综合九色综合97婷婷女人 | 午夜精品久久久久久| 亚洲欧美二区三区| 亚洲日本电影在线| 国产精品高潮呻吟久久| 中文字幕乱码亚洲精品一区 | 精品少妇一区二区三区视频免付费 | 中文字幕av一区二区三区免费看| 精品国产伦理网| 精品国产三级电影在线观看| 欧美一区二区三区在线看| 91精品视频网| 精品国产一区二区三区不卡 | 国产91精品露脸国语对白| 激情综合色播五月| 九九视频精品免费| 韩国成人在线视频| 国产成人av电影在线播放| 成人性色生活片| 99re成人精品视频| 在线精品视频免费播放| 欧美日本一区二区在线观看| 欧美精品一级二级三级| 日韩午夜av电影| 国产视频一区在线播放| 中文字幕中文字幕一区二区| 亚洲精品久久7777| 日韩高清在线观看| 国产精品自在欧美一区| av毛片久久久久**hd| 日本精品免费观看高清观看| 欧美高清视频在线高清观看mv色露露十八 | 日韩一区二区麻豆国产| 久久久国产精品午夜一区ai换脸| 国产精品久久久久久久岛一牛影视| 亚洲欧洲制服丝袜| 免费高清在线一区| 成人av资源在线| 欧美日韩一区三区四区| 久久久午夜电影| 亚洲精品videosex极品| 久久精品国产免费看久久精品| 国产成人h网站| 欧美日韩中文一区| 国产亚洲精品超碰| 亚洲h动漫在线| 成人免费毛片高清视频| 欧美精品国产精品| 国产精品美女久久久久久| 日韩中文欧美在线| 波多野结衣一区二区三区| 欧美久久久影院| 日韩一区中文字幕| 久久成人羞羞网站| 欧美丝袜丝交足nylons| 久久九九久久九九| 性做久久久久久免费观看| 国v精品久久久网| 91精品国产综合久久小美女| 国产精品久久久久久久久快鸭| 日本欧美一区二区在线观看| 色综合天天做天天爱| 欧美精品一区二区不卡| 亚洲高清免费观看| 懂色av一区二区三区蜜臀| 欧美一级欧美三级在线观看| 一区二区三区在线免费观看| 国产精品99久久久| 日韩免费在线观看| 亚洲r级在线视频| 99久久精品费精品国产一区二区| 精品国产一区二区三区四区四 | av一区二区久久| 欧美xxxx在线观看| 午夜av一区二区| 欧洲国内综合视频| 亚洲视频在线观看一区| 国产很黄免费观看久久| 精品精品欲导航| 亚洲超碰97人人做人人爱| 色综合久久综合网| 中文字幕一区在线观看视频| 国产成人综合视频| 久久久久久久综合日本| 久久精品国产秦先生| 日韩三级视频在线看| 午夜欧美在线一二页| 欧美日韩精品系列| 亚洲制服丝袜在线| 在线一区二区三区四区五区| 中文字幕亚洲精品在线观看| 中文字幕的久久| 91传媒视频在线播放| 欧美韩国日本综合| 国产凹凸在线观看一区二区| 久久婷婷色综合| 风间由美一区二区av101| 国产亚洲精品超碰| 国产成人免费视频一区| 国产精品天美传媒|