亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? sshd_config.5

?? C++編寫
?? 5
?? 第 1 頁 / 共 2 頁
字號:
.\"  -*- nroff -*-.\".\" Author: Tatu Ylonen <ylo@cs.hut.fi>.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland.\"                    All rights reserved.\".\" As far as I am concerned, the code I have written for this software.\" can be used freely for any purpose.  Any derived versions of this.\" software must be clearly marked as such, and if the derived work is.\" incompatible with the protocol description in the RFC file, it must be.\" called by a name other than "ssh" or "Secure Shell"..\".\" Copyright (c) 1999,2000 Markus Friedl.  All rights reserved..\" Copyright (c) 1999 Aaron Campbell.  All rights reserved..\" Copyright (c) 1999 Theo de Raadt.  All rights reserved..\".\" Redistribution and use in source and binary forms, with or without.\" modification, are permitted provided that the following conditions.\" are met:.\" 1. Redistributions of source code must retain the above copyright.\"    notice, this list of conditions and the following disclaimer..\" 2. Redistributions in binary form must reproduce the above copyright.\"    notice, this list of conditions and the following disclaimer in the.\"    documentation and/or other materials provided with the distribution..\".\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED..\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE..\".\" $OpenBSD: sshd_config.5,v 1.15 2003/03/28 10:11:43 jmc Exp $.Dd September 25, 1999.Dt SSHD_CONFIG 5.Os.Sh NAME.Nm sshd_config.Nd OpenSSH SSH daemon configuration file.Sh SYNOPSIS.Bl -tag -width Ds -compact.It Pa /etc/ssh/sshd_config.El.Sh DESCRIPTION.Nm sshdreads configuration data from.Pa /etc/ssh/sshd_config(or the file specified with.Fl fon the command line).The file contains keyword-argument pairs, one per line.Lines starting with.Ql #and empty lines are interpreted as comments..PpThe possiblekeywords and their meanings are as follows (note thatkeywords are case-insensitive and arguments are case-sensitive):.Bl -tag -width Ds.It Cm AFSTokenPassingSpecifies whether an AFS token may be forwarded to the server.Default is.Dq no ..It Cm AllowGroupsThis keyword can be followed by a list of group name patterns, separatedby spaces.If specified, login is allowed only for users whose primarygroup or supplementary group list matches one of the patterns..Ql \&*and.Ql ?can be used aswildcards in the patterns.Only group names are valid; a numerical group ID is not recognized.By default, login is allowed for all groups..Pp.It Cm AllowTcpForwardingSpecifies whether TCP forwarding is permitted.The default is.Dq yes .Note that disabling TCP forwarding does not improve security unlessusers are also denied shell access, as they can always install theirown forwarders..Pp.It Cm AllowUsersThis keyword can be followed by a list of user name patterns, separatedby spaces.If specified, login is allowed only for user names thatmatch one of the patterns..Ql \&*and.Ql ?can be used aswildcards in the patterns.Only user names are valid; a numerical user ID is not recognized.By default, login is allowed for all users.If the pattern takes the form USER@HOST then USER and HOSTare separately checked, restricting logins to particularusers from particular hosts..Pp.It Cm AuthorizedKeysFileSpecifies the file that contains the public keys that can be usedfor user authentication..Cm AuthorizedKeysFilemay contain tokens of the form %T which are substituted during connectionset-up. The following tokens are defined: %% is replaced by a literal '%',%h is replaced by the home directory of the user being authenticated and%u is replaced by the username of that user.After expansion,.Cm AuthorizedKeysFileis taken to be an absolute path or one relative to the user's homedirectory.The default is.Dq .ssh/authorized_keys ..It Cm BannerIn some jurisdictions, sending a warning message before authenticationmay be relevant for getting legal protection.The contents of the specified file are sent to the remote user beforeauthentication is allowed.This option is only available for protocol version 2.By default, no banner is displayed..Pp.It Cm ChallengeResponseAuthenticationSpecifies whether challenge response authentication is allowed.All authentication styles from.Xr login.conf 5are supported.The default is.Dq yes ..It Cm CiphersSpecifies the ciphers allowed for protocol version 2.Multiple ciphers must be comma-separated.The default is.Pp.Bd -literal  ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,    aes192-cbc,aes256-cbc''.Ed.It Cm ClientAliveIntervalSets a timeout interval in seconds after which if no data has been receivedfrom the client,.Nm sshdwill send a message through the encryptedchannel to request a response from the client.The defaultis 0, indicating that these messages will not be sent to the client.This option applies to protocol version 2 only..It Cm ClientAliveCountMaxSets the number of client alive messages (see above) which may besent without.Nm sshdreceiving any messages back from the client. If this threshold isreached while client alive messages are being sent,.Nm sshdwill disconnect the client, terminating the session. It is importantto note that the use of client alive messages is very different from.Cm KeepAlive(below). The client alive messages are sent through theencrypted channel and therefore will not be spoofable. The TCP keepaliveoption enabled by.Cm KeepAliveis spoofable. The client alive mechanism is valuable when the client orserver depend on knowing when a connection has become inactive..PpThe default value is 3. If.Cm ClientAliveInterval(above) is set to 15, and.Cm ClientAliveCountMaxis left at the default, unresponsive ssh clientswill be disconnected after approximately 45 seconds..It Cm CompressionSpecifies whether compression is allowed.The argument must be.Dq yesor.Dq no .The default is.Dq yes ..It Cm DenyGroupsThis keyword can be followed by a list of group name patterns, separatedby spaces.Login is disallowed for users whose primary group or supplementarygroup list matches one of the patterns..Ql \&*and.Ql ?can be used aswildcards in the patterns.Only group names are valid; a numerical group ID is not recognized.By default, login is allowed for all groups..Pp.It Cm DenyUsersThis keyword can be followed by a list of user name patterns, separatedby spaces.Login is disallowed for user names that match one of the patterns..Ql \&*and.Ql ?can be used as wildcards in the patterns.Only user names are valid; a numerical user ID is not recognized.By default, login is allowed for all users.If the pattern takes the form USER@HOST then USER and HOSTare separately checked, restricting logins to particularusers from particular hosts..It Cm GatewayPortsSpecifies whether remote hosts are allowed to connect to portsforwarded for the client.By default,.Nm sshdbinds remote port forwardings to the loopback address.This prevents other remote hosts from connecting to forwarded ports..Cm GatewayPortscan be used to specify that.Nm sshdshould bind remote port forwardings to the wildcard address,thus allowing remote hosts to connect to forwarded ports.The argument must be.Dq yesor.Dq no .The default is.Dq no ..It Cm HostbasedAuthenticationSpecifies whether rhosts or /etc/hosts.equiv authentication togetherwith successful public key client host authentication is allowed(hostbased authentication).This option is similar to.Cm RhostsRSAAuthenticationand applies to protocol version 2 only.The default is.Dq no ..It Cm HostKeySpecifies a file containing a private host keyused by SSH.The default is.Pa /etc/ssh/ssh_host_keyfor protocol version 1, and.Pa /etc/ssh/ssh_host_rsa_keyand.Pa /etc/ssh/ssh_host_dsa_keyfor protocol version 2.Note that.Nm sshdwill refuse to use a file if it is group/world-accessible.It is possible to have multiple host key files..Dq rsa1keys are used for version 1 and.Dq dsaor.Dq rsaare used for version 2 of the SSH protocol..It Cm IgnoreRhostsSpecifies that.Pa .rhostsand.Pa .shostsfiles will not be used in.Cm RhostsAuthentication ,.Cm RhostsRSAAuthenticationor.Cm HostbasedAuthentication ..Pp.Pa /etc/hosts.equivand.Pa /etc/shosts.equivare still used.The default is.Dq yes ..It Cm IgnoreUserKnownHostsSpecifies whether.Nm sshdshould ignore the user's.Pa $HOME/.ssh/known_hostsduring.Cm RhostsRSAAuthenticationor.Cm HostbasedAuthentication .The default is.Dq no ..It Cm KeepAliveSpecifies whether the system should send TCP keepalive messages to theother side.If they are sent, death of the connection or crash of oneof the machines will be properly noticed.However, this means thatconnections will die if the route is down temporarily, and some peoplefind it annoying.On the other hand, if keepalives are not sent,sessions may hang indefinitely on the server, leaving.Dq ghostusers and consuming server resources..PpThe default is.Dq yes(to send keepalives), and the server will noticeif the network goes down or the client host crashes.This avoids infinitely hanging sessions..PpTo disable keepalives, the value should be set to.Dq no ..It Cm KerberosAuthenticationSpecifies whether Kerberos authentication is allowed.This can be in the form of a Kerberos ticket, or if.Cm PasswordAuthenticationis yes, the password provided by the user will be validated throughthe Kerberos KDC.To use this option, the server needs aKerberos servtab which allows the verification of the KDC's identity.Default is.Dq no ..It Cm KerberosOrLocalPasswdIf set then if password authentication through Kerberos fails thenthe password will be validated via any additional local mechanismsuch as.Pa /etc/passwd .Default is.Dq yes ..It Cm KerberosTgtPassingSpecifies whether a Kerberos TGT may be forwarded to the server.Default is.Dq no ,as this only works when the Kerberos KDC is actually an AFS kaserver..It Cm KerberosTicketCleanupSpecifies whether to automatically destroy the user's ticket cachefile on logout.Default is.Dq yes ..It Cm KeyRegenerationIntervalIn protocol version 1, the ephemeral server key is automatically regeneratedafter this many seconds (if it has been used).The purpose of regeneration is to preventdecrypting captured sessions by later breaking into the machine andstealing the keys.The key is never stored anywhere.If the value is 0, the key is never regenerated.The default is 3600 (seconds)..It Cm ListenAddressSpecifies the local addresses.Nm sshdshould listen on.The following forms may be used:.Pp.Bl -item -offset indent -compact.It.Cm ListenAddress.Sm off.Ar host No | Ar IPv4_addr No | Ar IPv6_addr.Sm on.It.Cm ListenAddress.Sm off.Ar host No | Ar IPv4_addr No : Ar port.Sm on.It.Cm ListenAddress.Sm off.Oo.Ar host No | Ar IPv6_addr Oc : Ar port.Sm on.El.PpIf.Ar portis not specified,.Nm sshdwill listen on the address and all prior.Cm Portoptions specified. The default is to listen on all localaddresses.Multiple.Cm ListenAddressoptions are permitted. Additionally, any.Cm Portoptions must precede this option for non port qualified addresses..It Cm LoginGraceTime

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美体内she精视频| 精品美女一区二区| 久久综合网色—综合色88| 亚洲欧美另类久久久精品| 国产精品亚洲一区二区三区在线| 日本不卡视频一二三区| 久久久精品tv| 日韩美女在线视频| 欧美少妇性性性| 色综合久久中文综合久久97| 国产成人免费高清| 蜜桃精品在线观看| 亚洲成人av一区| 亚洲欧美国产三级| 中日韩免费视频中文字幕| 精品免费日韩av| 在线不卡免费欧美| 色婷婷久久99综合精品jk白丝| 国产精品乡下勾搭老头1| 免费在线观看不卡| 爽好多水快深点欧美视频| 亚洲欧美另类图片小说| 中文字幕五月欧美| 亚洲国产成人私人影院tom | 欧美精品久久久久久久久老牛影院| 国产91丝袜在线观看| 国产在线播精品第三| 麻豆91免费看| 九色综合狠狠综合久久| 美日韩一区二区| 奇米色一区二区| 午夜伦欧美伦电影理论片| 亚洲大型综合色站| 一区二区三区在线免费| 亚洲男人天堂av| 五月婷婷激情综合网| 午夜私人影院久久久久| 性做久久久久久久免费看| 亚洲成av人片| 五月婷婷久久综合| 久久精品国产99| 国产一区美女在线| 国产99久久久国产精品潘金| 成人久久视频在线观看| 成人av免费观看| 日日夜夜精品免费视频| 亚洲综合男人的天堂| 天堂va蜜桃一区二区三区漫画版| 国产精品欧美久久久久一区二区| 欧美一区三区四区| 欧美在线短视频| 91久久国产最好的精华液| 丁香六月久久综合狠狠色| 国产一二三精品| 国产福利91精品一区| 久久www免费人成看片高清| 国产福利91精品| 亚洲日本免费电影| 亚洲国产精品一区二区尤物区| 亚洲永久精品国产| 水蜜桃久久夜色精品一区的特点| 看电视剧不卡顿的网站| 国产激情一区二区三区桃花岛亚洲| 欧美日本国产视频| 欧美日高清视频| 日韩欧美第一区| 国产精品日日摸夜夜摸av| 一区二区三区日韩在线观看| 日欧美一区二区| 国产高清不卡二三区| 色哟哟欧美精品| 日韩一区二区三区在线视频| 久久蜜桃av一区精品变态类天堂 | 国产精品日韩成人| 亚洲激情一二三区| 久久精品免费观看| 99国产精品视频免费观看| 欧美一区二区三区在线观看| 国产精品天干天干在线综合| 亚洲成人第一页| 成人一级片网址| 911精品产国品一二三产区| 国产亚洲婷婷免费| 午夜激情久久久| 成人黄色一级视频| 制服.丝袜.亚洲.另类.中文 | 婷婷综合在线观看| 高清在线不卡av| 欧美日韩高清影院| 国产精品女同互慰在线看| 天堂一区二区在线| av欧美精品.com| 日韩精品一区二区三区在线| 中文字幕一区二区三区视频| 奇米888四色在线精品| 成人综合在线观看| 日韩一区二区三区在线| 亚洲激情校园春色| 国产成人精品一区二区三区四区 | 午夜欧美大尺度福利影院在线看| 丁香另类激情小说| 精品国产一区二区亚洲人成毛片| 福利91精品一区二区三区| 欧美久久免费观看| 国产在线国偷精品免费看| 精品乱码亚洲一区二区不卡| 免费在线观看一区二区三区| 在线观看网站黄不卡| 亚洲免费视频中文字幕| 成人妖精视频yjsp地址| 久久九九久久九九| 国内精品自线一区二区三区视频| 欧美日韩一区在线| 亚洲国产日产av| 欧美色图激情小说| 欧美日韩精品一区二区三区蜜桃 | 欧洲生活片亚洲生活在线观看| 日韩免费电影一区| 青青草成人在线观看| 91传媒视频在线播放| 国产精品成人在线观看| 国产精品一区在线| 日韩一二三区视频| 亚洲福利电影网| 一本色道亚洲精品aⅴ| 欧美国产禁国产网站cc| 国产精品一区二区久久精品爱涩| 日韩欧美激情在线| 麻豆专区一区二区三区四区五区| 欧美精选午夜久久久乱码6080| 一区二区三区在线观看视频| 99re视频精品| 成人欧美一区二区三区视频网页 | 日本一区二区三区dvd视频在线| 天天色天天操综合| 这里只有精品电影| 免费人成黄页网站在线一区二区| 9191精品国产综合久久久久久| 午夜精品一区二区三区免费视频| 欧美影视一区二区三区| 午夜视频在线观看一区| 欧美一区二区三区免费观看视频| 久久精品国产一区二区三区免费看| 日韩女优毛片在线| 国产福利91精品一区二区三区| 国产视频在线观看一区二区三区| 国产福利一区二区三区| 中文字幕一区二区三区不卡| 91视频在线观看| 亚洲伊人伊色伊影伊综合网| 欧美高清视频不卡网| 美国欧美日韩国产在线播放| 久久久久九九视频| 99精品视频一区二区三区| 一区二区三区四区蜜桃| 欧美精品一卡二卡| 狠狠色丁香久久婷婷综合丁香| 国产色产综合色产在线视频| 91在线观看视频| 视频一区二区中文字幕| 久久精品视频一区二区三区| www.亚洲国产| 色哟哟欧美精品| 99久久免费精品高清特色大片| 欧洲一区二区三区免费视频| 在线不卡免费av| 91麻豆精品久久久久蜜臀| 欧洲一区在线电影| 欧美性欧美巨大黑白大战| 色欲综合视频天天天| 91蜜桃在线免费视频| fc2成人免费人成在线观看播放 | 91啪亚洲精品| 成人福利视频在线| 欧美午夜精品一区| 免费欧美日韩国产三级电影| 日韩一区二区三区四区五区六区| 国产盗摄女厕一区二区三区 | 91精品一区二区三区久久久久久| 激情综合色播激情啊| 亚洲另类在线制服丝袜| 日韩欧美资源站| 色综合天天天天做夜夜夜夜做| 婷婷综合五月天| 国产精品三级视频| 欧美美女一区二区三区| 国产成人在线免费观看| 亚洲国产成人91porn| 欧美国产国产综合| 日韩三级中文字幕| 91蝌蚪国产九色| 国产毛片精品一区| 亚洲bt欧美bt精品777| 国产精品久久久久久久久免费丝袜| 欧美精品在线一区二区三区| 97精品久久久久中文字幕| 国内精品国产成人| 日产欧产美韩系列久久99| 国产精品久久久久aaaa| 2020国产精品久久精品美国|