Config-Model-OpenSsh

 view release on metacpan or  search on metacpan

lib/Config/Model/models/Ssh/HostElement.pod  view on Meta::CPAN

should remain open in the background (waiting for future
client connections) after the initial client connection has
been closed. If set to B<no>, then the master connection
will not be placed into the background, and will close as
soon as the initial client connection is closed. If set to
B<yes> or 0, then the master connection will remain in
the background indefinitely (until killed or closed via a
mechanism such as the "ssh -O exit"). If set to a
time in seconds, or a time in any of the formats documented
in L<sshd_config(5)>, then the backgrounded master connection
will automatically terminate after it has remained idle
(with no client connections) for the specified time. I< Optional. Type uniline.  > 

=head2 DynamicForward

Specifies that a TCP port on
the local machine be forwarded over the secure channel, and
the application protocol is then used to determine where to
connect to from the remote machine.Currently the
SOCKS4 and SOCKS5 protocols are supported, and L<ssh(1)> will
act as a SOCKS server. Multiple forwardings may be
specified, and additional forwardings can be given on the
command line. Only the superuser can forward privileged
ports. I< Optional. Type list of uniline.  > 

=head2 EnableSSHKeysign

Setting this option to
B<yes> in the global client configuration file
I</etc/ssh/ssh_config> enables the use of the helper
program L<ssh-keysign(8)> during
B<HostbasedAuthentication>. The argument must be
B<yes> or B<no> (the default). This option should be
placed in the non-hostspecific section. See L<ssh-keysign(8)>
for more information.Setting this option to
B<yes> in the global client configuration file
I</etc/ssh/ssh_config> enables the use of the helper
program L<ssh-keysign(8)> during
B<HostbasedAuthentication>. The argument must be
B<yes> or B<no> (the default). This option should be
placed in the non-hostspecific section. See L<ssh-keysign(8)>
for more information. I< Optional. Type boolean.  > 

=over 4

=item upstream_default value :

no

=back



=head2 EscapeChar

Sets the escape character
(default: ’~’). The escape character can also be
set on the command line. The argument should be a single
character, ’^’ followed by a letter, or
B<none> to disable the escape character entirely (making
the connection transparent for binary data).Sets the escape character
(default: ’~’). The escape character can also be
set on the command line. The argument should be a single
character, ’^’ followed by a letter, or
B<none> to disable the escape character entirely (making
the connection transparent for binary data). I< Optional. Type uniline.  > 

=head2 ExitOnForwardFailure

Specifies whether L<ssh(1)> should
terminate the connection if it cannot set up all requested
dynamic, tunnel, local, and remote port forwardings, (e.g.
if either end is unable to bind and listen on a specified
port). Note that B<ExitOnForwardFailure> does not apply
to connections made over port forwardings and will not, for
example, cause L<ssh(1)> to exit if TCP connections to the
ultimate forwarding destination fail. The argument must be
B<yes> or B<no> (the default).Specifies whether L<ssh(1)> should
terminate the connection if it cannot set up all requested
dynamic, tunnel, local, and remote port forwardings, (e.g.
if either end is unable to bind and listen on a specified
port). Note that B<ExitOnForwardFailure> does not apply
to connections made over port forwardings and will not, for
example, cause L<ssh(1)> to exit if TCP connections to the
ultimate forwarding destination fail. The argument must be
B<yes> or B<no> (the default). I< Optional. Type boolean.  > 

=over 4

=item upstream_default value :

no

=back



=head2 FingerprintHash

Specifies the hash algorithm
used when displaying key fingerprints. Valid options are:
B<md5> and B<sha256> (the default).Specifies the hash algorithm
used when displaying key fingerprints. Valid options are:
B<md5> and B<sha256> (the default). I< Optional. Type enum. choice: 'md5', 'sha256'.  > 

=over 4

=item upstream_default value :

sha256

=back



=head2 ForwardAgent

Specifies whether the
connection to the authentication agent (if any) will be
forwarded to the remote machine. The argument must be
B<yes> or B<no> (the default).Agent
forwarding should be enabled with caution. Users with the
ability to bypass file permissions on the remote host (for
the agent’s Unix-domain socket) can access the local
agent through the forwarded connection. An attacker cannot
obtain key material from the agent, however they can perform



( run in 0.484 second using v1.01-cache-2.11-cpan-39bf76dae61 )