Config-Model-OpenSsh

 view release on metacpan or  search on metacpan

lib/Config/Model/models/Sshd.pod  view on Meta::CPAN

=over 4

=item upstream_default value :

no

=back



=head2 PermitListen

B<PermitListen>Specifies the addresses/ports
on which a remote TCP port forwarding may listen. The listen
specification must be one of the following forms:B<PermitListen>I<port> B<
PermitListen> I<host>:I<port>Multiple
permissions may be specified by separating them with
whitespace. An argument of B<any> can be used to remove
all restrictions and permit any listen requests. An argument
of B<none> can be used to prohibit all listen requests.
The host name may contain wildcards as described in the
PATTERNS section in L<ssh_config(5)>. The wildcard
’*’ can also be used in place of a port number
to allow all ports. By default all port forwarding listen
requests are permitted. Note that the B<GatewayPorts>
option may further restrict which addresses may be listened
on. Note also that L<ssh(1)> will request a listen host of
“localhost” if no listen host was specifically
requested, and this this name is treated differently to
explicit localhost addresses of “127.0.0.1” and
“::1”. I< Optional. Type list of uniline.  > 

=head2 PermitOpen

B<PermitOpen>Specifies the destinations to
which TCP port forwarding is permitted. The forwarding
specification must be one of the following forms:B<PermitOpen>I<host>:I<port> B<
PermitOpen> I<IPv4_addr>:I<port> B<
PermitOpen> I<[IPv6_addr]>:I<port>Multiple
forwards may be specified by separating them with
whitespace. An argument of B<any> can be used to remove
all restrictions and permit any forwarding requests. An
argument of B<none> can be used to prohibit all
forwarding requests. The wildcard ’*’ can be
used for host or port to allow all hosts or ports,
respectively. By default all port forwarding requests are
permitted. I< Optional. Type list of uniline.  > 

=head2 PermitRootLogin

B<PermitRootLogin>Specifies whether root can log
in using L<ssh(1)>. The argument must be B<yes>,
B<prohibit-password>, B<forced-commands-only>, or
B<no>. The default is B<prohibit-password>.If this option
is set to B<prohibit-password> (or its deprecated alias,
B<without-password>), password and keyboard-interactive
authentication are disabled for root.If this option
is set to B<forced-commands-only>, root login with
public key authentication will be allowed, but only if the
I<command> option has been specified (which may be
useful for taking remote backups even if root login is
normally not allowed). All other authentication methods are
disabled for root.If this option
is set to B<no>, root is not allowed to log in. I< Optional. Type enum. choice: 'yes', 'prohibit-password', 'forced-commands-only', 'no'.  > 

=head2 PermitTTY

B<PermitTTY>Specifies whether L<pty(4)>
allocation is permitted. The default is B<yes>. I< Optional. Type boolean.  > 

=over 4

=item upstream_default value :

yes

=back



=head2 PermitTunnel

B<PermitTunnel>Specifies whether L<tun(4)> device
forwarding is allowed. The argument must be B<yes>,
B<point-to-point> (layer 3), B<ethernet> (layer 2),
or B<no>. Specifying B<yes> permits both
B<point-to-point> and B<ethernet>. The default is
B<no>.Independent of
this setting, the permissions of the selected L<tun(4)> device
must allow access to the user. I< Optional. Type enum. choice: 'yes', 'point-to-point', 'ethernet', 'no'.  > 

=over 4

=item upstream_default value :

no

=back



=head2 PermitUserRC

B<PermitUserRC>Specifies whether any
I<~/.ssh/rc> file is executed. The default is
B<yes>. I< Optional. Type boolean.  > 

=over 4

=item upstream_default value :

yes

=back



=head2 PubkeyAcceptedKeyTypes

B<PubkeyAcceptedKeyTypes>Specifies the key types that
will be accepted for public key authentication as a list of



( run in 1.305 second using v1.01-cache-2.11-cpan-39bf76dae61 )