OpenSSH | Tectia | Keyword | Value | Meaning |
---|---|---|---|---|
✓ | ✓ | # | Any text | Comment line |
✓ | | any | inet | inet6 | Set IP address type | |
✓ | | Yes/no | Same as | |
✓ | | Auth types | Permitted authentication techniques | |
✓ | | Yes/no | Print message on stdout on successful authentication | |
✓ | | Yes/no | Print message on stderr on successful authentication | |
✓ | ✓ | | Yes/no | Disable prompting |
✓ | | Interface | Select a network interface | |
✓ | | Yes/no | Certificates must be DoD PKI-compliant | |
✓ | | Yes/no | Verify server hostname versus certificate | |
✓ | | md5/sha1 | Set hash compatibility | |
✓ | | Yes/no | Enable challenge-response authentication | |
✓ | | Yes/no | Detect DNS spoofing | |
1 | | Cipher | Request encryption cipher | |
2 | ✓ | | Cipher_ list | Supported encryption ciphers |
✓ | ✓ | | Yes/no | Ignore any specified forwarding |
✓ | ✓ | | Yes/no | Enable data compression |
✓ | | 0-9 | Select compression algorithm | |
✓ | | # attempts | # of retries by client | |
✓ | | Time | Timeout for connecting to SSH server | |
✓ | | Yes/no/ask | Enable connection sharing | |
✓ | | Socket | Location of socket for connection sharing | |
✓ | | Filename | File for debug messages | |
✓ | | Domain | Specify domain name | |
✓ | | Yes/no | Compatibility with old versions of software | |
✓ | | Yes/no | Redirect stdin from /dev/ null | |
✓ | | Port, socket | Set up a dynamic forwarding | |
✓ | | Init string | Initialization string for external host key provider | |
✓ | | Provider | External host key provider | |
✓ | | Yes/no | Enable ssh-keysign | |
✓ | ✓ | | Character | Set escape character (^ = Ctrl key) |
✓ | | Yes/no | Allocate a pseudo-tty | |
✓ | ✓ | | Yes/no | Enable agent forwarding |
✓ | ✓ | | Yes/no | Enable X forwarding |
✓ | | Port, socket | Set up a trusted X forwarding | |
✓ | ✓ | | Yes/no | Gateway locally forwarded ports |
✓ | | Filename | Location of global known hosts file | |
✓ | | Yes/no | Fork into background | |
✓ | | kerberos | Permitted GSSAPI methods | |
✓ | | Yes/no | Use fallback code for old GSSAPI methods | |
✓ | | Yes/no | Delegate GSSAPI tokens | |
✓ | | Directory | Location of GSSAPI libraries | |
✓ | | Yes/no | Enable GSSAPI authentication | |
✓ | | Yes/no | Delegate GSSAPI tokens | |
✓ | | Hostname | Real name of a host | |
✓ | | Pattern | Begin section for this host | |
✓ | | CA spec | CA certificate for authentication | |
✓ | | Same as | ||
✓ | | Algorithm list | Set precedence of host key algorithms | |
✓ | | Alias | Set alias for a host key | |
✓ | | Hostname | Real name of host | |
✓ | | Yes/no | Ignore ssh-agent | |
✓ | ✓ | | Filename | Name of private-key file (RSA) |
✓ | | Yes/no | Send keepalive packets | |
✓ | | LDAP URL | Locate LDAP servers | |
✓ | ✓ | | Port, socket | Local port forwarding |
✓ | ✓ | | Algorithm | Select MAC algorithm |
✓ | | Yes/no | Enable Nagle Algorithm | |
✓ | | Yes/no | Ignore localhost when checking host keys | |
✓ | ✓ | | # prompts | # of prompts before failure |
✓ | | Yes/no | Permit password authentication | |
✓ | | String | Password prompt | |
✓ | ✓ | | Port number | Select server port number |
✓ | | Auth list | Permitted authentication techniques | |
✓ | | 1/2 | SSH protocol version | |
✓ | | Command | Connect to proxy server | |
✓ | | Server spec | SOCKS server | |
✓ | | Yes/no | Public-key authentication | |
✓ | | Yes/no | Quiet mode | |
✓ | | Filename | Location of random seed file | |
✓ | | Time | Frequency of key exchange | |
✓ | ✓ | | Port, socket | Remote port forwarding |
1 | | Yes/no | Permit combined authentication | |
1 | | Yes/no | Permit public-key authentication | |
✓ | | Variable list | Which environment variables are sent to SSH server | |
✓ | | # retries | Upper limit on retries to contact SSH server | |
✓ | | Time | Timeout to contact SSH server | |
✓ | | var=value | Set environment variable | |
✓ | | device | Smartcard device | |
✓ | | Server | Same as | |
✓ | | Yes/no | Enable SSH1 agent compatibility | |
✓ | | Yes/no | Enable SSH1 compatibility | |
✓ | | Yes/no | Do SSH-1 internally | |
✓ | | Yes/no | Mask password length | |
✓ | | Filename | Path to ssh1 | |
✓ | | Filename | Path to ssh-signer2 | |
✓ | ✓ | | Yes/no/ask | Behavior on host key mismatch |
✓ | | Yes/no | Send keepalive packets | |
✓ | | Yes/no | Enable trusted X11 forwarding | |
✓ | | Yes/no | Permit privileged port use | |
✓ | ✓ | | Username | Remote username |
✓ | | Filename | Location of user known hosts file | |
✓ | | Yes/no | Use SOCKS5 instead of SOCKS4 | |
✓ | | Yes/no | Verbose mode | |
✓ | | Yes/no/ask | Verify a remote host key via DNS | |
✓ | | Filename | Location of xauth | |
✓ | | Filename | Location of xauth |