Lines Matching full:will
60 will be used.
256 will require confirmation using the
277 after which it will automatically be removed.
299 will be disabled.
324 will attempt to look up the unqualified hostname using the system resolver's
328 will cause
348 will attempt to canonicalize the hostname specified on the command line
390 will allow hostnames matching
416 character, then the specified algorithms will be appended to the default set
420 character, then the specified algorithms (including wildcards) will be removed
424 will not accept host certificates signed using algorithms other than those
453 configuration files; these certificates will be tried in sequence.
456 directives will add to the list of certificates used for
485 Traffic on any active channel will reset the timeout, but when the timeout
486 expires then all open channels will be closed.
539 will additionally check the host IP address in the
543 and will add addresses of destination hosts to
550 the check will not be executed.
558 character, then the specified ciphers will be appended to the default set
562 character, then the specified ciphers (including wildcards) will be removed
566 character, then the specified ciphers will be placed at the head of the
630 will listen for connections on a control socket specified using the
640 These sessions will try to reuse the master instance's network connection
641 rather than initiating new ones, but will fall back to connecting normally
646 will cause
654 will continue without connecting to a master instance.
659 display and agent forwarded will be the one belonging to the master
702 then the master connection will not be placed into the background,
703 and will close as soon as the initial client connection is closed.
707 then the master connection will remain in the background indefinitely
712 then the backgrounded master connection will automatically terminate
743 will act as a SOCKS server.
791 does not apply to connections made over port forwardings and will not,
837 will wait for all remote port forwards to be successfully established
848 will be forwarded to the remote machine.
866 Specifies whether X11 connections will be automatically redirected
892 after this time will be refused.
895 to zero will disable the timeout and permit X11 forwarding for the life
902 remote X11 clients will have full access to the original X11 display.
907 remote X11 clients will be considered untrusted and prevented
912 token used for the session will be set to expire after 20 minutes.
913 Remote clients will be refused access after this time.
961 will not be converted automatically,
965 Specifies the signature algorithms that will be used for hostbased
969 character, then the specified signature algorithms will be appended
974 will be removed from the default set instead of replacing them.
977 character, then the specified signature algorithms will be placed
1015 character, then the specified signature algorithms will be appended to
1020 will be removed from the default set instead of replacing them.
1023 character, then the specified signature algorithms will be placed
1102 is specified, the location of the socket will be read from the
1107 character, then it will be treated as an environment variable containing
1134 will be used for authentication unless
1140 will try to load certificate information from the filename obtained by
1158 identities will be tried in sequence.
1161 directives will add to the list of identities tried (this behaviour
1182 be listed early in the configuration file as it will not be applied
1191 Wildcards will be expanded and processed in lexical order.
1270 character, then the specified algorithms will be appended to the default set
1274 character, then the specified algorithms (including wildcards) will be removed
1278 character, then the specified algorithms will be placed at the head of the
1405 character, then the specified algorithms will be appended to the default set
1409 character, then the specified algorithms (including wildcards) will be removed
1413 character, then the specified algorithms will be placed at the head of the
1450 will send keystrokes at fixed intervals of a few tens of milliseconds
1451 and will send fake keystroke packets for some time after typing ceases.
1461 Note that smaller intervals will result in higher fake keystroke packet rates.
1559 Host key management will be done using the
1587 Multiple proxies may be separated by comma characters and will be visited
1589 Setting this option will cause
1601 Note that this option will compete with the
1603 option - whichever is specified first will prevent later instances of the
1614 will pass a connected file descriptor back to
1620 Specifies the signature algorithms that will be used for public key
1624 character, then the algorithms after it will be appended to the default
1628 character, then the specified algorithms (including wildcards) will be removed
1632 character, then the specified algorithms will be placed at the head of the
1716 will be established as a SOCKS proxy.
1735 the listen port will be dynamically allocated on the server and reported
1749 will only succeed if the server's
1773 will accept.
1774 User authentication keys smaller than this limit will be ignored.
1775 Servers that present host keys smaller than this limit will cause the
1783 Keys listed in this file will be refused for host authentication.
1785 then host authentication will be refused for all hosts.
1800 Specifies a path to a library that will be used when loading any
1806 character, then it will be treated as an environment variable containing
1844 ssh will disconnect from the server, terminating the session.
1850 and therefore will not be spoofable.
1863 ssh will disconnect after approximately 45 seconds.
1868 will send a message through the encrypted
1871 is 0, indicating that these messages will not be sent to the server.
1929 will be unable to forward the port to the Unix-domain socket file.
1941 will never automatically add host keys to the
1954 then ssh will automatically add new host keys to the user's
1956 file, but will not permit connections to hosts with
1962 ssh will automatically add new host keys to the user known hosts files
1969 will be added to the user known host files only after the user
1971 ssh will refuse to connect to hosts whose host key has changed.
1973 known hosts will be verified automatically in all cases.
1984 of the machines will be properly noticed.
1986 connections will die if the route is down temporarily, and some people
1991 (to send TCP keepalive messages), and the client will notice
2072 will be set to
2082 and will be disabled if it is enabled.
2116 the client will implicitly trust keys that match a secure fingerprint
2118 Insecure fingerprints will be handled as if this option was set to
2122 information on fingerprint match will be displayed, but the user will still
2143 only the fingerprint string will be printed for unknown host keys.
2187 Note that a negated match will never produce a positive result by itself.
2190 against the following pattern-list will fail:
2194 The solution here is to include a term that will yield a positive match,
2311 If a specified environment variable does not exist then an error will be
2312 returned and the setting for that keyword will be ignored.