dropbear.8 5.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192
  1. .TH dropbear 8
  2. .SH NAME
  3. dropbear \- lightweight SSH server
  4. .SH SYNOPSIS
  5. .B dropbear
  6. [\fIflag arguments\fR] [\-b
  7. .I banner\fR]
  8. [\-r
  9. .I hostkeyfile\fR] [\-p [\fIaddress\fR:]\fIport\fR]
  10. .SH DESCRIPTION
  11. .B dropbear
  12. is a small SSH server
  13. .SH OPTIONS
  14. .TP
  15. .B \-b \fIbanner
  16. bannerfile.
  17. Display the contents of the file
  18. .I banner
  19. before user login (default: none).
  20. .TP
  21. .B \-r \fIhostkey
  22. Use the contents of the file
  23. .I hostkey
  24. for the SSH hostkey.
  25. This file is generated with
  26. .BR dropbearkey (1)
  27. or automatically with the '-R' option. See "Host Key Files" below.
  28. .TP
  29. .B \-R
  30. Generate hostkeys automatically. See "Host Key Files" below.
  31. .TP
  32. .B \-F
  33. Don't fork into background.
  34. .TP
  35. .B \-E
  36. Log to standard error rather than syslog.
  37. .TP
  38. .B \-m
  39. Don't display the message of the day on login.
  40. .TP
  41. .B \-w
  42. Disallow root logins.
  43. .TP
  44. .B \-s
  45. Disable password logins.
  46. .TP
  47. .B \-g
  48. Disable password logins for root.
  49. .TP
  50. .B \-j
  51. Disable local port forwarding.
  52. .TP
  53. .B \-k
  54. Disable remote port forwarding.
  55. .TP
  56. .B \-p\fR [\fIaddress\fR:]\fIport
  57. Listen on specified
  58. .I address
  59. and TCP
  60. .I port.
  61. If just a port is given listen
  62. on all addresses.
  63. up to 10 can be specified (default 22 if none specified).
  64. .TP
  65. .B \-i
  66. Service program mode.
  67. Use this option to run
  68. .B dropbear
  69. under TCP/IP servers like inetd, tcpsvd, or tcpserver.
  70. In program mode the \-F option is implied, and \-p options are ignored.
  71. .TP
  72. .B \-P \fIpidfile
  73. Specify a pidfile to create when running as a daemon. If not specified, the
  74. default is /var/run/dropbear.pid
  75. .TP
  76. .B \-a
  77. Allow remote hosts to connect to forwarded ports.
  78. .TP
  79. .B \-W \fIwindowsize
  80. Specify the per-channel receive window buffer size. Increasing this
  81. may improve network performance at the expense of memory use. Use -h to see the
  82. default buffer size.
  83. .TP
  84. .B \-K \fItimeout_seconds
  85. Ensure that traffic is transmitted at a certain interval in seconds. This is
  86. useful for working around firewalls or routers that drop connections after
  87. a certain period of inactivity. The trade-off is that a session may be
  88. closed if there is a temporary lapse of network connectivity. A setting
  89. if 0 disables keepalives. If no response is received for 3 consecutive keepalives the connection will be closed.
  90. .TP
  91. .B \-I \fIidle_timeout
  92. Disconnect the session if no traffic is transmitted or received for \fIidle_timeout\fR seconds.
  93. .TP
  94. .B \-V
  95. Print the version
  96. .SH FILES
  97. .TP
  98. Authorized Keys
  99. ~/.ssh/authorized_keys can be set up to allow remote login with a RSA,
  100. ECDSA, or DSS
  101. key. Each line is of the form
  102. .TP
  103. [restrictions] ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIgAsp... [comment]
  104. and can be extracted from a Dropbear private host key with "dropbearkey -y". This is the same format as used by OpenSSH, though the restrictions are a subset (keys with unknown restrictions are ignored).
  105. Restrictions are comma separated, with double quotes around spaces in arguments.
  106. Available restrictions are:
  107. .TP
  108. .B no-port-forwarding
  109. Don't allow port forwarding for this connection
  110. .TP
  111. .B no-agent-forwarding
  112. Don't allow agent forwarding for this connection
  113. .TP
  114. .B no-X11-forwarding
  115. Don't allow X11 forwarding for this connection
  116. .TP
  117. .B no-pty
  118. Disable PTY allocation. Note that a user can still obtain most of the
  119. same functionality with other means even if no-pty is set.
  120. .TP
  121. .B command=\fR"\fIforced_command\fR"
  122. Disregard the command provided by the user and always run \fIforced_command\fR.
  123. The authorized_keys file and its containing ~/.ssh directory must only be
  124. writable by the user, otherwise Dropbear will not allow a login using public
  125. key authentication.
  126. .TP
  127. Host Key Files
  128. Host key files are read at startup from a standard location, by default
  129. /etc/dropbear/dropbear_dss_host_key, /etc/dropbear/dropbear_rsa_host_key, and
  130. /etc/dropbear/dropbear_ecdsa_host_key
  131. or specified on the commandline with -r. These are of the form generated
  132. by dropbearkey. The -R option can be used to automatically generate keys
  133. in the default location - keys will be generated after startup when the first
  134. connection is established. This had the benefit that the system /dev/urandom
  135. random number source has a better chance of being securely seeded.
  136. .TP
  137. Message Of The Day
  138. By default the file /etc/motd will be printed for any login shell (unless
  139. disabled at compile-time). This can also be disabled per-user
  140. by creating a file ~/.hushlogin .
  141. .SH ENVIRONMENT VARIABLES
  142. Dropbear sets the standard variables USER, LOGNAME, HOME, SHELL, PATH, and TERM.
  143. The variables below are set for sessions as appropriate.
  144. .TP
  145. .B SSH_TTY
  146. This is set to the allocated TTY if a PTY was used.
  147. .TP
  148. .B SSH_CONNECTION
  149. Contains "<remote_ip> <remote_port> <local_ip> <local_port>".
  150. .TP
  151. .B DISPLAY
  152. Set X11 forwarding is used.
  153. .TP
  154. .B SSH_ORIGINAL_COMMAND
  155. If a 'command=' authorized_keys option was used, the original command is specified
  156. in this variable. If a shell was requested this is set to an empty value.
  157. .TP
  158. .B SSH_AUTH_SOCK
  159. Set to a forwarded ssh-agent connection.
  160. .SH NOTES
  161. Dropbear only supports SSH protocol version 2.
  162. .SH AUTHOR
  163. Matt Johnston (matt@ucc.asn.au).
  164. .br
  165. Gerrit Pape (pape@smarden.org) wrote this manual page.
  166. .SH SEE ALSO
  167. dropbearkey(1), dbclient(1), dropbearconvert(1)
  168. .P
  169. https://matt.ucc.asn.au/dropbear/dropbear.html