dropbear.8 6.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213
  1. .TH dropbear 8
  2. .SH NAME
  3. dropbear \- lightweight SSH server
  4. .SH SYNOPSIS
  5. .B dropbear
  6. [\fIflag arguments\fR] [\-b
  7. .I banner\fR]
  8. [\-r
  9. .I hostkeyfile\fR] [\-p [\fIaddress\fR:]\fIport\fR]
  10. .SH DESCRIPTION
  11. .B dropbear
  12. is a small SSH server
  13. .SH OPTIONS
  14. .TP
  15. .B \-b \fIbanner
  16. bannerfile.
  17. Display the contents of the file
  18. .I banner
  19. before user login (default: none).
  20. .TP
  21. .B \-r \fIhostkey
  22. Use the contents of the file
  23. .I hostkey
  24. for the SSH hostkey.
  25. This file is generated with
  26. .BR dropbearkey (1)
  27. or automatically with the '-R' option. See "Host Key Files" below.
  28. .TP
  29. .B \-R
  30. Generate hostkeys automatically. See "Host Key Files" below.
  31. .TP
  32. .B \-F
  33. Don't fork into background.
  34. .TP
  35. .B \-E
  36. Log to standard error rather than syslog.
  37. .TP
  38. .B \-e
  39. Pass on the server environment to all child processes. This is required, for example,
  40. if Dropbear is launched on the fly from a SLURM workload manager. The environment is not
  41. passed by default. Note that this could expose secrets in environment variables from
  42. the calling process - use with caution.
  43. .TP
  44. .B \-m
  45. Don't display the message of the day on login.
  46. .TP
  47. .B \-w
  48. Disallow root logins.
  49. .TP
  50. .B \-s
  51. Disable password logins.
  52. .TP
  53. .B \-g
  54. Disable password logins for root.
  55. .TP
  56. .B \-j
  57. Disable local port forwarding.
  58. .TP
  59. .B \-k
  60. Disable remote port forwarding.
  61. .TP
  62. .B \-p\fR [\fIaddress\fR:]\fIport
  63. Listen on specified
  64. .I address
  65. and TCP
  66. .I port.
  67. If just a port is given listen
  68. on all addresses.
  69. Up to 10 can be specified (default 22 if none specified).
  70. .TP
  71. .B \-i
  72. Service program mode.
  73. Use this option to run
  74. .B dropbear
  75. under TCP/IP servers like inetd, tcpsvd, or tcpserver.
  76. In program mode the \-F option is implied, and \-p options are ignored.
  77. .TP
  78. .B \-P \fIpidfile
  79. Specify a pidfile to create when running as a daemon. If not specified, the
  80. default is /var/run/dropbear.pid
  81. .TP
  82. .B \-a
  83. Allow remote hosts to connect to forwarded ports.
  84. .TP
  85. .B \-W \fIwindowsize
  86. Specify the per-channel receive window buffer size. Increasing this
  87. may improve network performance at the expense of memory use. Use -h to see the
  88. default buffer size.
  89. .TP
  90. .B \-K \fItimeout_seconds
  91. Ensure that traffic is transmitted at a certain interval in seconds. This is
  92. useful for working around firewalls or routers that drop connections after
  93. a certain period of inactivity. The trade-off is that a session may be
  94. closed if there is a temporary lapse of network connectivity. A setting
  95. of 0 disables keepalives. If no response is received for 3 consecutive keepalives the connection will be closed.
  96. .TP
  97. .B \-I \fIidle_timeout
  98. Disconnect the session if no traffic is transmitted or received for \fIidle_timeout\fR seconds.
  99. .TP
  100. .B \-T \fImax_authentication_attempts
  101. Set the number of authentication attempts allowed per connection. If unspecified the default is 10 (MAX_AUTH_TRIES)
  102. .TP
  103. .B \-c \fIforced_command
  104. Disregard the command provided by the user and always run \fIforced_command\fR. This also
  105. overrides any authorized_keys command= option. The original command is saved in the
  106. SSH_ORIGINAL_COMMAND environment variable (see below).
  107. .TP
  108. .B \-V
  109. Print the version
  110. .SH FILES
  111. .TP
  112. Authorized Keys
  113. ~/.ssh/authorized_keys can be set up to allow remote login with a RSA,
  114. ECDSA, Ed25519 or DSS
  115. key. Each line is of the form
  116. .TP
  117. [restrictions] ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIgAsp... [comment]
  118. and can be extracted from a Dropbear private host key with "dropbearkey -y". This is the same format as used by OpenSSH, though the restrictions are a subset (keys with unknown restrictions are ignored).
  119. Restrictions are comma separated, with double quotes around spaces in arguments.
  120. Available restrictions are:
  121. .TP
  122. .B no-port-forwarding
  123. Don't allow port forwarding for this connection
  124. .TP
  125. .B no-agent-forwarding
  126. Don't allow agent forwarding for this connection
  127. .TP
  128. .B no-X11-forwarding
  129. Don't allow X11 forwarding for this connection
  130. .TP
  131. .B no-pty
  132. Disable PTY allocation. Note that a user can still obtain most of the
  133. same functionality with other means even if no-pty is set.
  134. .TP
  135. .B restrict
  136. Applies all the no- restrictions listed above.
  137. .TP
  138. .B command=\fR"\fIforced_command\fR"
  139. Disregard the command provided by the user and always run \fIforced_command\fR.
  140. The -c command line option overrides this.
  141. The authorized_keys file and its containing ~/.ssh directory must only be
  142. writable by the user, otherwise Dropbear will not allow a login using public
  143. key authentication.
  144. .TP
  145. Host Key Files
  146. Host key files are read at startup from a standard location, by default
  147. /etc/dropbear/dropbear_dss_host_key, /etc/dropbear/dropbear_rsa_host_key,
  148. /etc/dropbear/dropbear_ecdsa_host_key and /etc/dropbear/dropbear_ed25519_host_key
  149. If the -r command line option is specified the default files are not loaded.
  150. Host key files are of the form generated by dropbearkey.
  151. The -R option can be used to automatically generate keys
  152. in the default location - keys will be generated after startup when the first
  153. connection is established. This had the benefit that the system /dev/urandom
  154. random number source has a better chance of being securely seeded.
  155. .TP
  156. Message Of The Day
  157. By default the file /etc/motd will be printed for any login shell (unless
  158. disabled at compile-time). This can also be disabled per-user
  159. by creating a file ~/.hushlogin .
  160. .SH ENVIRONMENT VARIABLES
  161. Dropbear sets the standard variables USER, LOGNAME, HOME, SHELL, PATH, and TERM.
  162. The variables below are set for sessions as appropriate.
  163. .TP
  164. .B SSH_TTY
  165. This is set to the allocated TTY if a PTY was used.
  166. .TP
  167. .B SSH_CONNECTION
  168. Contains "<remote_ip> <remote_port> <local_ip> <local_port>".
  169. .TP
  170. .B DISPLAY
  171. Set X11 forwarding is used.
  172. .TP
  173. .B SSH_ORIGINAL_COMMAND
  174. If a 'command=' authorized_keys option was used, the original command is specified
  175. in this variable. If a shell was requested this is set to an empty value.
  176. .TP
  177. .B SSH_AUTH_SOCK
  178. Set to a forwarded ssh-agent connection.
  179. .SH NOTES
  180. Dropbear only supports SSH protocol version 2.
  181. .SH AUTHOR
  182. Matt Johnston (matt@ucc.asn.au).
  183. .br
  184. Gerrit Pape (pape@smarden.org) wrote this manual page.
  185. .SH SEE ALSO
  186. dropbearkey(1), dbclient(1), dropbearconvert(1)
  187. .P
  188. https://matt.ucc.asn.au/dropbear/dropbear.html