SSH Tectia

ssh-broker-config

ssh-broker-config — SSH Connection Broker configuration file format

The Connection Broker configuration file ssh-broker-config.xml is a valid XML file.

The Connection Broker reads three configuration files (if all are available):

  1. The ssh-broker-config-default.xml file is read first. It holds the factory default settings. It is not recommended to edit the file, but you can use it to check the default settings.

    This file must be available and correctly formatted for the Connection Broker to start.

  2. Next, the Connection Broker reads the global configuration file. The settings in the global configuration file override the default settings.

    If the global configuration file is missing or malformed, the Connection Broker will start normally. A malformed global configuration file is ignored and no settings in it are used.

  3. Last, the Connection Broker reads the user-specific configuration file if it is available.

    If the global configuration file is valid, only the settings under the key-stores, profiles, and static-tunnels elements are used from the user-specific configuration. These are combined with the settings of the global configuration file. If a connection profile with the same name has been defined in both the global configuration file and user-specific configuration file, the latter is used.

    If the global configuration file is missing or malformed, all settings in the user-specific configuration file are used.

    If the user-specific configuration file is missing, the Connection Broker will start using the previously read configuration files. However, if the user-specific configuration is malformed, the Connection Broker will not start.

On Unix, the default configuration file locations are /etc/ssh2/ssh-tectia/auxdata/ssh-broker-ng/ssh-broker-config-default.xml for the default configuration, /etc/ssh2/ssh-broker-config.xml for the global configuration, and $HOME/.ssh2/ssh-broker-config.xml for the user-specific configuration. The XML DTD can be found in the /etc/ssh2/ssh-tectia/auxdata/ssh-broker-ng directory.

On Windows, the default configuration file locations are C:\Program Files\SSH Communications Security\SSH Tectia\SSH Tectia AUX\ssh-broker-ng\ssh-broker-config-default.xml for the default configuration, C:\Program Files\SSH Communications Security\SSH Tectia\SSH Tectia Broker\ssh-broker-config.xml for the global configuration, and %USERPROFILE%\Application Data\SSH\ssh-broker-config.xml for the user-specific configuration. The XML DTD can be found in the C:\Program Files\SSH Communications Security\SSH Tectia\SSH Tectia AUX\ssh-broker-ng directory.

This section describes the options available in the Connection Broker configuration file. See Appendix C for more information on the syntax of the configuration file.

Document Type Declaration and the Root Element

The broker configuration file is a valid XML file and starts with the Document Type Declaration.

The root element in the configuration file is secsh-broker. It can include general, default-settings, profiles, static-tunnels, gui, filter-engine, and logging elements.

An example of an empty configuration file is shown below:

<!DOCTYPE secsh-broker SYSTEM "ssh-broker-ng-config-1.dtd">
<secsh-broker version="1.0">

  <general />
  <default-settings />
  <profiles />
  <static-tunnels />
  <gui />
  <filter-engine /> 
  <logging />

</secsh-broker>

The gui and filter-engine elements are used with SSH Tectia Connector only.

The general Element

The general element contains settings such as the cryptographic library and the key stores to be used.

crypto-lib

This element selects the cryptographic library mode to be used. Either the standard version (standard) or the FIPS 140-2 certified version (fips) of the crypto library can be used. The library name is given as a value of the mode attribute. By default, standard crypto libraries are used.

FIPS mode will be used, if it is so specified either in global or in user configuration file (or both).

<crypto-lib mode="standard" />
cert-validation

This element defines public-key infrastructure (PKI) settings used for validating remote server authentication certificates. The element can have three attributes: end-point-identity-check, default-domain, http-proxy-url, and socks-server-url.

The end-point-identity-check attribute specifies whether the client will verify the server's hostname against the Subject Name or Subject Alternative Name (DNS Address) in the server's certificate. If set to no, the fields in the server host certificate are not verified and the certificate is accepted based on validity period and CRL check only. Note that this is a possible security risk, as anyone with a certificate issued by the same trusted CA that issues the server host certificates can perform a man-in-the-middle attack on the server if a client has the end-point identity check disabled. The default value is yes.

The default-domain attribute can be used when the end-point identity check is enabled. It specifies the default domain part of the remote system name and it is used if only the base part of the system name is available. The default-domain is appended to the system name if it does not contain a dot (.).

If the default domain is not specified, the end-point identity check fails, for example, when a user tries to connect to a host "tower" giving only the short hostname and the certificate contains the full DNS address "tower.fi.example.com".

The http-proxy-url attribute defines a HTTP proxy and the socks-server-url attribute defines a SOCKS proxy for making LDAP or OCSP queries for certificate validity.

The address of the proxy is given as the value of the attribute. The format of the address is socks://username@socks_server:port/network/netmask,network/netmask ... (with a SOCKS proxy) or http://username@proxy_server:port/network/netmask,network/netmask ... (with an HTTP proxy).

For example, by setting socks-server-url to "socks://mylogin@socks.ssh.com:1080/203.123.0.0/16,198.74.23.0/24", the host socks.ssh.com and port 1080 are used as your SOCKS server for connections outside of networks 203.123.0.0 (16-bit domain) and 198.74.23.0 (8-bit domain). Those networks are connected directly.

The cert-validation element can contain multiple ldap-server and ocsp-responder elements, a dod-pki element, and multiple ca-certificate elements.

ldap-server

This element specifies an LDAP server address and port used for fetching CRLs. Several LDAP servers can be specified by using several ldap-server elements.

CRLs are automatically retrieved from the CRL distribution point defined in the certificate to be checked if the point exists. Otherwise, the LDAP servers specified by these elements are used.

The default value for port is 389.

ocsp-responder

This element specifies an OCSP (Online Certificate Status Protocol) responder service address in URL format (url). Several OCSP responders can be specified by using several ocsp-responder elements.

If the certificate has a valid Authority Info Access extension with an OCSP Responder URL, it will be used instead of this setting. Note that for the OCSP validation to succeed, both the end-entity certificate and the OCSP Responder certificate must be issued by the same CA.

The validity-period (in seconds) can be optionally defined. During this time, new OCSP queries for the same certificate are not made but the old result is used. The default validity period is 0 (a new query is made every time).

dod-pki

This element defines whether the certificates are required to be compliant with the DoD PKI (US Department of Defense Public-Key Infrastructure). In practise, this means that the Digital Signature bit must be set in the Key Usage of the certificate. The enable attribute can have a value of yes or no. The default is no.

ca-certificate

This element defines a CA used in server authentication. It can have four attributes: name, file, disable-crls, and use-expired-crls.

The name attribute must contain the name of the CA.

The element must either contain the path to the X.509 CA certificate file as a value of the file attribute, or include the certificate as a base64-encoded ASCII block.

CRL checking can be disabled by setting the disable-crls attribute to yes. The default is no.

Expired CRLs can be used by setting a numeric value (in seconds) for the use-expired-crls attribute. The default is 0 (do not use expired CRLs).

An example of a certificate validation configuration is shown below:

<cert-validation end-point-identity-check="yes" 
                 default-domain="example.com"
                 http-proxy-url="http://proxy.example.com:800">
  <ldap-server address="ldap://ldap.example.com:389" />
  <ocsp-responder url="http://ocsp.example.com:8090" validity-period="0" /> 
  <dod-pki enable="no" />
  <ca-certificate name="ssh_ca1"
                  file="ssh_ca1.crt"
                  disable-crls="no"
                  use-expired-crls="100" />
</cert-validation>         
key-stores

There can be one <key-stores> instance under the <general> element. It can have any amount of <key-store> elements each of which configures one key store provider.

key-store

The key-store element has two attributes: type and init. The type attribute is the key store type. Currently supported types are "software", "mscapi", "entrust", and "pkcs11". The init attribute is the key-store-provider-specific initialization info.

An example key store configuration which enables the software provider with one key directory is shown below:

<key-stores>
  <key-store type="software" init="directory(C:\UserKeys)" />
</key-stores>
strict-host-key-checking

This element enables strict host key checking. If it is enabled, the Connection Broker never adds host keys to the user's .ssh2/hostkeys directory upon connection, and refuses to connect to hosts whose key has changed. This provides maximum protection against man-in-the-middle attacks. However, it can be somewhat annoying if you frequently connect to new hosts.

The word yes or no is given as the value of the enable attribute. The default is no (the user is asked whether to accept a new or changed host key).

Strict host key checking will be used, if it is so specified either in global or in user configuration file (or both).

<strict-host-key-checking enable="yes" />
host-key-always-ask

This element defines whether the Connection Broker should prompt the user to accept the proposed host key even if it is already known.

The word yes or no is given as the value of the enable attribute. The default is no (known host keys are accepted without prompting).

Host keys are always asked, if it is so specified either in global or in user configuration file (or both).

<host-key-always-ask enable="yes" />

The default-settings Element

The default-settings element defines the default connection-related settings. Profile-specific settings can override these settings.

ciphers

This element defines the ciphers that the client will propose to the server. The ciphers element can contain multiple cipher elements.

The ciphers are tried in the order they are specified.

cipher

This element selects a cipher name that the client requests for data encryption.

The supported ciphers are 3des-cbc, aes128-cbc, aes192-cbc, aes256-cbc, arcfour, blowfish-cbc, twofish-cbc, twofish128-cbc, twofish192-cbc, twofish256-cbc, crypticore128@ssh.com, seed-cbc@ssh.com, and none (no encryption).

In the FIPS mode, the supported ciphers are 3des-cbc, aes128-cbc, aes192-cbc, and aes256-cbc.

<ciphers>
  <cipher name="crypticore128@ssh.com" />
  <cipher name="aes128-cbc" />
</ciphers>
macs

This element defines the MACs that the client will propose to the server. The macs element can contain multiple mac elements.

mac

This element selects a MAC name that the client requests for data integrity verification.

The supported MAC algorithms are hmac-md5, hmac-md5-96, hmac-sha1, hmac-sha1-96, crypticore-mac@ssh.com, and none (no data integrity verification).

In the FIPS mode, only hmac-sha1 is supported.

<macs>
  <mac name="hmac-sha1" />
</macs>
transport-distribution

This setting defines the number of transport channels used by the Secure Shell connection. Using more than one transport may increase the throughput over low bandwidth connections.

The number of transports is given as value of the num-transports attribute. Currently, a value of 1 to 8 transports is supported. The default is 2.

<transport-distribution num-transports="2" />
rekey

This element specifies the number of transferred bytes after which the key exchange is done again. The value "0" turns rekey requests off. The default is 0 (no rekeys). This does not prevent the server from requesting rekeys, however.

<rekey bytes="10000000" />
authentication-methods

This element specifies the authentication methods that are requested by the client. The authentication-methods element can contain multiple authentication-method elements.

The authentication methods are tried in the order of the authentication-method elements. This means that the least interactive methods should be placed first.

authentication-method

This element specifies an authentication method name.

If you want to use non-interactive password authentication, you can also predefine a response (text string) or a response-file (path to a file containing the response).

[Note]Note

Use this option only with tunneling connections when the tunneled application takes care of authentication. In any case, specifying a password or other authentication secret in the configuration file will not provide full level of security. This option is not recommended for scripting.

The allowed authentication method names are: gssapi-with-mic, publickey, keyboard-interactive, password, and hostbased.

SSH Tectia Client supports host-based authentication only on Unix platforms.

<authentication-methods>
  <authentication-method name="hostbased" />
  <authentication-method name="gssapi-with-mic" />
  <authentication-method name="publickey" />
  <authentication-method name="keyboard-interactive" />
  <authentication-method name="password" />
</authentication-methods>
compression

This element specifies whether to use compression.

The name of the compression algorithm and the compression level can be given as attributes. Currently only zlib is supported as the algorithm. The level can be an integer from 0 to 9. By default, compression is not used.

<compression name="none" />
proxy

This element defines rules for HTTP or SOCKS proxy servers the client will use for connections. It has a single attribute: ruleset.

The format of the attribute value is a sequence of rules delimited by semicolons (;). Each rule has a format that resembles the URL format. In a rule, the connection type is given first. The type can be direct, socks, socks4, socks5, or http-connect (socks is a synonym for socks4). This is followed by the server address and port. If the port is not given, the default ports 1080 for SOCKS and 80 for HTTP are used.

After the address, zero or more conditions delimited by commas (,) are given.

direct:///[cond[,cond]...]
socks://server/[cond[,cond]...]
socks4://server/[cond[,cond]...]
socks5://server/[cond[,cond]...]
http-connect://server/[cond[,cond]...]

The IP address/port conditions have an address pattern and an optional port range:

ip_pattern[:port_range]

The ip_pattern may have one of the following forms:

  • IP: a single IP address

  • FROM-TO: an IP address range from FROM to TO

  • IP/MASK: a sub-network with a network mask with MASK significant bits.

DNS name conditions consist of a hostname which may be a regular expression containing the characters "*" and "?" and a port range:

name_pattern[:port_range]

An example proxy element is shown below. It causes the server to access the callback address and the ssh.com domain directly, access *.example with HTTP CONNECT, and all other destinations with SOCKS4.

<proxy ruleset="direct:///127.0.0.0/8,*.ssh.com;
                http-connect://http-proxy.ssh.com:8080/*.example;
                socks://fw.ssh.com:1080/" />
idle-timeout

This element specifies how long idle time (after all connection channels are closed) is allowed for a connection before automatically closing the connection. The time is given in seconds.

The default setting is 5 seconds. Setting a longer time allows the connection to the server to remain open even after a session (for example, sshg3) is closed. During this time, a new session to the server can be initiated without re-authentication.

<idle-timeout time="5" />
server-banners

This element defines whether the server banner message file (if it exists) is visible to the user before login. The word yes or no is given as the value of the visible attribute. The default is yes.

<server-banners visible="no" />
forwards

This element contains forward elements that define whether X11 or agent forwarding (tunneling) are allowed at the client side.

forward

This element defines X11 or agent forwarding settings.

The type attribute defines the forwarding type (either x11 or agent). The state attribute sets the forwarding on, off, or denied. If the forwarding is set as denied, the user cannot enable it on the command-line.

An example forward configuration, which allows X11 forwarding and denies agent forwarding globally, is shown below:

<forwards>
  <forward type="x11" state="on" />
  <forward type="agent" state="denied" />
</forwards>

For more information on using X11 and agent forwarding, see X11 Forwarding and Agent Forwarding (Unix).

The profiles Element

The profiles element defines the connection profiles for connecting to different servers. It can contain multiple profile elements. Each profile defines connection rules to one server.

profile

The profile element defines a connection profile. It has seven attributes: id, name, host, port, connect-on-startup, user, and gateway-profile.

The profile id must be a unique identifier that does not change during the lifetime of the profile. The id value must contain the letters id and a number. For example, id1 and id303 are valid identifiers.

An additional name can be given to the profile. This is a free-form text string.

The host address and port must also be given. The address can be either an IP address or a domain name. The default port is 22.

If you want to make the connection specified by the profile automatically at reboot, set the value of the connect-on-startup attribute to yes. In this case, give also the user attribute (the username the connection is made with). You also need to set up some form of non-interactive authentication for the connection.

In the user attribute, the value '%USERNAME%' can be used to set the username to the current user. In the host and user attributes, the value '*' can be used to prompt the user for the hostname or the username.

The gateway-profile attribute can be used to create nested tunnels. The profile name through which the connection is made is given as the value of the attribute. The first tunnel is created using the gateway host profile and from there the second tunnel is created to the host defined in this profile.

hostkey

This element gives the path to the remote server host public key file as a value of the file attribute.

Alternatively, the public key can be included as a base64-encoded ASCII block.

ciphers

This element defines the ciphers used with this profile. See the section called “The default-settings Element”.

macs

This element defines the MACs used with this profile. See the section called “The default-settings Element”.

transport-distribution

This element defines the transport distribution for this profile. See the section called “The default-settings Element”.

rekey

This element defines the rekeying settings used with this profile. See the section called “The default-settings Element”.

authentication-methods

This element defines the authentication methods used with this profile. See the section called “The default-settings Element”.

compression

This element defines the compression settings used with this profile. See the section called “The default-settings Element”.

proxy

This element defines the proxy settings used with this profile. See the section called “The default-settings Element”.

If a gateway profile (gateway-profile) has been defined for this profile, the proxy setting is ignored and the default proxy setting or the proxy setting of the gateway profile is used.

idle-timeout

This element defines the idle timeout settings used with this profile. See the section called “The default-settings Element”.

server-banners

This element defines the server banner setting used with this profile. See the section called “The default-settings Element”.

forwards

This element defines the forwards allowed with this profile. See the section called “The default-settings Element”.

tunnels

The tunnels element defines the tunnels that are opened when a connection with this profile is made. The element can contain multiple local-tunnel and remote-tunnel elements.

local-tunnel

This element defines a local tunnel (port forwarding). It has five attributes: type, listen-port, dst-host, dst-port, and allow-relay.

The type attribute defines the type of the tunnel. This can be currently tcp, ftp, or socks.

The listen-port attribute defines the local port to be listened. The dst-host and dst-port attributes define the destination host. The value of dst-host can be either an IP address or a domain name. The default is 127.0.0.1 (localhost).

The allow-relay attribute defines whether connections are allowed from outside the localhost. The default is no.

For more information on using tunneling, see Local Tunnels.

remote-tunnel

This element defines a remote tunnel (port forwarding). It has four attributes: type, listen-port, dst-host, dst-port, and allow-relay.

The type attribute defines the type of the tunnel. This can be either tcp or ftp.

The listen-port attribute defines the remote port to be listened. The dst-host and dst-port attributes define the destination host. The value of dst-host can be either an IP address or a domain name. The default is 127.0.0.1 (localhost).

The allow-relay attribute defines whether connections are allowed from outside the localhost. The default is no.

For more information on using tunneling, see Remote Tunnels.

An example connection profile is shown below:

<profile name="tower"
         id="id1"
         host="tower.example.com"
         port="22"
         connect-on-startup="no"
         user="doct">

  <hostkey file="key_22_tower.pub">
  </hostkey>

  <authentication-methods>
    <authentication-method name="publickey" />
    <authentication-method name="password" />
  </authentication-methods>

  <server-banners visible="yes" />

  <forwards>
    <forward type="agent" state="on" />
    <forward type="x11" state="on" />
  </forwards>

  <tunnels>
    <local-tunnel type="tcp"
                  listen-port="143"
                  dst-host="imap.example.com"
                  dst-port="143"
                  allow-relay="no" />
    <remote-tunnel type="tcp"
                   listen-port="11000"
                   dst-host="localhost"
                   dst-port="99" />
  </tunnels>

</profile>

The static-tunnels Element

With the static-tunnels setting, you can create listeners for local tunnels automatically when the Connection Broker starts up. The actual tunnel is formed the first time a connection is made to the listener port. If the connection to the server is not open at that time, it will be opened automatically as well.

The static-tunnels element can contain any number of tunnel elements.

tunnel

The tunnel element specifies a static tunnel. It has six attributes: type, listen-port, dst-host, dst-port, allow-relay, and profile.

The type attribute defines the type of the tunnel. This can be either tcp or ftp.

The listen-port attribute defines the local port to be listened. The dst-host and dst-port attributes define the destination host address and port. The value of dst-host can be either an IP address or a domain name.

The allow-relay attribute defines whether connections are allowed from outside the localhost. The default is no.

The profile attribute specifies the connection profile id that is used for the tunnel.

<static-tunnels>
  <tunnel type="tcp"
          listen-port="9874"
          dst-host="st.example.com"
          dst-port="9111"
          allow-relay="no"
          profile="id1" />
</static-tunnels>

The gui Element (SSH Tectia Connector)

The GUI element contains only one element (gui), which is used to adjust SSH Tectia Connector GUI settings. The gui element has four attributes, all of which must have yes or no as the value. These settings have no effect if SSH Tectia Connector has not been installed on the system.

The hide-tray-icon attribute controls whether the SSH Tectia tray icon is displayed in the system tray. The default is no (the tray icon is displayed).

The show-exit-button attribute controls whether the Exit button is displayed in the SSH Tectia Connector shortcut menu. The default is yes.

The show-admin attribute defines whether the SSH Tectia Connector Administration GUI is accessible to the users. The default is yes.

The enable-connector attribute defines whether SSH Tectia Connector is active and capturing connections. The default is yes.

The show-security-notification attribute defines whether the SSH Tectia Connector security notification is shown upon establishing a secure application tunnel. The default is yes.

<gui hide-tray-icon="no"
     show-exit-button="yes"
     show-admin="yes"
     enable-connector="yes"
     show-security-notification="yes" />

The filter-engine Element (SSH Tectia Connector)

The Filter Engine element defines the SSH Tectia Connector filter rules. These settings have no effect if SSH Tectia Connector has not been installed on the system.

The top level element is filter-engine. It has one attribute: ip-generate-start. This attribute defines the start address of the pseudo IP address space. Pseudo IPs are generated by the Connection Broker when applications do the DNS query through the SSH Capture DLL.

Under the filter-engine element there can be any amount of elements of the type network, dns, or filter. The order of the elements is important, because the filter engine uses the elements in the order they were specified in the configuration file.

network

The network element specifies a "location" where SSH Tectia Connector is running. Using the network elements you can implement location awareness for SSH Tectia Connector. It has four attributes: id, address, domain, and ip-generate-start.

The id attribute specifies a unique identifier for a network entry. It is used for referencing purposes explained later. address is the address of the network. The address attribute can be missing or empty, in which case it is not used. domain is the domain name of the computer. It can also be missing or empty, in which case it is not used. The ip-generate-start attribute defines the start address of the pseudo IP space. If it is defined here, it overrides the ip-generate-start attribute of the filter-engine element.

dns

The dns element creates a DNS rule for the filter engine. It has five attributes: id, network-id, application, host, ip-address, and pseudo-ip.

The id attribute specifies a unique identifier for a dns entry. The network-id attribute contains a reference to a network element. This can be left empty if the dns entry does not bind to a specific network. The application attribute specifies the application for which this DNS entry is used. This can be a regular expression.

The host attribute specifies a target host name. It can also be a regular expression. The ip-address attribute specifies the target host IP address. It can be a regular expression. When both the hostname and the IP address are defined, they both have to match for the rule to take effect. When the ip-address is left empty one of the following things happen:

  • When the pseudo-ip attribute is set to yes, a pseudo IP address is assigned for the host.

  • When the pseudo-ip attribute is set to to no, a normal DNS query is made for the host name.

filter

The filter element specifies an action for a connection. It has three attributes: dns-id, ports, action, and fallback-to-plain.

dns-id is a reference to a dns entry, ports define the port range, and action specifies the action to be done when a filter is used. The ports attribute can be a single port or a range. A range is specified with a dash between two integers (like "21-25"). The action can be DIRECT, BLOCK, or a reference to a Broker profile ID in the configuration file. If the action is a reference to profile ID, then a connection is tunneled through a Secure Shell server specified in the profile.

When applying the filter rule, if creating the tunnel fails (or the connection to the Secure Shell server fails) the Connection Broker will normally return a "host not reachable" error. However, if the fallback-to-plain attribute is set to yes, a direct (unsecured) connection is used instead.

An example filter engine configuration is shown below.

<filter-engine ip-generate-start="188.1.1.1">
               
  <network id="office"
           address="10.1.48.0"
           domain=".*ssh\.com"
           ip-generate-start="" />
           
   <dns id="telnet-app-dns"
       network-id="office"
       application=".*telnet.exe"
       host=".*"
       ip-address="" 
       pseudo-ip="yes" />
       
   <dns id="all-dns"
       network-id="office"
       application=""
       host=".*"
       ip-address="" 
       pseudo-ip="yes" />
       
   <dns id="www-proxy-dns"
       network-id="office"
       application=""
       host="www-cache.*"
       ip-address="10.1.0.11" 
       pseudo-ip="no" />
       
   <filter id="telnet-filter"
          dns-id="telnet-app-dns"
          ports="23"
          action="tower" 
          fallback-to-plain="no" />

   <filter id="block-ftp-filter"
          dns-id="all-dns"
          ports="21"
          action="BLOCK" 
          fallback-to-plain="no" />

   <filter id="www-proxy-filter"
          dns-id="www-proxy-dns"
          ports="8080"
          action="DIRECT" 
          fallback-to-plain="no" />

   <filter id="all-other-filter"
          dns-id="all-dns"
          ports="1-65535"
          action="firewall" 
          fallback-to-plain="no" />
          
</filter-engine>

This configuration specifies the following:

  • All connections from a telnet application are tunneled through a profile named tower.

  • All connections to a FTP port are blocked.

  • Connections to a WWW proxy host are passed through directly.

  • All other connections are tunneled through a profile named firewall.

All of the rules are only used in the "office" network which is specified by network address 10.1.48.0. Pseudo IPs are generated starting from 188.1.1.1.

The logging Element

The logging element changes the logging settings that define the log event severities and logging facilities. The element contains one or more log-events elements.

log-events

This element sets the severity and facility of different logging events. The events have reasonable default values, which are used if no explicit logging settings are made. This setting allows customizing the default values.

For the events, facility and severity can be set as attributes. The events itself should be listed inside the log-events element.

The facility can be normal, daemon, user, auth, local0, local1, local2, local3, local4, local5, local6, local7, or discard. Setting the facility to discard causes the server to ignore the specifed log events.

On Windows, only the normal and discard facilities are used.

The severity can be informational, notice, warning, error, critical, security-success, or security-failure.

Any events that are not specifically defined in the configuration file will use the default values. The defaults can be overridden for all remaining events by giving an empty log-events element after all other definitions and setting a severity value for it.

For a complete list of log events, see Appendix E.

Authors

SSH Communications Security Corp.

For more information, see http://www.ssh.com.

See Also

ssh-broker-g3(1), sshg3(1), scpg3(1), sftpg3(1), ssh-server-config(5)