SSHD2(8) SSH2 SSHD2(8)
sshd2 - Secure Shell server daemon on z/OS
sshd2 [-d debug_level_spec] [-D debug_level_spec] [-f con-
fig_file] [-h host_key_file] [-o options] [-p port] [-F]
[-v] [-V] [-g login_grace_time] [-i] [-q]
Sshd2 (Secure Shell Daemon) is the server counterpart of
ssh2. Together, these two programs replace and extend the
services rlogin and rsh, and provide secure encrypted com-
munication channels between two hosts connected over an
unsecured network. They are intended to be as easy to
install and use as possible.
sshd2 can be started manually from USS or by using a
started task. It forks a new daemon for each incoming
connection. The forked daemons handle key exchange,
encryption, authentication, command execution, and data
sshd2 can be configured using command-line options or a
configuration file. Command-line options override values
specified in the configuration file. sshd2 reads configu-
ration data from /opt/tectia/etc/sshd2_config (or the file
specified with -f on the command line).
Subconfiguration files can also be specified in the main
configuration file. Note that if changes are made in the
main configuration file, sshd2 will have to be restarted,
for example with the restart command:
# /opt/tectia/etc/init.d/sshd2 restart
Runs the server in one-shot debug mode. The server
process accepts only one connection and exits after
the connection has disconnected. The server sends
verbose debug output to stderr. The debugging level
is either a number, or a comma-separated list of
assignments of the format ModulePat-
tern=debug_level, for example "*=10,sshd2=2". This
should be the first argument on the command line.
Runs the server in continuous debug mode. As -d,
but the server accepts several connections and
needs to be stopped manually when you want to fin-
ish the debugging.
Specifies the name of the configuration file. The
default is /opt/tectia/etc/sshd2_config. Note: If
this is specified, the default configuration file
is not read at all.
Specifies the file from which the host key is read
Can be used to give options in the format used in
the configuration files. This is useful for speci-
fying options for which there is no separate com-
mand-line flag. The option has the same format as
a line in the configuration file. Comment lines
are not accepted. Where applicable, the egrep
regex format is used.
Specifies the port to which the server listens for
connections. The default port is 22. Note that the
server will listen to all addresses when started
with -p. It will also cause sshd2 to ignore any
defined ListenAddress statements (this is to make
this switch useful for debugging purposes again).
If you want to use a different listen addresses,
use ListenAddress (complementing with Port, if nec-
essary) configuration options.
-F Disables daemon mode. The server does not spawn a
new process to the background.
-v Enables verbose mode. Displays verbose debugging
messages. Equivalent to -d 2. This option can
also be specified in the configuration file.
-V Displays version string.
-q Quiet mode. Nothing is sent to the system log.
Normally the beginning, authentication, and termi-
nation of each connection is logged. This option
can also be specified in the configuration file.
Gives the grace time for clients to authenticate
themselves (the default is 600 seconds). If the
client fails to authenticate the user within this
many seconds, the server disconnects and exits.
The value zero indicates no limit.
-i Specifies that sshd is invoked via inetd.
sshd2 reads configuration data from /opt/tec-
tia/etc/sshd2_config (or the file specified with -f on the
command line). The file contains keyword-value pairs, one
per line. Lines starting with '#' and empty lines are
interpreted as comments.
For the format of sshd2_config, see sshd2_config(5).
When a user logs in successfully, sshd2 does the follow-
1. Changes process to run with normal user privileges.
2. Sets up the basic environment.
3. Reads /etc/environment if it exists.
4. Changes to the user's home directory.
5. Runs the user's shell or command.
Contains configuration data for sshd2. This file
should be writable by root only, but it is recom-
mended (though not necessary) that it be world-
Contains the private part of the host key. This
file is normally created automatically by "make
install", but can also be created manually using
ssh-keygen-g3(1). This file contains vital crypto-
graphic information and may only be read or modi-
fied by root.
Contains the public part of the host key. This
file is normally created automatically by "make
install", but can also be created manually. This
file should be world-readable but must not be
writable by anyone but root. If it does not match
the private counterpart, clients probably get con-
fused about the server's identity.
This file contains a seed for the random number
generator. This file must not be accessible by
anyone but root.
Contains information on how the server will verify
the identity of an user. See SSH Tectia Server for
IBM z/OS Administrator Manual for more information.
If this file exists, sshd2 will not print informa-
tion during login. (This is normally the user's
last login time, message of the day and mail
If this file exists, sshd2 refuses to let anyone
except root log in. The contents of the file are
displayed to anyone trying to log in. The file
should be world-readable.
As above, but the file name is constructed from the
name of the host. Check output of hostname to see
which name you should use in the file name. This
functionality is supposed to be used by clustered
machines (which share /etc).
This file contains host-username pairs, separated
by a whitespace, one per line. The given user is
permitted to log in from the given host without a
password. The same file is used by rlogind and
rshd. sshd2 differs from rlogind and rshd in that
it requires public host-key authentication from the
ssh2 server running on this host in addition to
validating the host name retrieved from domain name
servers. The file must be writable only by the
user; it is recommended that it is not accessible
It is also possible to use netgroups in the file.
Either host or user name may be of the form
+@groupname to specify all hosts or all users in
For ssh2, this file is exactly the same as for
.rhosts. However, this file is not used by rlogin
and rshd, so using this permits access using ssh2
This file is used during .rhosts authentication.
In its simplest form, this file contains host
names, one per line. Users on those hosts are per-
mitted to log in without a password, provided they
have the same username on both machines. The host-
name may also be followed by a username; such users
are permitted to log in as any user on this machine
(except root). Additionally, the syntax +@group
can be used to specify netgroups. Negated entries
start with '-'.
If the client host/user is successfully matched in
this file, login is automatically permitted pro-
vided the client and server usernames are the same.
Additionally, successful host-based authentication
is normally required. This file must be writable
only by root; it is recommended that it be world-
Warning: It is almost never a good idea to use
usernames in hosts.equiv. Note that it really
means that the named user(s) can log in as anybody,
including bin, daemon, adm, and other accounts that
own critical binaries and directories. Using a
username practically grants the user root access.
The only valid use for usernames should be in nega-
tive entries. Note that this warning also applies
This is processed exactly as /etc/hosts.equiv.
However, this file is not used by rlogin and rshd,
so using this permits access using ssh2 only.
These are the public host keys of hosts that a user
wants to log in from using hostbased authentication
(equivalent to RhostsRSAAuthentication in ssh1).
Also, users have to set up their $HOME/.shosts
(only used by ssh) or $HOME/.rhosts files (inse-
cure, as it is used by the r* commands also). If
the username is the same on both hosts, it is ade-
quate to put the public host key to /opt/tec-
tia/etc/knownhosts and add the hostname to
/etc/shosts.equiv (or /etc/hosts.equiv).
xxxx denotes the host name (FQDN) and yyyy denotes
the public-key algorithm of the key.
For example, if zappa.foo.fi's host-key algorithm
is ssh-dss, the host key is contained in the file
zappa.foo.fi.ssh-dss.pub in the knownhosts direc-
Possible names for public-key algorithms are ssh-
dss and ssh-rsa.
As above, but system-wide. These settings can be
overridden by the user by putting a file with the
same name to the $HOME/.ssh2/knownhosts directory.
SSH Communications Security Corp.
For more information, see http://www.ssh.com.
sshd2_config(5), ssh-broker-g3(1), ssh-keygen-g3(1),
sshg3(1), scpg3(1), sftpg3(1), rlogin(1), rsh(1), tel-