#
# This file is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
#
# This file is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# sockets are stored in ~/.ssh (by default ControlPath is not set). Using %r
# (remote user name) might leak information to other users on the current
# system (e.g. via netstat or lsof).
# sockets are stored in ~/.ssh (by default ControlPath is not set). Using %r
# (remote user name) might leak information to other users on the current
# system (e.g. via netstat or lsof).
# Automatically create a new master session if there's none yet or use an
# existing one. This way the user doesn't have to use -M to enable a master
# manually. Don't set this option to "yes" or all SSH commands try to become
# Automatically create a new master session if there's none yet or use an
# existing one. This way the user doesn't have to use -M to enable a master
# manually. Don't set this option to "yes" or all SSH commands try to become
# Check host IP in known_hosts when connecting to detect DNS spoofing
# (default).
CheckHostIP yes
# Ask before adding any host keys to ~/.ssh/known_hosts (default).
StrictHostKeyChecking ask
# Check host IP in known_hosts when connecting to detect DNS spoofing
# (default).
CheckHostIP yes
# Ask before adding any host keys to ~/.ssh/known_hosts (default).
StrictHostKeyChecking ask