diff options
author | Colin Watson <cjwatson@debian.org> | 2010-08-23 23:52:36 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2010-08-23 23:52:36 +0100 |
commit | 78799892cb1858927be02be9737c594052e3f910 (patch) | |
tree | ac3dc2e848ab9dc62fe4252e01e52c3d456f628f /contrib/ssh-copy-id.1 | |
parent | 3875951bb76a9ec62634ae4026c9cc885d933477 (diff) | |
parent | 31e30b835fd9695d3b6647cab4867001b092e28f (diff) |
* New upstream release (http://www.openssh.com/txt/release-5.6):
- Added a ControlPersist option to ssh_config(5) that automatically
starts a background ssh(1) multiplex master when connecting. This
connection can stay alive indefinitely, or can be set to automatically
close after a user-specified duration of inactivity (closes: #335697,
#350898, #454787, #500573, #550262).
- Support AuthorizedKeysFile, AuthorizedPrincipalsFile,
HostbasedUsesNameFromPacketOnly, and PermitTunnel in sshd_config(5)
Match blocks (closes: #549858).
- sftp(1): fix ls in working directories that contain globbing
characters in their pathnames (LP: #530714).
Diffstat (limited to 'contrib/ssh-copy-id.1')
-rw-r--r-- | contrib/ssh-copy-id.1 | 34 |
1 files changed, 21 insertions, 13 deletions
diff --git a/contrib/ssh-copy-id.1 b/contrib/ssh-copy-id.1 index f25ed01f2..cb15ab24d 100644 --- a/contrib/ssh-copy-id.1 +++ b/contrib/ssh-copy-id.1 | |||
@@ -25,19 +25,10 @@ ssh-copy-id \- install your public key in a remote machine's authorized_keys | |||
25 | .br | 25 | .br |
26 | .SH DESCRIPTION | 26 | .SH DESCRIPTION |
27 | .BR ssh-copy-id | 27 | .BR ssh-copy-id |
28 | is a script that uses ssh to log into a remote machine (presumably | 28 | is a script that uses ssh to log into a remote machine and |
29 | using a login password, so password authentication should be enabled, | 29 | append the indicated identity file to that machine's |
30 | unless you've done some clever use of multiple identities) | ||
31 | .PP | ||
32 | It also changes the permissions of the remote user's home, | ||
33 | .BR ~/.ssh , | ||
34 | and | ||
35 | .B ~/.ssh/authorized_keys | 30 | .B ~/.ssh/authorized_keys |
36 | to remove group writability (which would otherwise prevent you from logging in, if the remote | 31 | file. |
37 | .B sshd | ||
38 | has | ||
39 | .B StrictModes | ||
40 | set in its configuration). | ||
41 | .PP | 32 | .PP |
42 | If the | 33 | If the |
43 | .B -i | 34 | .B -i |
@@ -59,7 +50,24 @@ produced no output, then it uses the contents of the identity | |||
59 | file. Once it has one or more fingerprints (by whatever means) it | 50 | file. Once it has one or more fingerprints (by whatever means) it |
60 | uses ssh to append them to | 51 | uses ssh to append them to |
61 | .B ~/.ssh/authorized_keys | 52 | .B ~/.ssh/authorized_keys |
62 | on the remote machine (creating the file, and directory, if necessary) | 53 | on the remote machine (creating the file, and directory, if necessary.) |
54 | |||
55 | .SH NOTES | ||
56 | This program does not modify the permissions of any | ||
57 | pre-existing files or directories. Therefore, if the remote | ||
58 | .B sshd | ||
59 | has | ||
60 | .B StrictModes | ||
61 | set in its | ||
62 | configuration, then the user's home, | ||
63 | .B ~/.ssh | ||
64 | folder, and | ||
65 | .B ~/.ssh/authorized_keys | ||
66 | file may need to have group writability disabled manually, e.g. via | ||
67 | |||
68 | .B " chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys" | ||
69 | |||
70 | on the remote machine. | ||
63 | 71 | ||
64 | .SH "SEE ALSO" | 72 | .SH "SEE ALSO" |
65 | .BR ssh (1), | 73 | .BR ssh (1), |