summaryrefslogtreecommitdiff
path: root/ssh-keygen.1
diff options
context:
space:
mode:
authordtucker@openbsd.org <dtucker@openbsd.org>2019-04-19 05:47:44 +0000
committerDamien Miller <djm@mindrot.org>2019-05-08 18:42:03 +1000
commitd7c6e38b87efab1f140745fd8b1106b82e6e4a68 (patch)
treefd0f20ba71e12b69da3d3a19cc91d57972510665 /ssh-keygen.1
parente826bbcafe26dac349a8593da5569e82faa45ab8 (diff)
upstream: Document new default RSA key size. From
sebastiaanlokhorst at gmail.com via bz#2997. OpenBSD-Commit-ID: bdd62ff5d4d649d2147904e91bf7cefa82fe11e1
Diffstat (limited to 'ssh-keygen.1')
-rw-r--r--ssh-keygen.18
1 files changed, 4 insertions, 4 deletions
diff --git a/ssh-keygen.1 b/ssh-keygen.1
index 124456577..f29774249 100644
--- a/ssh-keygen.1
+++ b/ssh-keygen.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-keygen.1,v 1.157 2019/03/05 16:17:12 naddy Exp $ 1.\" $OpenBSD: ssh-keygen.1,v 1.158 2019/04/19 05:47:44 dtucker Exp $
2.\" 2.\"
3.\" Author: Tatu Ylonen <ylo@cs.hut.fi> 3.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -35,7 +35,7 @@
35.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 35.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
36.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 36.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
37.\" 37.\"
38.Dd $Mdocdate: March 5 2019 $ 38.Dd $Mdocdate: April 19 2019 $
39.Dt SSH-KEYGEN 1 39.Dt SSH-KEYGEN 1
40.Os 40.Os
41.Sh NAME 41.Sh NAME
@@ -260,8 +260,8 @@ This option specifies the number of primality tests to perform.
260Show the bubblebabble digest of specified private or public key file. 260Show the bubblebabble digest of specified private or public key file.
261.It Fl b Ar bits 261.It Fl b Ar bits
262Specifies the number of bits in the key to create. 262Specifies the number of bits in the key to create.
263For RSA keys, the minimum size is 1024 bits and the default is 2048 bits. 263For RSA keys, the minimum size is 1024 bits and the default is 3072 bits.
264Generally, 2048 bits is considered sufficient. 264Generally, 3072 bits is considered sufficient.
265DSA keys must be exactly 1024 bits as specified by FIPS 186-2. 265DSA keys must be exactly 1024 bits as specified by FIPS 186-2.
266For ECDSA keys, the 266For ECDSA keys, the
267.Fl b 267.Fl b