summaryrefslogtreecommitdiff
path: root/ssh-keygen.1
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2010-04-16 15:56:21 +1000
committerDamien Miller <djm@mindrot.org>2010-04-16 15:56:21 +1000
commit4e270b05dd9d850fb9e2e0ac43f33cb4090d3ebc (patch)
tree4fc84942b5966e9f38f18a1257ac43ddbed336be /ssh-keygen.1
parent031c9100dfe3ee65a29084ebbd61965a76b3ad26 (diff)
- djm@cvs.openbsd.org 2010/04/16 01:47:26
[PROTOCOL.certkeys auth-options.c auth-options.h auth-rsa.c] [auth2-pubkey.c authfd.c key.c key.h myproposal.h ssh-add.c] [ssh-agent.c ssh-dss.c ssh-keygen.1 ssh-keygen.c ssh-rsa.c] [sshconnect.c sshconnect2.c sshd.c] revised certificate format ssh-{dss,rsa}-cert-v01@openssh.com with the following changes: move the nonce field to the beginning of the certificate where it can better protect against chosen-prefix attacks on the signature hash Rename "constraints" field to "critical options" Add a new non-critical "extensions" field Add a serial number The older format is still support for authentication and cert generation (use "ssh-keygen -t v00 -s ca_key ..." to generate a v00 certificate) ok markus@
Diffstat (limited to 'ssh-keygen.1')
-rw-r--r--ssh-keygen.127
1 files changed, 16 insertions, 11 deletions
diff --git a/ssh-keygen.1 b/ssh-keygen.1
index 3e03a9bd0..aacd4d3dc 100644
--- a/ssh-keygen.1
+++ b/ssh-keygen.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-keygen.1,v 1.92 2010/03/13 23:38:13 jmc Exp $ 1.\" $OpenBSD: ssh-keygen.1,v 1.93 2010/04/16 01:47:26 djm Exp $
2.\" 2.\"
3.\" -*- nroff -*- 3.\" -*- nroff -*-
4.\" 4.\"
@@ -37,7 +37,7 @@
37.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 37.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
38.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 38.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
39.\" 39.\"
40.Dd $Mdocdate: March 13 2010 $ 40.Dd $Mdocdate: April 16 2010 $
41.Dt SSH-KEYGEN 1 41.Dt SSH-KEYGEN 1
42.Os 42.Os
43.Sh NAME 43.Sh NAME
@@ -110,8 +110,9 @@
110.Fl I Ar certificate_identity 110.Fl I Ar certificate_identity
111.Op Fl h 111.Op Fl h
112.Op Fl n Ar principals 112.Op Fl n Ar principals
113.Op Fl O Ar constraint 113.Op Fl O Ar option
114.Op Fl V Ar validity_interval 114.Op Fl V Ar validity_interval
115.Op Fl z Ar serial_number
115.Ar 116.Ar
116.Nm ssh-keygen 117.Nm ssh-keygen
117.Fl L 118.Fl L
@@ -299,13 +300,13 @@ Multiple principals may be specified, separated by commas.
299Please see the 300Please see the
300.Sx CERTIFICATES 301.Sx CERTIFICATES
301section for details. 302section for details.
302.It Fl O Ar constraint 303.It Fl O Ar option
303Specify a certificate constraint when signing a key. 304Specify a certificate option when signing a key.
304This option may be specified multiple times. 305This option may be specified multiple times.
305Please see the 306Please see the
306.Sx CERTIFICATES 307.Sx CERTIFICATES
307section for details. 308section for details.
308The constraints that are valid for user certificates are: 309The options that are valid for user certificates are:
309.Bl -tag -width Ds 310.Bl -tag -width Ds
310.It Ic clear 311.It Ic clear
311Clear all enabled permissions. 312Clear all enabled permissions.
@@ -355,7 +356,7 @@ is a comma-separated list of one or more address/netmask pairs in CIDR
355format. 356format.
356.El 357.El
357.Pp 358.Pp
358At present, no constraints are valid for host keys. 359At present, no options are valid for host keys.
359.It Fl P Ar passphrase 360.It Fl P Ar passphrase
360Provides the (old) passphrase. 361Provides the (old) passphrase.
361.It Fl p 362.It Fl p
@@ -441,6 +442,10 @@ Specify desired generator when testing candidate moduli for DH-GEX.
441.It Fl y 442.It Fl y
442This option will read a private 443This option will read a private
443OpenSSH format file and print an OpenSSH public key to stdout. 444OpenSSH format file and print an OpenSSH public key to stdout.
445.It Fl z Ar serial_number
446Specifies a serial number to be embedded in the certificate to distinguish
447this certificate from others from the same CA.
448The default serial number is zero.
444.El 449.El
445.Sh MODULI GENERATION 450.Sh MODULI GENERATION
446.Nm 451.Nm
@@ -501,7 +506,7 @@ that both ends of a connection share common moduli.
501supports signing of keys to produce certificates that may be used for 506supports signing of keys to produce certificates that may be used for
502user or host authentication. 507user or host authentication.
503Certificates consist of a public key, some identity information, zero or 508Certificates consist of a public key, some identity information, zero or
504more principal (user or host) names and an optional set of constraints that 509more principal (user or host) names and an optional set of options that
505are signed by a Certification Authority (CA) key. 510are signed by a Certification Authority (CA) key.
506Clients or servers may then trust only the CA key and verify its signature 511Clients or servers may then trust only the CA key and verify its signature
507on a certificate rather than trusting many user/host keys. 512on a certificate rather than trusting many user/host keys.
@@ -541,11 +546,11 @@ To generate a certificate for a specified set of principals:
541.Dl "$ ssh-keygen -s ca_key -I key_id -h -n host.domain user_key.pub" 546.Dl "$ ssh-keygen -s ca_key -I key_id -h -n host.domain user_key.pub"
542.Pp 547.Pp
543Additional limitations on the validity and use of user certificates may 548Additional limitations on the validity and use of user certificates may
544be specified through certificate constraints. 549be specified through certificate options..
545A constrained certificate may disable features of the SSH session, may be 550A certificate option may disable features of the SSH session, may be
546valid only when presented from particular source addresses or may 551valid only when presented from particular source addresses or may
547force the use of a specific command. 552force the use of a specific command.
548For a list of valid certificate constraints, see the documentation for the 553For a list of valid certificate options, see the documentation for the
549.Fl O 554.Fl O
550option above. 555option above.
551.Pp 556.Pp