summaryrefslogtreecommitdiff
path: root/ssh-keygen.1
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2013-12-18 17:45:35 +1100
committerDamien Miller <djm@mindrot.org>2013-12-18 17:45:35 +1100
commit4f752cf71cf44bf4bc777541156c2bf56daf9ce9 (patch)
tree7b0ec937b093595dc86991e9139439eb6791add9 /ssh-keygen.1
parent6d6fcd14e23a9053198342bb379815b15e504084 (diff)
- djm@cvs.openbsd.org 2013/12/07 08:08:26
[ssh-keygen.1] document -a and -o wrt new key format
Diffstat (limited to 'ssh-keygen.1')
-rw-r--r--ssh-keygen.131
1 files changed, 24 insertions, 7 deletions
diff --git a/ssh-keygen.1 b/ssh-keygen.1
index 0d55854e9..689db22ff 100644
--- a/ssh-keygen.1
+++ b/ssh-keygen.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-keygen.1,v 1.116 2013/06/27 14:05:37 jmc Exp $ 1.\" $OpenBSD: ssh-keygen.1,v 1.117 2013/12/07 08:08:26 djm Exp $
2.\" 2.\"
3.\" Author: Tatu Ylonen <ylo@cs.hut.fi> 3.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -35,7 +35,7 @@
35.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 35.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
36.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 36.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
37.\" 37.\"
38.Dd $Mdocdate: June 27 2013 $ 38.Dd $Mdocdate: December 7 2013 $
39.Dt SSH-KEYGEN 1 39.Dt SSH-KEYGEN 1
40.Os 40.Os
41.Sh NAME 41.Sh NAME
@@ -103,7 +103,7 @@
103.Fl T Ar output_file 103.Fl T Ar output_file
104.Fl f Ar input_file 104.Fl f Ar input_file
105.Op Fl v 105.Op Fl v
106.Op Fl a Ar num_trials 106.Op Fl a Ar rounds
107.Op Fl J Ar num_lines 107.Op Fl J Ar num_lines
108.Op Fl j Ar start_line 108.Op Fl j Ar start_line
109.Op Fl K Ar checkpt 109.Op Fl K Ar checkpt
@@ -222,11 +222,20 @@ an empty passphrase, default bits for the key type, and default comment.
222This is used by 222This is used by
223.Pa /etc/rc 223.Pa /etc/rc
224to generate new host keys. 224to generate new host keys.
225.It Fl a Ar trials 225.It Fl a Ar rounds
226Specifies the number of primality tests to perform when screening DH-GEX 226When saving a new-format private key (i.e. an ed25519 key or any SSH protocol
227candidates using the 2272 key when the
228.Fl o
229flag is set), this option specifies the number of KDF (key derivation function)
230rounds used.
231Higher numbers result in slower passphrase verification and increased
232resistance to brute-force password cracking (should the keys be stolen).
233.Pp
234When screening DH-GEX candidates (
235using the
228.Fl T 236.Fl T
229command. 237command).
238This option specifies the number of primality tests to perform.
230.It Fl B 239.It Fl B
231Show the bubblebabble digest of specified private or public key file. 240Show the bubblebabble digest of specified private or public key file.
232.It Fl b Ar bits 241.It Fl b Ar bits
@@ -447,6 +456,14 @@ format.
447.El 456.El
448.Pp 457.Pp
449At present, no options are valid for host keys. 458At present, no options are valid for host keys.
459.It Fl o
460Causes
461.Nm
462to save SSH protocol 2 private keys using the new OpenSSH format rather than
463the more compatible PEM format.
464The new format has increased resistance to brute-force password cracking
465but is not supported by versions of OpenSSH prior to 6.5.
466Ed25519 keys always use the new private key format.
450.It Fl P Ar passphrase 467.It Fl P Ar passphrase
451Provides the (old) passphrase. 468Provides the (old) passphrase.
452.It Fl p 469.It Fl p