summaryrefslogtreecommitdiff
path: root/ssh-keygen.1
diff options
context:
space:
mode:
authorjmc@openbsd.org <jmc@openbsd.org>2017-05-02 07:13:31 +0000
committerDamien Miller <djm@mindrot.org>2017-05-08 09:18:04 +1000
commit6b84897f7fd39956b849eac7810319d8a9958568 (patch)
tree9d5dd486e60b6990f89f7135a97365f8d6d869a4 /ssh-keygen.1
parentd1c6b7fdbdfe4a7a37ecd48a97f0796b061c2868 (diff)
upstream commit
tidy up -O somewhat; ok djm Upstream-ID: 804405f716bf7ef15c1f36ab48581ca16aeb4d52
Diffstat (limited to 'ssh-keygen.1')
-rw-r--r--ssh-keygen.161
1 files changed, 34 insertions, 27 deletions
diff --git a/ssh-keygen.1 b/ssh-keygen.1
index be1a169f4..0202fe757 100644
--- a/ssh-keygen.1
+++ b/ssh-keygen.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-keygen.1,v 1.136 2017/04/30 23:18:44 djm Exp $ 1.\" $OpenBSD: ssh-keygen.1,v 1.137 2017/05/02 07:13:31 jmc Exp $
2.\" 2.\"
3.\" Author: Tatu Ylonen <ylo@cs.hut.fi> 3.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -35,7 +35,7 @@
35.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 35.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
36.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 36.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
37.\" 37.\"
38.Dd $Mdocdate: April 30 2017 $ 38.Dd $Mdocdate: May 2 2017 $
39.Dt SSH-KEYGEN 1 39.Dt SSH-KEYGEN 1
40.Os 40.Os
41.Sh NAME 41.Sh NAME
@@ -422,80 +422,87 @@ section for details.
422.It Fl O Ar option 422.It Fl O Ar option
423Specify a certificate option when signing a key. 423Specify a certificate option when signing a key.
424This option may be specified multiple times. 424This option may be specified multiple times.
425Please see the 425See also the
426.Sx CERTIFICATES 426.Sx CERTIFICATES
427section for details. 427section for further details.
428At present, no standard options are valid for host keys.
428The options that are valid for user certificates are: 429The options that are valid for user certificates are:
429.Bl -tag -width Ds 430.Pp
431.Bl -tag -width Ds -compact
430.It Ic clear 432.It Ic clear
431Clear all enabled permissions. 433Clear all enabled permissions.
432This is useful for clearing the default set of permissions so permissions may 434This is useful for clearing the default set of permissions so permissions may
433be added individually. 435be added individually.
436.Pp
437.It Ic critical : Ns Ar name Ns Op Ns = Ns Ar contents
438.It Ic extension : Ns Ar name Ns Op Ns = Ns Ar contents
439Includes an arbitrary certificate critical option or extension.
440The specified
441.Ar name
442should include a domain suffix, e.g.\&
443.Dq name@example.com .
444If
445.Ar contents
446is specified then it is included as the contents of the extension/option
447encoded as a string, otherwise the extension/option is created with no
448contents (usually indicating a flag).
449Extensions may be ignored by a client or server that does not recognise them,
450whereas unknown critical options will cause the certificate to be refused.
451.Pp
434.It Ic force-command Ns = Ns Ar command 452.It Ic force-command Ns = Ns Ar command
435Forces the execution of 453Forces the execution of
436.Ar command 454.Ar command
437instead of any shell or command specified by the user when 455instead of any shell or command specified by the user when
438the certificate is used for authentication. 456the certificate is used for authentication.
457.Pp
439.It Ic no-agent-forwarding 458.It Ic no-agent-forwarding
440Disable 459Disable
441.Xr ssh-agent 1 460.Xr ssh-agent 1
442forwarding (permitted by default). 461forwarding (permitted by default).
462.Pp
443.It Ic no-port-forwarding 463.It Ic no-port-forwarding
444Disable port forwarding (permitted by default). 464Disable port forwarding (permitted by default).
465.Pp
445.It Ic no-pty 466.It Ic no-pty
446Disable PTY allocation (permitted by default). 467Disable PTY allocation (permitted by default).
468.Pp
447.It Ic no-user-rc 469.It Ic no-user-rc
448Disable execution of 470Disable execution of
449.Pa ~/.ssh/rc 471.Pa ~/.ssh/rc
450by 472by
451.Xr sshd 8 473.Xr sshd 8
452(permitted by default). 474(permitted by default).
475.Pp
453.It Ic no-x11-forwarding 476.It Ic no-x11-forwarding
454Disable X11 forwarding (permitted by default). 477Disable X11 forwarding (permitted by default).
478.Pp
455.It Ic permit-agent-forwarding 479.It Ic permit-agent-forwarding
456Allows 480Allows
457.Xr ssh-agent 1 481.Xr ssh-agent 1
458forwarding. 482forwarding.
483.Pp
459.It Ic permit-port-forwarding 484.It Ic permit-port-forwarding
460Allows port forwarding. 485Allows port forwarding.
486.Pp
461.It Ic permit-pty 487.It Ic permit-pty
462Allows PTY allocation. 488Allows PTY allocation.
489.Pp
463.It Ic permit-user-rc 490.It Ic permit-user-rc
464Allows execution of 491Allows execution of
465.Pa ~/.ssh/rc 492.Pa ~/.ssh/rc
466by 493by
467.Xr sshd 8 . 494.Xr sshd 8 .
495.Pp
468.It Ic permit-x11-forwarding 496.It Ic permit-x11-forwarding
469Allows X11 forwarding. 497Allows X11 forwarding.
498.Pp
470.It Ic source-address Ns = Ns Ar address_list 499.It Ic source-address Ns = Ns Ar address_list
471Restrict the source addresses from which the certificate is considered valid. 500Restrict the source addresses from which the certificate is considered valid.
472The 501The
473.Ar address_list 502.Ar address_list
474is a comma-separated list of one or more address/netmask pairs in CIDR 503is a comma-separated list of one or more address/netmask pairs in CIDR
475format. 504format.
476.It Ic extension : Ns Ar name Ns Op Ns = Ns Ar contents
477Includes an arbitrary certificate extension.
478.It Ic critical : Ns Ar name Ns Op Ns = Ns Ar contents
479Includes an arbitrary certificate critical option.
480.El 505.El
481.Pp
482At present, no standard options are valid for host keys.
483.Pp
484For non-standard certificate extensions or options included using
485.Ic extension
486or
487.Ic option ,
488the specified
489.Ar name
490should include a domain suffix, e.g.\&
491.Dq name@example.com .
492If
493.Ar contents
494is specified then it is included as the contents of the extension/option
495encoded as a string, otherwise the extension/option is created with no
496contents (usually indicating a flag).
497Extensions may be ignored by a client or server that does not recognise them,
498whereas unknown critical options will cause the certificate to be refused.
499.It Fl o 506.It Fl o
500Causes 507Causes
501.Nm 508.Nm