summaryrefslogtreecommitdiff
path: root/ssh-keygen.1
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2010-04-16 10:04:09 +0100
committerColin Watson <cjwatson@debian.org>2010-04-16 10:04:09 +0100
commit78eedc2c60ff4718200f9271d8ee4f437da3a0c5 (patch)
tree13e783343edf688afffb4a8e02dc9685342b98a6 /ssh-keygen.1
parentd1a87e462e1db89f19cd960588d0c6b287cb5ccc (diff)
parentff0095389ba9a9e4599e6051c8d5bae6777c4d64 (diff)
merge 5.5p1
Diffstat (limited to 'ssh-keygen.1')
-rw-r--r--ssh-keygen.143
1 files changed, 21 insertions, 22 deletions
diff --git a/ssh-keygen.1 b/ssh-keygen.1
index 6557f9336..3e03a9bd0 100644
--- a/ssh-keygen.1
+++ b/ssh-keygen.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-keygen.1,v 1.88 2010/03/08 00:28:55 djm Exp $ 1.\" $OpenBSD: ssh-keygen.1,v 1.92 2010/03/13 23:38:13 jmc Exp $
2.\" 2.\"
3.\" -*- nroff -*- 3.\" -*- nroff -*-
4.\" 4.\"
@@ -37,7 +37,7 @@
37.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 37.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
38.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 38.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
39.\" 39.\"
40.Dd $Mdocdate: March 8 2010 $ 40.Dd $Mdocdate: March 13 2010 $
41.Dt SSH-KEYGEN 1 41.Dt SSH-KEYGEN 1
42.Os 42.Os
43.Sh NAME 43.Sh NAME
@@ -307,8 +307,15 @@ Please see the
307section for details. 307section for details.
308The constraints that are valid for user certificates are: 308The constraints that are valid for user certificates are:
309.Bl -tag -width Ds 309.Bl -tag -width Ds
310.It Ic no-x11-forwarding 310.It Ic clear
311Disable X11 forwarding (permitted by default). 311Clear all enabled permissions.
312This is useful for clearing the default set of permissions so permissions may
313be added individually.
314.It Ic force-command Ns = Ns Ar command
315Forces the execution of
316.Ar command
317instead of any shell or command specified by the user when
318the certificate is used for authentication.
312.It Ic no-agent-forwarding 319.It Ic no-agent-forwarding
313Disable 320Disable
314.Xr ssh-agent 1 321.Xr ssh-agent 1
@@ -323,12 +330,8 @@ Disable execution of
323by 330by
324.Xr sshd 8 331.Xr sshd 8
325(permitted by default). 332(permitted by default).
326.It Ic clear 333.It Ic no-x11-forwarding
327Clear all enabled permissions. 334Disable X11 forwarding (permitted by default).
328This is useful for clearing the default set of permissions so permissions may
329be added individually.
330.It Ic permit-x11-forwarding
331Allows X11 forwarding.
332.It Ic permit-agent-forwarding 335.It Ic permit-agent-forwarding
333Allows 336Allows
334.Xr ssh-agent 1 337.Xr ssh-agent 1
@@ -342,14 +345,10 @@ Allows execution of
342.Pa ~/.ssh/rc 345.Pa ~/.ssh/rc
343by 346by
344.Xr sshd 8 . 347.Xr sshd 8 .
345.It Ic force-command=command 348.It Ic permit-x11-forwarding
346Forces the execution of 349Allows X11 forwarding.
347.Ar command 350.It Ic source-address Ns = Ns Ar address_list
348instead of any shell or command specified by the user when 351Restrict the source addresses from which the certificate is considered valid.
349the certificate is used for authentication.
350.It Ic source-address=address_list
351Restrict the source addresses from which the certificate is considered valid
352from.
353The 352The
354.Ar address_list 353.Ar address_list
355is a comma-separated list of one or more address/netmask pairs in CIDR 354is a comma-separated list of one or more address/netmask pairs in CIDR
@@ -414,7 +413,7 @@ in YYYYMMDDHHMMSS format or a relative time (to the current time) consisting
414of a minus sign followed by a relative time in the format described in the 413of a minus sign followed by a relative time in the format described in the
415.Sx TIME FORMATS 414.Sx TIME FORMATS
416section of 415section of
417.Xr ssh_config 5 . 416.Xr sshd_config 5 .
418The end time may be specified as a YYYYMMDD date, a YYYYMMDDHHMMSS time or 417The end time may be specified as a YYYYMMDD date, a YYYYMMDDHHMMSS time or
419a relative time starting with a plus character. 418a relative time starting with a plus character.
420.Pp 419.Pp
@@ -519,7 +518,7 @@ To generate a user certificate:
519.Dl $ ssh-keygen -s /path/to/ca_key -I key_id /path/to/user_key.pub 518.Dl $ ssh-keygen -s /path/to/ca_key -I key_id /path/to/user_key.pub
520.Pp 519.Pp
521The resultant certificate will be placed in 520The resultant certificate will be placed in
522.Pa /path/to/user_key_cert.pub . 521.Pa /path/to/user_key-cert.pub .
523A host certificate requires the 522A host certificate requires the
524.Fl h 523.Fl h
525option: 524option:
@@ -527,7 +526,7 @@ option:
527.Dl $ ssh-keygen -s /path/to/ca_key -I key_id -h /path/to/host_key.pub 526.Dl $ ssh-keygen -s /path/to/ca_key -I key_id -h /path/to/host_key.pub
528.Pp 527.Pp
529The host certificate will be output to 528The host certificate will be output to
530.Pa /path/to/host_key_cert.pub . 529.Pa /path/to/host_key-cert.pub .
531In both cases, 530In both cases,
532.Ar key_id 531.Ar key_id
533is a "key identifier" that is logged by the server when the certificate 532is a "key identifier" that is logged by the server when the certificate
@@ -539,7 +538,7 @@ By default, generated certificates are valid for all users or hosts.
539To generate a certificate for a specified set of principals: 538To generate a certificate for a specified set of principals:
540.Pp 539.Pp
541.Dl $ ssh-keygen -s ca_key -I key_id -n user1,user2 user_key.pub 540.Dl $ ssh-keygen -s ca_key -I key_id -n user1,user2 user_key.pub
542.Dl $ ssh-keygen -s ca_key -I key_id -h -n host.domain user_key.pub 541.Dl "$ ssh-keygen -s ca_key -I key_id -h -n host.domain user_key.pub"
543.Pp 542.Pp
544Additional limitations on the validity and use of user certificates may 543Additional limitations on the validity and use of user certificates may
545be specified through certificate constraints. 544be specified through certificate constraints.