summaryrefslogtreecommitdiff
path: root/ssh-keyscan.1
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2003-06-11 22:04:39 +1000
committerDamien Miller <djm@mindrot.org>2003-06-11 22:04:39 +1000
commitf1ce505daf3ab14b42aa1eba41272fa103d3f4d0 (patch)
tree74487974ae0cdb719b6ef76302408119b4a705c7 /ssh-keyscan.1
parent78f2e5ca98e36fa9e87e967243aedacde8d64156 (diff)
- jmc@cvs.openbsd.org 2003/06/10 09:12:11
[scp.1 sftp-server.8 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5] [sshd.8 sshd_config.5 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8] - section reorder - COMPATIBILITY merge - macro cleanup - kill whitespace at EOL - new sentence, new line ssh pages ok markus@
Diffstat (limited to 'ssh-keyscan.1')
-rw-r--r--ssh-keyscan.151
1 files changed, 25 insertions, 26 deletions
diff --git a/ssh-keyscan.1 b/ssh-keyscan.1
index 6d27569eb..572751f66 100644
--- a/ssh-keyscan.1
+++ b/ssh-keyscan.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-keyscan.1,v 1.16 2003/05/12 18:35:18 markus Exp $ 1.\" $OpenBSD: ssh-keyscan.1,v 1.17 2003/06/10 09:12:11 jmc Exp $
2.\" 2.\"
3.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. 3.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>.
4.\" 4.\"
@@ -103,24 +103,6 @@ On the other hand, if the security model allows such a risk,
103.Nm 103.Nm
104can help in the detection of tampered keyfiles or man in the middle 104can help in the detection of tampered keyfiles or man in the middle
105attacks which have begun after the ssh_known_hosts file was created. 105attacks which have begun after the ssh_known_hosts file was created.
106.Sh EXAMPLES
107.Pp
108Print the
109.Pa rsa1
110host key for machine
111.Pa hostname :
112.Bd -literal
113$ ssh-keyscan hostname
114.Ed
115.Pp
116Find all hosts from the file
117.Pa ssh_hosts
118which have new or different keys from those in the sorted file
119.Pa ssh_known_hosts :
120.Bd -literal
121$ ssh-keyscan -t rsa,dsa -f ssh_hosts | \e\
122 sort -u - ssh_known_hosts | diff ssh_known_hosts -
123.Ed
124.Sh FILES 106.Sh FILES
125.Pa Input format: 107.Pa Input format:
126.Bd -literal 108.Bd -literal
@@ -145,16 +127,33 @@ or
145.Dq ssh-dss . 127.Dq ssh-dss .
146.Pp 128.Pp
147.Pa /etc/ssh/ssh_known_hosts 129.Pa /etc/ssh/ssh_known_hosts
148.Sh BUGS 130.Sh EXAMPLES
149It generates "Connection closed by remote host" messages on the consoles 131Print the
150of all the machines it scans if the server is older than version 2.9. 132.Pa rsa1
151This is because it opens a connection to the ssh port, reads the public 133host key for machine
152key, and drops the connection as soon as it gets the key. 134.Pa hostname :
135.Bd -literal
136$ ssh-keyscan hostname
137.Ed
138.Pp
139Find all hosts from the file
140.Pa ssh_hosts
141which have new or different keys from those in the sorted file
142.Pa ssh_known_hosts :
143.Bd -literal
144$ ssh-keyscan -t rsa,dsa -f ssh_hosts | \e
145 sort -u - ssh_known_hosts | diff ssh_known_hosts -
146.Ed
153.Sh SEE ALSO 147.Sh SEE ALSO
154.Xr ssh 1 , 148.Xr ssh 1 ,
155.Xr sshd 8 149.Xr sshd 8
156.Sh AUTHORS 150.Sh AUTHORS
157David Mazieres <dm@lcs.mit.edu> 151.An David Mazieres Aq dm@lcs.mit.edu
158wrote the initial version, and 152wrote the initial version, and
159Wayne Davison <wayned@users.sourceforge.net> 153.An Wayne Davison Aq wayned@users.sourceforge.net
160added support for protocol version 2. 154added support for protocol version 2.
155.Sh BUGS
156It generates "Connection closed by remote host" messages on the consoles
157of all the machines it scans if the server is older than version 2.9.
158This is because it opens a connection to the ssh port, reads the public
159key, and drops the connection as soon as it gets the key.