diff options
Diffstat (limited to 'contrib/ssh-copy-id.1')
-rw-r--r-- | contrib/ssh-copy-id.1 | 67 |
1 files changed, 67 insertions, 0 deletions
diff --git a/contrib/ssh-copy-id.1 b/contrib/ssh-copy-id.1 new file mode 100644 index 000000000..df4f88d9b --- /dev/null +++ b/contrib/ssh-copy-id.1 | |||
@@ -0,0 +1,67 @@ | |||
1 | .ig \" -*- nroff -*- | ||
2 | Copyright (c) 1999 Philip Hands Computing <http://www.hands.com/> | ||
3 | |||
4 | Permission is granted to make and distribute verbatim copies of | ||
5 | this manual provided the copyright notice and this permission notice | ||
6 | are preserved on all copies. | ||
7 | |||
8 | Permission is granted to copy and distribute modified versions of this | ||
9 | manual under the conditions for verbatim copying, provided that the | ||
10 | entire resulting derived work is distributed under the terms of a | ||
11 | permission notice identical to this one. | ||
12 | |||
13 | Permission is granted to copy and distribute translations of this | ||
14 | manual into another language, under the above conditions for modified | ||
15 | versions, except that this permission notice may be included in | ||
16 | translations approved by the Free Software Foundation instead of in | ||
17 | the original English. | ||
18 | .. | ||
19 | .TH SSH-COPY-ID 1 "14 November 1999" "OpenSSH" | ||
20 | .SH NAME | ||
21 | ssh-copy-id \- install your identity.pub in a remote machine's authorized_keys | ||
22 | .SH SYNOPSIS | ||
23 | .B ssh-copy-id [-i [identity_file]] | ||
24 | .I "[user@]machine" | ||
25 | .br | ||
26 | .SH DESCRIPTION | ||
27 | .BR ssh-copy-id | ||
28 | is a script that uses ssh to log into a remote machine (presumably | ||
29 | using a login password, so password authentication should be enabled, | ||
30 | unless you've done some clever use of multiple identities) | ||
31 | .PP | ||
32 | It also changes the permissions of the remote user's home, | ||
33 | .BR ~/.ssh , | ||
34 | and | ||
35 | .B ~/.ssh/authorized_keys | ||
36 | to remove group writability (which would otherwise prevent you from logging in, if the remote | ||
37 | .B sshd | ||
38 | has | ||
39 | .B StrictModes | ||
40 | set in its configuration). | ||
41 | .PP | ||
42 | If the | ||
43 | .B -i | ||
44 | option is given then the identity file (defaults to | ||
45 | .BR ~/.ssh/identity.pub ) | ||
46 | is used, regardless of whether there are any keys in your | ||
47 | .BR ssh-agent . | ||
48 | Otherwise, if this: | ||
49 | .PP | ||
50 | .B " ssh-add -L" | ||
51 | .PP | ||
52 | provides any output, it uses that in preference to the identity file. | ||
53 | .PP | ||
54 | If the | ||
55 | .B -i | ||
56 | option is used, or the | ||
57 | .B ssh-add | ||
58 | produced no output, then it uses the contents of the identity | ||
59 | file. Once it has one or more fingerprints (by whatever means) it | ||
60 | uses ssh to append them to | ||
61 | .B ~/.ssh/authorised_keys | ||
62 | on the remote machine (creating the file, and directory, if necessary) | ||
63 | |||
64 | .SH "SEE ALSO" | ||
65 | .BR ssh (1), | ||
66 | .BR ssh-agent (1), | ||
67 | .BR sshd (8) | ||