diff options
Diffstat (limited to 'ssh-keygen.0')
-rw-r--r-- | ssh-keygen.0 | 65 |
1 files changed, 26 insertions, 39 deletions
diff --git a/ssh-keygen.0 b/ssh-keygen.0 index fb7838724..e01ad16d9 100644 --- a/ssh-keygen.0 +++ b/ssh-keygen.0 | |||
@@ -28,18 +28,19 @@ SYNOPSIS | |||
28 | DESCRIPTION | 28 | DESCRIPTION |
29 | ssh-keygen generates, manages and converts authentication keys for | 29 | ssh-keygen generates, manages and converts authentication keys for |
30 | ssh(1). ssh-keygen can create RSA keys for use by SSH protocol version 1 | 30 | ssh(1). ssh-keygen can create RSA keys for use by SSH protocol version 1 |
31 | and RSA or DSA keys for use by SSH protocol version 2. The type of key | 31 | and DSA, ECDSA or RSA keys for use by SSH protocol version 2. The type |
32 | to be generated is specified with the -t option. If invoked without any | 32 | of key to be generated is specified with the -t option. If invoked |
33 | arguments, ssh-keygen will generate an RSA key for use in SSH protocol 2 | 33 | without any arguments, ssh-keygen will generate an RSA key for use in SSH |
34 | connections. | 34 | protocol 2 connections. |
35 | 35 | ||
36 | ssh-keygen is also used to generate groups for use in Diffie-Hellman | 36 | ssh-keygen is also used to generate groups for use in Diffie-Hellman |
37 | group exchange (DH-GEX). See the MODULI GENERATION section for details. | 37 | group exchange (DH-GEX). See the MODULI GENERATION section for details. |
38 | 38 | ||
39 | Normally each user wishing to use SSH with RSA or DSA authentication runs | 39 | Normally each user wishing to use SSH with public key authentication runs |
40 | this once to create the authentication key in ~/.ssh/identity, | 40 | this once to create the authentication key in ~/.ssh/identity, |
41 | ~/.ssh/id_dsa or ~/.ssh/id_rsa. Additionally, the system administrator | 41 | ~/.ssh/id_ecdsa, ~/.ssh/id_dsa or ~/.ssh/id_rsa. Additionally, the |
42 | may use this to generate host keys, as seen in /etc/rc. | 42 | system administrator may use this to generate host keys, as seen in |
43 | /etc/rc. | ||
43 | 44 | ||
44 | Normally this program generates the key and asks for a file in which to | 45 | Normally this program generates the key and asks for a file in which to |
45 | store the private key. The public key is stored in a file with the same | 46 | store the private key. The public key is stored in a file with the same |
@@ -255,8 +256,8 @@ DESCRIPTION | |||
255 | 256 | ||
256 | -t type | 257 | -t type |
257 | Specifies the type of key to create. The possible values are | 258 | Specifies the type of key to create. The possible values are |
258 | ``rsa1'' for protocol version 1 and ``rsa'' or ``dsa'' for | 259 | ``rsa1'' for protocol version 1 and ``dsa'', ``ecdsa'' or ``rsa'' |
259 | protocol version 2. | 260 | for protocol version 2. |
260 | 261 | ||
261 | -V validity_interval | 262 | -V validity_interval |
262 | Specify a validity interval when signing a certificate. A | 263 | Specify a validity interval when signing a certificate. A |
@@ -391,10 +392,9 @@ FILES | |||
391 | the user. This file should not be readable by anyone but the | 392 | the user. This file should not be readable by anyone but the |
392 | user. It is possible to specify a passphrase when generating the | 393 | user. It is possible to specify a passphrase when generating the |
393 | key; that passphrase will be used to encrypt the private part of | 394 | key; that passphrase will be used to encrypt the private part of |
394 | this file using 128-bit AES. This file is not automatically | 395 | this file using 3DES. This file is not automatically accessed by |
395 | accessed by ssh-keygen but it is offered as the default file for | 396 | ssh-keygen but it is offered as the default file for the private |
396 | the private key. ssh(1) will read this file when a login attempt | 397 | key. ssh(1) will read this file when a login attempt is made. |
397 | is made. | ||
398 | 398 | ||
399 | ~/.ssh/identity.pub | 399 | ~/.ssh/identity.pub |
400 | Contains the protocol version 1 RSA public key for | 400 | Contains the protocol version 1 RSA public key for |
@@ -404,34 +404,21 @@ FILES | |||
404 | contents of this file secret. | 404 | contents of this file secret. |
405 | 405 | ||
406 | ~/.ssh/id_dsa | 406 | ~/.ssh/id_dsa |
407 | Contains the protocol version 2 DSA authentication identity of | 407 | ~/.ssh/id_ecdsa |
408 | the user. This file should not be readable by anyone but the | ||
409 | user. It is possible to specify a passphrase when generating the | ||
410 | key; that passphrase will be used to encrypt the private part of | ||
411 | this file using 128-bit AES. This file is not automatically | ||
412 | accessed by ssh-keygen but it is offered as the default file for | ||
413 | the private key. ssh(1) will read this file when a login attempt | ||
414 | is made. | ||
415 | |||
416 | ~/.ssh/id_dsa.pub | ||
417 | Contains the protocol version 2 DSA public key for | ||
418 | authentication. The contents of this file should be added to | ||
419 | ~/.ssh/authorized_keys on all machines where the user wishes to | ||
420 | log in using public key authentication. There is no need to keep | ||
421 | the contents of this file secret. | ||
422 | |||
423 | ~/.ssh/id_rsa | 408 | ~/.ssh/id_rsa |
424 | Contains the protocol version 2 RSA authentication identity of | 409 | Contains the protocol version 2 DSA, ECDSA or RSA authentication |
425 | the user. This file should not be readable by anyone but the | 410 | identity of the user. This file should not be readable by anyone |
426 | user. It is possible to specify a passphrase when generating the | 411 | but the user. It is possible to specify a passphrase when |
427 | key; that passphrase will be used to encrypt the private part of | 412 | generating the key; that passphrase will be used to encrypt the |
428 | this file using 128-bit AES. This file is not automatically | 413 | private part of this file using 128-bit AES. This file is not |
429 | accessed by ssh-keygen but it is offered as the default file for | 414 | automatically accessed by ssh-keygen but it is offered as the |
430 | the private key. ssh(1) will read this file when a login attempt | 415 | default file for the private key. ssh(1) will read this file |
431 | is made. | 416 | when a login attempt is made. |
432 | 417 | ||
418 | ~/.ssh/id_dsa.pub | ||
419 | ~/.ssh/id_ecdsa.pub | ||
433 | ~/.ssh/id_rsa.pub | 420 | ~/.ssh/id_rsa.pub |
434 | Contains the protocol version 2 RSA public key for | 421 | Contains the protocol version 2 DSA, ECDSA or RSA public key for |
435 | authentication. The contents of this file should be added to | 422 | authentication. The contents of this file should be added to |
436 | ~/.ssh/authorized_keys on all machines where the user wishes to | 423 | ~/.ssh/authorized_keys on all machines where the user wishes to |
437 | log in using public key authentication. There is no need to keep | 424 | log in using public key authentication. There is no need to keep |
@@ -453,4 +440,4 @@ AUTHORS | |||
453 | created OpenSSH. Markus Friedl contributed the support for SSH protocol | 440 | created OpenSSH. Markus Friedl contributed the support for SSH protocol |
454 | versions 1.5 and 2.0. | 441 | versions 1.5 and 2.0. |
455 | 442 | ||
456 | OpenBSD 4.8 August 4, 2010 OpenBSD 4.8 | 443 | OpenBSD 4.8 October 28, 2010 OpenBSD 4.8 |