diff options
Diffstat (limited to 'ssh-keygen.0')
-rw-r--r-- | ssh-keygen.0 | 254 |
1 files changed, 138 insertions, 116 deletions
diff --git a/ssh-keygen.0 b/ssh-keygen.0 index aed4a14ad..fb7838724 100644 --- a/ssh-keygen.0 +++ b/ssh-keygen.0 | |||
@@ -7,8 +7,8 @@ SYNOPSIS | |||
7 | ssh-keygen [-q] [-b bits] -t type [-N new_passphrase] [-C comment] | 7 | ssh-keygen [-q] [-b bits] -t type [-N new_passphrase] [-C comment] |
8 | [-f output_keyfile] | 8 | [-f output_keyfile] |
9 | ssh-keygen -p [-P old_passphrase] [-N new_passphrase] [-f keyfile] | 9 | ssh-keygen -p [-P old_passphrase] [-N new_passphrase] [-f keyfile] |
10 | ssh-keygen -i [-f input_keyfile] | 10 | ssh-keygen -i [-m key_format] [-f input_keyfile] |
11 | ssh-keygen -e [-f input_keyfile] | 11 | ssh-keygen -e [-m key_format] [-f input_keyfile] |
12 | ssh-keygen -y [-f input_keyfile] | 12 | ssh-keygen -y [-f input_keyfile] |
13 | ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile] | 13 | ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile] |
14 | ssh-keygen -l [-f input_keyfile] | 14 | ssh-keygen -l [-f input_keyfile] |
@@ -22,7 +22,7 @@ SYNOPSIS | |||
22 | ssh-keygen -T output_file -f input_file [-v] [-a num_trials] | 22 | ssh-keygen -T output_file -f input_file [-v] [-a num_trials] |
23 | [-W generator] | 23 | [-W generator] |
24 | ssh-keygen -s ca_key -I certificate_identity [-h] [-n principals] | 24 | ssh-keygen -s ca_key -I certificate_identity [-h] [-n principals] |
25 | [-O constraint] [-V validity_interval] file ... | 25 | [-O option] [-V validity_interval] [-z serial_number] file ... |
26 | ssh-keygen -L [-f input_keyfile] | 26 | ssh-keygen -L [-f input_keyfile] |
27 | 27 | ||
28 | DESCRIPTION | 28 | DESCRIPTION |
@@ -46,14 +46,14 @@ DESCRIPTION | |||
46 | name but ``.pub'' appended. The program also asks for a passphrase. The | 46 | name but ``.pub'' appended. The program also asks for a passphrase. The |
47 | passphrase may be empty to indicate no passphrase (host keys must have an | 47 | passphrase may be empty to indicate no passphrase (host keys must have an |
48 | empty passphrase), or it may be a string of arbitrary length. A | 48 | empty passphrase), or it may be a string of arbitrary length. A |
49 | passphrase is similar to a password, except it can be a phrase with a se- | 49 | passphrase is similar to a password, except it can be a phrase with a |
50 | ries of words, punctuation, numbers, whitespace, or any string of charac- | 50 | series of words, punctuation, numbers, whitespace, or any string of |
51 | ters you want. Good passphrases are 10-30 characters long, are not sim- | 51 | characters you want. Good passphrases are 10-30 characters long, are not |
52 | ple sentences or otherwise easily guessable (English prose has only 1-2 | 52 | simple sentences or otherwise easily guessable (English prose has only 1- |
53 | bits of entropy per character, and provides very bad passphrases), and | 53 | 2 bits of entropy per character, and provides very bad passphrases), and |
54 | contain a mix of upper and lowercase letters, numbers, and non-alphanu- | 54 | contain a mix of upper and lowercase letters, numbers, and non- |
55 | meric characters. The passphrase can be changed later by using the -p | 55 | alphanumeric characters. The passphrase can be changed later by using |
56 | option. | 56 | the -p option. |
57 | 57 | ||
58 | There is no way to recover a lost passphrase. If the passphrase is lost | 58 | There is no way to recover a lost passphrase. If the passphrase is lost |
59 | or forgotten, a new key must be generated and copied to the corresponding | 59 | or forgotten, a new key must be generated and copied to the corresponding |
@@ -61,9 +61,9 @@ DESCRIPTION | |||
61 | 61 | ||
62 | For RSA1 keys, there is also a comment field in the key file that is only | 62 | For RSA1 keys, there is also a comment field in the key file that is only |
63 | for convenience to the user to help identify the key. The comment can | 63 | for convenience to the user to help identify the key. The comment can |
64 | tell what the key is for, or whatever is useful. The comment is initial- | 64 | tell what the key is for, or whatever is useful. The comment is |
65 | ized to ``user@host'' when the key is created, but can be changed using | 65 | initialized to ``user@host'' when the key is created, but can be changed |
66 | the -c option. | 66 | using the -c option. |
67 | 67 | ||
68 | After a key is generated, instructions below detail where the keys should | 68 | After a key is generated, instructions below detail where the keys should |
69 | be placed to be activated. | 69 | be placed to be activated. |
@@ -79,26 +79,29 @@ DESCRIPTION | |||
79 | 79 | ||
80 | -b bits | 80 | -b bits |
81 | Specifies the number of bits in the key to create. For RSA keys, | 81 | Specifies the number of bits in the key to create. For RSA keys, |
82 | the minimum size is 768 bits and the default is 2048 bits. Gen- | 82 | the minimum size is 768 bits and the default is 2048 bits. |
83 | erally, 2048 bits is considered sufficient. DSA keys must be ex- | 83 | Generally, 2048 bits is considered sufficient. DSA keys must be |
84 | actly 1024 bits as specified by FIPS 186-2. | 84 | exactly 1024 bits as specified by FIPS 186-2. |
85 | 85 | ||
86 | -C comment | 86 | -C comment |
87 | Provides a new comment. | 87 | Provides a new comment. |
88 | 88 | ||
89 | -c Requests changing the comment in the private and public key | 89 | -c Requests changing the comment in the private and public key |
90 | files. This operation is only supported for RSA1 keys. The pro- | 90 | files. This operation is only supported for RSA1 keys. The |
91 | gram will prompt for the file containing the private keys, for | 91 | program will prompt for the file containing the private keys, for |
92 | the passphrase if the key has one, and for the new comment. | 92 | the passphrase if the key has one, and for the new comment. |
93 | 93 | ||
94 | -D pkcs11 | 94 | -D pkcs11 |
95 | Download the RSA public keys provided by the PKCS#11 shared li- | 95 | Download the RSA public keys provided by the PKCS#11 shared |
96 | brary pkcs11. | 96 | library pkcs11. When used in combination with -s, this option |
97 | indicates that a CA key resides in a PKCS#11 token (see the | ||
98 | CERTIFICATES section for details). | ||
97 | 99 | ||
98 | -e This option will read a private or public OpenSSH key file and | 100 | -e This option will read a private or public OpenSSH key file and |
99 | print the key in RFC 4716 SSH Public Key File Format to stdout. | 101 | print to stdout the key in one of the formats specified by the -m |
100 | This option allows exporting keys for use by several commercial | 102 | option. The default export format is ``RFC4716''. This option |
101 | SSH implementations. | 103 | allows exporting OpenSSH keys for use by other programs, |
104 | including several commercial SSH implementations. | ||
102 | 105 | ||
103 | -F hostname | 106 | -F hostname |
104 | Search for the specified hostname in a known_hosts file, listing | 107 | Search for the specified hostname in a known_hosts file, listing |
@@ -116,8 +119,8 @@ DESCRIPTION | |||
116 | -g Use generic DNS format when printing fingerprint resource records | 119 | -g Use generic DNS format when printing fingerprint resource records |
117 | using the -r command. | 120 | using the -r command. |
118 | 121 | ||
119 | -H Hash a known_hosts file. This replaces all hostnames and ad- | 122 | -H Hash a known_hosts file. This replaces all hostnames and |
120 | dresses with hashed representations within the specified file; | 123 | addresses with hashed representations within the specified file; |
121 | the original content is moved to a file with a .old suffix. | 124 | the original content is moved to a file with a .old suffix. |
122 | These hashes may be used normally by ssh and sshd, but they do | 125 | These hashes may be used normally by ssh and sshd, but they do |
123 | not reveal identifying information should the file's contents be | 126 | not reveal identifying information should the file's contents be |
@@ -133,41 +136,48 @@ DESCRIPTION | |||
133 | the CERTIFICATES section for details. | 136 | the CERTIFICATES section for details. |
134 | 137 | ||
135 | -i This option will read an unencrypted private (or public) key file | 138 | -i This option will read an unencrypted private (or public) key file |
136 | in SSH2-compatible format and print an OpenSSH compatible private | 139 | in the format specified by the -m option and print an OpenSSH |
137 | (or public) key to stdout. ssh-keygen also reads the RFC 4716 | 140 | compatible private (or public) key to stdout. This option allows |
138 | SSH Public Key File Format. This option allows importing keys | 141 | importing keys from other software, including several commercial |
139 | from several commercial SSH implementations. | 142 | SSH implementations. The default import format is ``RFC4716''. |
140 | 143 | ||
141 | -L Prints the contents of a certificate. | 144 | -L Prints the contents of a certificate. |
142 | 145 | ||
143 | -l Show fingerprint of specified public key file. Private RSA1 keys | 146 | -l Show fingerprint of specified public key file. Private RSA1 keys |
144 | are also supported. For RSA and DSA keys ssh-keygen tries to | 147 | are also supported. For RSA and DSA keys ssh-keygen tries to |
145 | find the matching public key file and prints its fingerprint. If | 148 | find the matching public key file and prints its fingerprint. If |
146 | combined with -v, an ASCII art representation of the key is sup- | 149 | combined with -v, an ASCII art representation of the key is |
147 | plied with the fingerprint. | 150 | supplied with the fingerprint. |
148 | 151 | ||
149 | -M memory | 152 | -M memory |
150 | Specify the amount of memory to use (in megabytes) when generat- | 153 | Specify the amount of memory to use (in megabytes) when |
151 | ing candidate moduli for DH-GEX. | 154 | generating candidate moduli for DH-GEX. |
155 | |||
156 | -m key_format | ||
157 | Specify a key format for the -i (import) or -e (export) | ||
158 | conversion options. The supported key formats are: ``RFC4716'' | ||
159 | (RFC 4716/SSH2 public or private key), ``PKCS8'' (PEM PKCS8 | ||
160 | public key) or ``PEM'' (PEM public key). The default conversion | ||
161 | format is ``RFC4716''. | ||
152 | 162 | ||
153 | -N new_passphrase | 163 | -N new_passphrase |
154 | Provides the new passphrase. | 164 | Provides the new passphrase. |
155 | 165 | ||
156 | -n principals | 166 | -n principals |
157 | Specify one or more principals (user or host names) to be includ- | 167 | Specify one or more principals (user or host names) to be |
158 | ed in a certificate when signing a key. Multiple principals may | 168 | included in a certificate when signing a key. Multiple |
159 | be specified, separated by commas. Please see the CERTIFICATES | 169 | principals may be specified, separated by commas. Please see the |
160 | section for details. | 170 | CERTIFICATES section for details. |
161 | 171 | ||
162 | -O constraint | 172 | -O option |
163 | Specify a certificate constraint when signing a key. This option | 173 | Specify a certificate option when signing a key. This option may |
164 | may be specified multiple times. Please see the CERTIFICATES | 174 | be specified multiple times. Please see the CERTIFICATES section |
165 | section for details. The constraints that are valid for user | 175 | for details. The options that are valid for user certificates |
166 | certificates are: | 176 | are: |
167 | 177 | ||
168 | clear Clear all enabled permissions. This is useful for clear- | 178 | clear Clear all enabled permissions. This is useful for |
169 | ing the default set of permissions so permissions may be | 179 | clearing the default set of permissions so permissions |
170 | added individually. | 180 | may be added individually. |
171 | 181 | ||
172 | force-command=command | 182 | force-command=command |
173 | Forces the execution of command instead of any shell or | 183 | Forces the execution of command instead of any shell or |
@@ -206,11 +216,11 @@ DESCRIPTION | |||
206 | 216 | ||
207 | source-address=address_list | 217 | source-address=address_list |
208 | Restrict the source addresses from which the certificate | 218 | Restrict the source addresses from which the certificate |
209 | is considered valid. The address_list is a comma-sepa- | 219 | is considered valid. The address_list is a comma- |
210 | rated list of one or more address/netmask pairs in CIDR | 220 | separated list of one or more address/netmask pairs in |
211 | format. | 221 | CIDR format. |
212 | 222 | ||
213 | At present, no constraints are valid for host keys. | 223 | At present, no options are valid for host keys. |
214 | 224 | ||
215 | -P passphrase | 225 | -P passphrase |
216 | Provides the (old) passphrase. | 226 | Provides the (old) passphrase. |
@@ -245,21 +255,21 @@ DESCRIPTION | |||
245 | 255 | ||
246 | -t type | 256 | -t type |
247 | Specifies the type of key to create. The possible values are | 257 | Specifies the type of key to create. The possible values are |
248 | ``rsa1'' for protocol version 1 and ``rsa'' or ``dsa'' for proto- | 258 | ``rsa1'' for protocol version 1 and ``rsa'' or ``dsa'' for |
249 | col version 2. | 259 | protocol version 2. |
250 | 260 | ||
251 | -V validity_interval | 261 | -V validity_interval |
252 | Specify a validity interval when signing a certificate. A valid- | 262 | Specify a validity interval when signing a certificate. A |
253 | ity interval may consist of a single time, indicating that the | 263 | validity interval may consist of a single time, indicating that |
254 | certificate is valid beginning now and expiring at that time, or | 264 | the certificate is valid beginning now and expiring at that time, |
255 | may consist of two times separated by a colon to indicate an ex- | 265 | or may consist of two times separated by a colon to indicate an |
256 | plicit time interval. The start time may be specified as a date | 266 | explicit time interval. The start time may be specified as a |
257 | in YYYYMMDD format, a time in YYYYMMDDHHMMSS format or a relative | 267 | date in YYYYMMDD format, a time in YYYYMMDDHHMMSS format or a |
258 | time (to the current time) consisting of a minus sign followed by | 268 | relative time (to the current time) consisting of a minus sign |
259 | a relative time in the format described in the TIME FORMATS sec- | 269 | followed by a relative time in the format described in the TIME |
260 | tion of sshd_config(5). The end time may be specified as a | 270 | FORMATS section of sshd_config(5). The end time may be specified |
261 | YYYYMMDD date, a YYYYMMDDHHMMSS time or a relative time starting | 271 | as a YYYYMMDD date, a YYYYMMDDHHMMSS time or a relative time |
262 | with a plus character. | 272 | starting with a plus character. |
263 | 273 | ||
264 | For example: ``+52w1d'' (valid from now to 52 weeks and one day | 274 | For example: ``+52w1d'' (valid from now to 52 weeks and one day |
265 | from now), ``-4w:+4w'' (valid from four weeks ago to four weeks | 275 | from now), ``-4w:+4w'' (valid from four weeks ago to four weeks |
@@ -269,9 +279,9 @@ DESCRIPTION | |||
269 | 2011). | 279 | 2011). |
270 | 280 | ||
271 | -v Verbose mode. Causes ssh-keygen to print debugging messages | 281 | -v Verbose mode. Causes ssh-keygen to print debugging messages |
272 | about its progress. This is helpful for debugging moduli genera- | 282 | about its progress. This is helpful for debugging moduli |
273 | tion. Multiple -v options increase the verbosity. The maximum | 283 | generation. Multiple -v options increase the verbosity. The |
274 | is 3. | 284 | maximum is 3. |
275 | 285 | ||
276 | -W generator | 286 | -W generator |
277 | Specify desired generator when testing candidate moduli for DH- | 287 | Specify desired generator when testing candidate moduli for DH- |
@@ -280,12 +290,17 @@ DESCRIPTION | |||
280 | -y This option will read a private OpenSSH format file and print an | 290 | -y This option will read a private OpenSSH format file and print an |
281 | OpenSSH public key to stdout. | 291 | OpenSSH public key to stdout. |
282 | 292 | ||
293 | -z serial_number | ||
294 | Specifies a serial number to be embedded in the certificate to | ||
295 | distinguish this certificate from others from the same CA. The | ||
296 | default serial number is zero. | ||
297 | |||
283 | MODULI GENERATION | 298 | MODULI GENERATION |
284 | ssh-keygen may be used to generate groups for the Diffie-Hellman Group | 299 | ssh-keygen may be used to generate groups for the Diffie-Hellman Group |
285 | Exchange (DH-GEX) protocol. Generating these groups is a two-step pro- | 300 | Exchange (DH-GEX) protocol. Generating these groups is a two-step |
286 | cess: first, candidate primes are generated using a fast, but memory in- | 301 | process: first, candidate primes are generated using a fast, but memory |
287 | tensive process. These candidate primes are then tested for suitability | 302 | intensive process. These candidate primes are then tested for |
288 | (a CPU-intensive process). | 303 | suitability (a CPU-intensive process). |
289 | 304 | ||
290 | Generation of primes is performed using the -G option. The desired | 305 | Generation of primes is performed using the -G option. The desired |
291 | length of the primes may be specified by the -b option. For example: | 306 | length of the primes may be specified by the -b option. For example: |
@@ -293,8 +308,8 @@ MODULI GENERATION | |||
293 | # ssh-keygen -G moduli-2048.candidates -b 2048 | 308 | # ssh-keygen -G moduli-2048.candidates -b 2048 |
294 | 309 | ||
295 | By default, the search for primes begins at a random point in the desired | 310 | By default, the search for primes begins at a random point in the desired |
296 | length range. This may be overridden using the -S option, which speci- | 311 | length range. This may be overridden using the -S option, which |
297 | fies a different start point (in hex). | 312 | specifies a different start point (in hex). |
298 | 313 | ||
299 | Once a set of candidates have been generated, they must be tested for | 314 | Once a set of candidates have been generated, they must be tested for |
300 | suitability. This may be performed using the -T option. In this mode | 315 | suitability. This may be performed using the -T option. In this mode |
@@ -317,15 +332,15 @@ CERTIFICATES | |||
317 | ssh-keygen supports signing of keys to produce certificates that may be | 332 | ssh-keygen supports signing of keys to produce certificates that may be |
318 | used for user or host authentication. Certificates consist of a public | 333 | used for user or host authentication. Certificates consist of a public |
319 | key, some identity information, zero or more principal (user or host) | 334 | key, some identity information, zero or more principal (user or host) |
320 | names and an optional set of constraints that are signed by a Certifica- | 335 | names and a set of options that are signed by a Certification Authority |
321 | tion Authority (CA) key. Clients or servers may then trust only the CA | 336 | (CA) key. Clients or servers may then trust only the CA key and verify |
322 | key and verify its signature on a certificate rather than trusting many | 337 | its signature on a certificate rather than trusting many user/host keys. |
323 | user/host keys. Note that OpenSSH certificates are a different, and much | 338 | Note that OpenSSH certificates are a different, and much simpler, format |
324 | simpler, format to the X.509 certificates used in ssl(8). | 339 | to the X.509 certificates used in ssl(8). |
325 | 340 | ||
326 | ssh-keygen supports two types of certificates: user and host. User cer- | 341 | ssh-keygen supports two types of certificates: user and host. User |
327 | tificates authenticate users to servers, whereas host certificates au- | 342 | certificates authenticate users to servers, whereas host certificates |
328 | thenticate server hosts to users. To generate a user certificate: | 343 | authenticate server hosts to users. To generate a user certificate: |
329 | 344 | ||
330 | $ ssh-keygen -s /path/to/ca_key -I key_id /path/to/user_key.pub | 345 | $ ssh-keygen -s /path/to/ca_key -I key_id /path/to/user_key.pub |
331 | 346 | ||
@@ -334,83 +349,90 @@ CERTIFICATES | |||
334 | 349 | ||
335 | $ ssh-keygen -s /path/to/ca_key -I key_id -h /path/to/host_key.pub | 350 | $ ssh-keygen -s /path/to/ca_key -I key_id -h /path/to/host_key.pub |
336 | 351 | ||
337 | The host certificate will be output to /path/to/host_key-cert.pub. In | 352 | The host certificate will be output to /path/to/host_key-cert.pub. |
338 | both cases, key_id is a "key identifier" that is logged by the server | 353 | |
354 | It is possible to sign using a CA key stored in a PKCS#11 token by | ||
355 | providing the token library using -D and identifying the CA key by | ||
356 | providing its public half as an argument to -s: | ||
357 | |||
358 | $ ssh-keygen -s ca_key.pub -D libpkcs11.so -I key_id host_key.pub | ||
359 | |||
360 | In all cases, key_id is a "key identifier" that is logged by the server | ||
339 | when the certificate is used for authentication. | 361 | when the certificate is used for authentication. |
340 | 362 | ||
341 | Certificates may be limited to be valid for a set of principal (us- | 363 | Certificates may be limited to be valid for a set of principal |
342 | er/host) names. By default, generated certificates are valid for all | 364 | (user/host) names. By default, generated certificates are valid for all |
343 | users or hosts. To generate a certificate for a specified set of princi- | 365 | users or hosts. To generate a certificate for a specified set of |
344 | pals: | 366 | principals: |
345 | 367 | ||
346 | $ ssh-keygen -s ca_key -I key_id -n user1,user2 user_key.pub | 368 | $ ssh-keygen -s ca_key -I key_id -n user1,user2 user_key.pub |
347 | $ ssh-keygen -s ca_key -I key_id -h -n host.domain user_key.pub | 369 | $ ssh-keygen -s ca_key -I key_id -h -n host.domain user_key.pub |
348 | 370 | ||
349 | Additional limitations on the validity and use of user certificates may | 371 | Additional limitations on the validity and use of user certificates may |
350 | be specified through certificate constraints. A constrained certificate | 372 | be specified through certificate options. A certificate option may |
351 | may disable features of the SSH session, may be valid only when presented | 373 | disable features of the SSH session, may be valid only when presented |
352 | from particular source addresses or may force the use of a specific com- | 374 | from particular source addresses or may force the use of a specific |
353 | mand. For a list of valid certificate constraints, see the documentation | 375 | command. For a list of valid certificate options, see the documentation |
354 | for the -O option above. | 376 | for the -O option above. |
355 | 377 | ||
356 | Finally, certificates may be defined with a validity lifetime. The -V | 378 | Finally, certificates may be defined with a validity lifetime. The -V |
357 | option allows specification of certificate start and end times. A cer- | 379 | option allows specification of certificate start and end times. A |
358 | tificate that is presented at a time outside this range will not be con- | 380 | certificate that is presented at a time outside this range will not be |
359 | sidered valid. By default, certificates have a maximum validity inter- | 381 | considered valid. By default, certificates have a maximum validity |
360 | val. | 382 | interval. |
361 | 383 | ||
362 | For certificates to be used for user or host authentication, the CA pub- | 384 | For certificates to be used for user or host authentication, the CA |
363 | lic key must be trusted by sshd(8) or ssh(1). Please refer to those man- | 385 | public key must be trusted by sshd(8) or ssh(1). Please refer to those |
364 | ual pages for details. | 386 | manual pages for details. |
365 | 387 | ||
366 | FILES | 388 | FILES |
367 | ~/.ssh/identity | 389 | ~/.ssh/identity |
368 | Contains the protocol version 1 RSA authentication identity of | 390 | Contains the protocol version 1 RSA authentication identity of |
369 | the user. This file should not be readable by anyone but the us- | 391 | the user. This file should not be readable by anyone but the |
370 | er. It is possible to specify a passphrase when generating the | 392 | user. It is possible to specify a passphrase when generating the |
371 | key; that passphrase will be used to encrypt the private part of | 393 | key; that passphrase will be used to encrypt the private part of |
372 | this file using 128-bit AES. This file is not automatically ac- | 394 | this file using 128-bit AES. This file is not automatically |
373 | cessed by ssh-keygen but it is offered as the default file for | 395 | accessed by ssh-keygen but it is offered as the default file for |
374 | the private key. ssh(1) will read this file when a login attempt | 396 | the private key. ssh(1) will read this file when a login attempt |
375 | is made. | 397 | is made. |
376 | 398 | ||
377 | ~/.ssh/identity.pub | 399 | ~/.ssh/identity.pub |
378 | Contains the protocol version 1 RSA public key for authentica- | 400 | Contains the protocol version 1 RSA public key for |
379 | tion. The contents of this file should be added to | 401 | authentication. The contents of this file should be added to |
380 | ~/.ssh/authorized_keys on all machines where the user wishes to | 402 | ~/.ssh/authorized_keys on all machines where the user wishes to |
381 | log in using RSA authentication. There is no need to keep the | 403 | log in using RSA authentication. There is no need to keep the |
382 | contents of this file secret. | 404 | contents of this file secret. |
383 | 405 | ||
384 | ~/.ssh/id_dsa | 406 | ~/.ssh/id_dsa |
385 | Contains the protocol version 2 DSA authentication identity of | 407 | Contains the protocol version 2 DSA authentication identity of |
386 | the user. This file should not be readable by anyone but the us- | 408 | the user. This file should not be readable by anyone but the |
387 | er. It is possible to specify a passphrase when generating the | 409 | user. It is possible to specify a passphrase when generating the |
388 | key; that passphrase will be used to encrypt the private part of | 410 | key; that passphrase will be used to encrypt the private part of |
389 | this file using 128-bit AES. This file is not automatically ac- | 411 | this file using 128-bit AES. This file is not automatically |
390 | cessed by ssh-keygen but it is offered as the default file for | 412 | accessed by ssh-keygen but it is offered as the default file for |
391 | the private key. ssh(1) will read this file when a login attempt | 413 | the private key. ssh(1) will read this file when a login attempt |
392 | is made. | 414 | is made. |
393 | 415 | ||
394 | ~/.ssh/id_dsa.pub | 416 | ~/.ssh/id_dsa.pub |
395 | Contains the protocol version 2 DSA public key for authentica- | 417 | Contains the protocol version 2 DSA public key for |
396 | tion. The contents of this file should be added to | 418 | authentication. The contents of this file should be added to |
397 | ~/.ssh/authorized_keys on all machines where the user wishes to | 419 | ~/.ssh/authorized_keys on all machines where the user wishes to |
398 | log in using public key authentication. There is no need to keep | 420 | log in using public key authentication. There is no need to keep |
399 | the contents of this file secret. | 421 | the contents of this file secret. |
400 | 422 | ||
401 | ~/.ssh/id_rsa | 423 | ~/.ssh/id_rsa |
402 | Contains the protocol version 2 RSA authentication identity of | 424 | Contains the protocol version 2 RSA authentication identity of |
403 | the user. This file should not be readable by anyone but the us- | 425 | the user. This file should not be readable by anyone but the |
404 | er. It is possible to specify a passphrase when generating the | 426 | user. It is possible to specify a passphrase when generating the |
405 | key; that passphrase will be used to encrypt the private part of | 427 | key; that passphrase will be used to encrypt the private part of |
406 | this file using 128-bit AES. This file is not automatically ac- | 428 | this file using 128-bit AES. This file is not automatically |
407 | cessed by ssh-keygen but it is offered as the default file for | 429 | accessed by ssh-keygen but it is offered as the default file for |
408 | the private key. ssh(1) will read this file when a login attempt | 430 | the private key. ssh(1) will read this file when a login attempt |
409 | is made. | 431 | is made. |
410 | 432 | ||
411 | ~/.ssh/id_rsa.pub | 433 | ~/.ssh/id_rsa.pub |
412 | Contains the protocol version 2 RSA public key for authentica- | 434 | Contains the protocol version 2 RSA public key for |
413 | tion. The contents of this file should be added to | 435 | authentication. The contents of this file should be added to |
414 | ~/.ssh/authorized_keys on all machines where the user wishes to | 436 | ~/.ssh/authorized_keys on all machines where the user wishes to |
415 | log in using public key authentication. There is no need to keep | 437 | log in using public key authentication. There is no need to keep |
416 | the contents of this file secret. | 438 | the contents of this file secret. |
@@ -431,4 +453,4 @@ AUTHORS | |||
431 | created OpenSSH. Markus Friedl contributed the support for SSH protocol | 453 | created OpenSSH. Markus Friedl contributed the support for SSH protocol |
432 | versions 1.5 and 2.0. | 454 | versions 1.5 and 2.0. |
433 | 455 | ||
434 | OpenBSD 4.7 March 13, 2010 7 | 456 | OpenBSD 4.8 August 4, 2010 OpenBSD 4.8 |