summaryrefslogtreecommitdiff
path: root/ssh-keygen.0
diff options
context:
space:
mode:
Diffstat (limited to 'ssh-keygen.0')
-rw-r--r--ssh-keygen.0254
1 files changed, 138 insertions, 116 deletions
diff --git a/ssh-keygen.0 b/ssh-keygen.0
index aed4a14ad..fb7838724 100644
--- a/ssh-keygen.0
+++ b/ssh-keygen.0
@@ -7,8 +7,8 @@ SYNOPSIS
7 ssh-keygen [-q] [-b bits] -t type [-N new_passphrase] [-C comment] 7 ssh-keygen [-q] [-b bits] -t type [-N new_passphrase] [-C comment]
8 [-f output_keyfile] 8 [-f output_keyfile]
9 ssh-keygen -p [-P old_passphrase] [-N new_passphrase] [-f keyfile] 9 ssh-keygen -p [-P old_passphrase] [-N new_passphrase] [-f keyfile]
10 ssh-keygen -i [-f input_keyfile] 10 ssh-keygen -i [-m key_format] [-f input_keyfile]
11 ssh-keygen -e [-f input_keyfile] 11 ssh-keygen -e [-m key_format] [-f input_keyfile]
12 ssh-keygen -y [-f input_keyfile] 12 ssh-keygen -y [-f input_keyfile]
13 ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile] 13 ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile]
14 ssh-keygen -l [-f input_keyfile] 14 ssh-keygen -l [-f input_keyfile]
@@ -22,7 +22,7 @@ SYNOPSIS
22 ssh-keygen -T output_file -f input_file [-v] [-a num_trials] 22 ssh-keygen -T output_file -f input_file [-v] [-a num_trials]
23 [-W generator] 23 [-W generator]
24 ssh-keygen -s ca_key -I certificate_identity [-h] [-n principals] 24 ssh-keygen -s ca_key -I certificate_identity [-h] [-n principals]
25 [-O constraint] [-V validity_interval] file ... 25 [-O option] [-V validity_interval] [-z serial_number] file ...
26 ssh-keygen -L [-f input_keyfile] 26 ssh-keygen -L [-f input_keyfile]
27 27
28DESCRIPTION 28DESCRIPTION
@@ -46,14 +46,14 @@ DESCRIPTION
46 name but ``.pub'' appended. The program also asks for a passphrase. The 46 name but ``.pub'' appended. The program also asks for a passphrase. The
47 passphrase may be empty to indicate no passphrase (host keys must have an 47 passphrase may be empty to indicate no passphrase (host keys must have an
48 empty passphrase), or it may be a string of arbitrary length. A 48 empty passphrase), or it may be a string of arbitrary length. A
49 passphrase is similar to a password, except it can be a phrase with a se- 49 passphrase is similar to a password, except it can be a phrase with a
50 ries of words, punctuation, numbers, whitespace, or any string of charac- 50 series of words, punctuation, numbers, whitespace, or any string of
51 ters you want. Good passphrases are 10-30 characters long, are not sim- 51 characters you want. Good passphrases are 10-30 characters long, are not
52 ple sentences or otherwise easily guessable (English prose has only 1-2 52 simple sentences or otherwise easily guessable (English prose has only 1-
53 bits of entropy per character, and provides very bad passphrases), and 53 2 bits of entropy per character, and provides very bad passphrases), and
54 contain a mix of upper and lowercase letters, numbers, and non-alphanu- 54 contain a mix of upper and lowercase letters, numbers, and non-
55 meric characters. The passphrase can be changed later by using the -p 55 alphanumeric characters. The passphrase can be changed later by using
56 option. 56 the -p option.
57 57
58 There is no way to recover a lost passphrase. If the passphrase is lost 58 There is no way to recover a lost passphrase. If the passphrase is lost
59 or forgotten, a new key must be generated and copied to the corresponding 59 or forgotten, a new key must be generated and copied to the corresponding
@@ -61,9 +61,9 @@ DESCRIPTION
61 61
62 For RSA1 keys, there is also a comment field in the key file that is only 62 For RSA1 keys, there is also a comment field in the key file that is only
63 for convenience to the user to help identify the key. The comment can 63 for convenience to the user to help identify the key. The comment can
64 tell what the key is for, or whatever is useful. The comment is initial- 64 tell what the key is for, or whatever is useful. The comment is
65 ized to ``user@host'' when the key is created, but can be changed using 65 initialized to ``user@host'' when the key is created, but can be changed
66 the -c option. 66 using the -c option.
67 67
68 After a key is generated, instructions below detail where the keys should 68 After a key is generated, instructions below detail where the keys should
69 be placed to be activated. 69 be placed to be activated.
@@ -79,26 +79,29 @@ DESCRIPTION
79 79
80 -b bits 80 -b bits
81 Specifies the number of bits in the key to create. For RSA keys, 81 Specifies the number of bits in the key to create. For RSA keys,
82 the minimum size is 768 bits and the default is 2048 bits. Gen- 82 the minimum size is 768 bits and the default is 2048 bits.
83 erally, 2048 bits is considered sufficient. DSA keys must be ex- 83 Generally, 2048 bits is considered sufficient. DSA keys must be
84 actly 1024 bits as specified by FIPS 186-2. 84 exactly 1024 bits as specified by FIPS 186-2.
85 85
86 -C comment 86 -C comment
87 Provides a new comment. 87 Provides a new comment.
88 88
89 -c Requests changing the comment in the private and public key 89 -c Requests changing the comment in the private and public key
90 files. This operation is only supported for RSA1 keys. The pro- 90 files. This operation is only supported for RSA1 keys. The
91 gram will prompt for the file containing the private keys, for 91 program will prompt for the file containing the private keys, for
92 the passphrase if the key has one, and for the new comment. 92 the passphrase if the key has one, and for the new comment.
93 93
94 -D pkcs11 94 -D pkcs11
95 Download the RSA public keys provided by the PKCS#11 shared li- 95 Download the RSA public keys provided by the PKCS#11 shared
96 brary pkcs11. 96 library pkcs11. When used in combination with -s, this option
97 indicates that a CA key resides in a PKCS#11 token (see the
98 CERTIFICATES section for details).
97 99
98 -e This option will read a private or public OpenSSH key file and 100 -e This option will read a private or public OpenSSH key file and
99 print the key in RFC 4716 SSH Public Key File Format to stdout. 101 print to stdout the key in one of the formats specified by the -m
100 This option allows exporting keys for use by several commercial 102 option. The default export format is ``RFC4716''. This option
101 SSH implementations. 103 allows exporting OpenSSH keys for use by other programs,
104 including several commercial SSH implementations.
102 105
103 -F hostname 106 -F hostname
104 Search for the specified hostname in a known_hosts file, listing 107 Search for the specified hostname in a known_hosts file, listing
@@ -116,8 +119,8 @@ DESCRIPTION
116 -g Use generic DNS format when printing fingerprint resource records 119 -g Use generic DNS format when printing fingerprint resource records
117 using the -r command. 120 using the -r command.
118 121
119 -H Hash a known_hosts file. This replaces all hostnames and ad- 122 -H Hash a known_hosts file. This replaces all hostnames and
120 dresses with hashed representations within the specified file; 123 addresses with hashed representations within the specified file;
121 the original content is moved to a file with a .old suffix. 124 the original content is moved to a file with a .old suffix.
122 These hashes may be used normally by ssh and sshd, but they do 125 These hashes may be used normally by ssh and sshd, but they do
123 not reveal identifying information should the file's contents be 126 not reveal identifying information should the file's contents be
@@ -133,41 +136,48 @@ DESCRIPTION
133 the CERTIFICATES section for details. 136 the CERTIFICATES section for details.
134 137
135 -i This option will read an unencrypted private (or public) key file 138 -i This option will read an unencrypted private (or public) key file
136 in SSH2-compatible format and print an OpenSSH compatible private 139 in the format specified by the -m option and print an OpenSSH
137 (or public) key to stdout. ssh-keygen also reads the RFC 4716 140 compatible private (or public) key to stdout. This option allows
138 SSH Public Key File Format. This option allows importing keys 141 importing keys from other software, including several commercial
139 from several commercial SSH implementations. 142 SSH implementations. The default import format is ``RFC4716''.
140 143
141 -L Prints the contents of a certificate. 144 -L Prints the contents of a certificate.
142 145
143 -l Show fingerprint of specified public key file. Private RSA1 keys 146 -l Show fingerprint of specified public key file. Private RSA1 keys
144 are also supported. For RSA and DSA keys ssh-keygen tries to 147 are also supported. For RSA and DSA keys ssh-keygen tries to
145 find the matching public key file and prints its fingerprint. If 148 find the matching public key file and prints its fingerprint. If
146 combined with -v, an ASCII art representation of the key is sup- 149 combined with -v, an ASCII art representation of the key is
147 plied with the fingerprint. 150 supplied with the fingerprint.
148 151
149 -M memory 152 -M memory
150 Specify the amount of memory to use (in megabytes) when generat- 153 Specify the amount of memory to use (in megabytes) when
151 ing candidate moduli for DH-GEX. 154 generating candidate moduli for DH-GEX.
155
156 -m key_format
157 Specify a key format for the -i (import) or -e (export)
158 conversion options. The supported key formats are: ``RFC4716''
159 (RFC 4716/SSH2 public or private key), ``PKCS8'' (PEM PKCS8
160 public key) or ``PEM'' (PEM public key). The default conversion
161 format is ``RFC4716''.
152 162
153 -N new_passphrase 163 -N new_passphrase
154 Provides the new passphrase. 164 Provides the new passphrase.
155 165
156 -n principals 166 -n principals
157 Specify one or more principals (user or host names) to be includ- 167 Specify one or more principals (user or host names) to be
158 ed in a certificate when signing a key. Multiple principals may 168 included in a certificate when signing a key. Multiple
159 be specified, separated by commas. Please see the CERTIFICATES 169 principals may be specified, separated by commas. Please see the
160 section for details. 170 CERTIFICATES section for details.
161 171
162 -O constraint 172 -O option
163 Specify a certificate constraint when signing a key. This option 173 Specify a certificate option when signing a key. This option may
164 may be specified multiple times. Please see the CERTIFICATES 174 be specified multiple times. Please see the CERTIFICATES section
165 section for details. The constraints that are valid for user 175 for details. The options that are valid for user certificates
166 certificates are: 176 are:
167 177
168 clear Clear all enabled permissions. This is useful for clear- 178 clear Clear all enabled permissions. This is useful for
169 ing the default set of permissions so permissions may be 179 clearing the default set of permissions so permissions
170 added individually. 180 may be added individually.
171 181
172 force-command=command 182 force-command=command
173 Forces the execution of command instead of any shell or 183 Forces the execution of command instead of any shell or
@@ -206,11 +216,11 @@ DESCRIPTION
206 216
207 source-address=address_list 217 source-address=address_list
208 Restrict the source addresses from which the certificate 218 Restrict the source addresses from which the certificate
209 is considered valid. The address_list is a comma-sepa- 219 is considered valid. The address_list is a comma-
210 rated list of one or more address/netmask pairs in CIDR 220 separated list of one or more address/netmask pairs in
211 format. 221 CIDR format.
212 222
213 At present, no constraints are valid for host keys. 223 At present, no options are valid for host keys.
214 224
215 -P passphrase 225 -P passphrase
216 Provides the (old) passphrase. 226 Provides the (old) passphrase.
@@ -245,21 +255,21 @@ DESCRIPTION
245 255
246 -t type 256 -t type
247 Specifies the type of key to create. The possible values are 257 Specifies the type of key to create. The possible values are
248 ``rsa1'' for protocol version 1 and ``rsa'' or ``dsa'' for proto- 258 ``rsa1'' for protocol version 1 and ``rsa'' or ``dsa'' for
249 col version 2. 259 protocol version 2.
250 260
251 -V validity_interval 261 -V validity_interval
252 Specify a validity interval when signing a certificate. A valid- 262 Specify a validity interval when signing a certificate. A
253 ity interval may consist of a single time, indicating that the 263 validity interval may consist of a single time, indicating that
254 certificate is valid beginning now and expiring at that time, or 264 the certificate is valid beginning now and expiring at that time,
255 may consist of two times separated by a colon to indicate an ex- 265 or may consist of two times separated by a colon to indicate an
256 plicit time interval. The start time may be specified as a date 266 explicit time interval. The start time may be specified as a
257 in YYYYMMDD format, a time in YYYYMMDDHHMMSS format or a relative 267 date in YYYYMMDD format, a time in YYYYMMDDHHMMSS format or a
258 time (to the current time) consisting of a minus sign followed by 268 relative time (to the current time) consisting of a minus sign
259 a relative time in the format described in the TIME FORMATS sec- 269 followed by a relative time in the format described in the TIME
260 tion of sshd_config(5). The end time may be specified as a 270 FORMATS section of sshd_config(5). The end time may be specified
261 YYYYMMDD date, a YYYYMMDDHHMMSS time or a relative time starting 271 as a YYYYMMDD date, a YYYYMMDDHHMMSS time or a relative time
262 with a plus character. 272 starting with a plus character.
263 273
264 For example: ``+52w1d'' (valid from now to 52 weeks and one day 274 For example: ``+52w1d'' (valid from now to 52 weeks and one day
265 from now), ``-4w:+4w'' (valid from four weeks ago to four weeks 275 from now), ``-4w:+4w'' (valid from four weeks ago to four weeks
@@ -269,9 +279,9 @@ DESCRIPTION
269 2011). 279 2011).
270 280
271 -v Verbose mode. Causes ssh-keygen to print debugging messages 281 -v Verbose mode. Causes ssh-keygen to print debugging messages
272 about its progress. This is helpful for debugging moduli genera- 282 about its progress. This is helpful for debugging moduli
273 tion. Multiple -v options increase the verbosity. The maximum 283 generation. Multiple -v options increase the verbosity. The
274 is 3. 284 maximum is 3.
275 285
276 -W generator 286 -W generator
277 Specify desired generator when testing candidate moduli for DH- 287 Specify desired generator when testing candidate moduli for DH-
@@ -280,12 +290,17 @@ DESCRIPTION
280 -y This option will read a private OpenSSH format file and print an 290 -y This option will read a private OpenSSH format file and print an
281 OpenSSH public key to stdout. 291 OpenSSH public key to stdout.
282 292
293 -z serial_number
294 Specifies a serial number to be embedded in the certificate to
295 distinguish this certificate from others from the same CA. The
296 default serial number is zero.
297
283MODULI GENERATION 298MODULI GENERATION
284 ssh-keygen may be used to generate groups for the Diffie-Hellman Group 299 ssh-keygen may be used to generate groups for the Diffie-Hellman Group
285 Exchange (DH-GEX) protocol. Generating these groups is a two-step pro- 300 Exchange (DH-GEX) protocol. Generating these groups is a two-step
286 cess: first, candidate primes are generated using a fast, but memory in- 301 process: first, candidate primes are generated using a fast, but memory
287 tensive process. These candidate primes are then tested for suitability 302 intensive process. These candidate primes are then tested for
288 (a CPU-intensive process). 303 suitability (a CPU-intensive process).
289 304
290 Generation of primes is performed using the -G option. The desired 305 Generation of primes is performed using the -G option. The desired
291 length of the primes may be specified by the -b option. For example: 306 length of the primes may be specified by the -b option. For example:
@@ -293,8 +308,8 @@ MODULI GENERATION
293 # ssh-keygen -G moduli-2048.candidates -b 2048 308 # ssh-keygen -G moduli-2048.candidates -b 2048
294 309
295 By default, the search for primes begins at a random point in the desired 310 By default, the search for primes begins at a random point in the desired
296 length range. This may be overridden using the -S option, which speci- 311 length range. This may be overridden using the -S option, which
297 fies a different start point (in hex). 312 specifies a different start point (in hex).
298 313
299 Once a set of candidates have been generated, they must be tested for 314 Once a set of candidates have been generated, they must be tested for
300 suitability. This may be performed using the -T option. In this mode 315 suitability. This may be performed using the -T option. In this mode
@@ -317,15 +332,15 @@ CERTIFICATES
317 ssh-keygen supports signing of keys to produce certificates that may be 332 ssh-keygen supports signing of keys to produce certificates that may be
318 used for user or host authentication. Certificates consist of a public 333 used for user or host authentication. Certificates consist of a public
319 key, some identity information, zero or more principal (user or host) 334 key, some identity information, zero or more principal (user or host)
320 names and an optional set of constraints that are signed by a Certifica- 335 names and a set of options that are signed by a Certification Authority
321 tion Authority (CA) key. Clients or servers may then trust only the CA 336 (CA) key. Clients or servers may then trust only the CA key and verify
322 key and verify its signature on a certificate rather than trusting many 337 its signature on a certificate rather than trusting many user/host keys.
323 user/host keys. Note that OpenSSH certificates are a different, and much 338 Note that OpenSSH certificates are a different, and much simpler, format
324 simpler, format to the X.509 certificates used in ssl(8). 339 to the X.509 certificates used in ssl(8).
325 340
326 ssh-keygen supports two types of certificates: user and host. User cer- 341 ssh-keygen supports two types of certificates: user and host. User
327 tificates authenticate users to servers, whereas host certificates au- 342 certificates authenticate users to servers, whereas host certificates
328 thenticate server hosts to users. To generate a user certificate: 343 authenticate server hosts to users. To generate a user certificate:
329 344
330 $ ssh-keygen -s /path/to/ca_key -I key_id /path/to/user_key.pub 345 $ ssh-keygen -s /path/to/ca_key -I key_id /path/to/user_key.pub
331 346
@@ -334,83 +349,90 @@ CERTIFICATES
334 349
335 $ ssh-keygen -s /path/to/ca_key -I key_id -h /path/to/host_key.pub 350 $ ssh-keygen -s /path/to/ca_key -I key_id -h /path/to/host_key.pub
336 351
337 The host certificate will be output to /path/to/host_key-cert.pub. In 352 The host certificate will be output to /path/to/host_key-cert.pub.
338 both cases, key_id is a "key identifier" that is logged by the server 353
354 It is possible to sign using a CA key stored in a PKCS#11 token by
355 providing the token library using -D and identifying the CA key by
356 providing its public half as an argument to -s:
357
358 $ ssh-keygen -s ca_key.pub -D libpkcs11.so -I key_id host_key.pub
359
360 In all cases, key_id is a "key identifier" that is logged by the server
339 when the certificate is used for authentication. 361 when the certificate is used for authentication.
340 362
341 Certificates may be limited to be valid for a set of principal (us- 363 Certificates may be limited to be valid for a set of principal
342 er/host) names. By default, generated certificates are valid for all 364 (user/host) names. By default, generated certificates are valid for all
343 users or hosts. To generate a certificate for a specified set of princi- 365 users or hosts. To generate a certificate for a specified set of
344 pals: 366 principals:
345 367
346 $ ssh-keygen -s ca_key -I key_id -n user1,user2 user_key.pub 368 $ ssh-keygen -s ca_key -I key_id -n user1,user2 user_key.pub
347 $ ssh-keygen -s ca_key -I key_id -h -n host.domain user_key.pub 369 $ ssh-keygen -s ca_key -I key_id -h -n host.domain user_key.pub
348 370
349 Additional limitations on the validity and use of user certificates may 371 Additional limitations on the validity and use of user certificates may
350 be specified through certificate constraints. A constrained certificate 372 be specified through certificate options. A certificate option may
351 may disable features of the SSH session, may be valid only when presented 373 disable features of the SSH session, may be valid only when presented
352 from particular source addresses or may force the use of a specific com- 374 from particular source addresses or may force the use of a specific
353 mand. For a list of valid certificate constraints, see the documentation 375 command. For a list of valid certificate options, see the documentation
354 for the -O option above. 376 for the -O option above.
355 377
356 Finally, certificates may be defined with a validity lifetime. The -V 378 Finally, certificates may be defined with a validity lifetime. The -V
357 option allows specification of certificate start and end times. A cer- 379 option allows specification of certificate start and end times. A
358 tificate that is presented at a time outside this range will not be con- 380 certificate that is presented at a time outside this range will not be
359 sidered valid. By default, certificates have a maximum validity inter- 381 considered valid. By default, certificates have a maximum validity
360 val. 382 interval.
361 383
362 For certificates to be used for user or host authentication, the CA pub- 384 For certificates to be used for user or host authentication, the CA
363 lic key must be trusted by sshd(8) or ssh(1). Please refer to those man- 385 public key must be trusted by sshd(8) or ssh(1). Please refer to those
364 ual pages for details. 386 manual pages for details.
365 387
366FILES 388FILES
367 ~/.ssh/identity 389 ~/.ssh/identity
368 Contains the protocol version 1 RSA authentication identity of 390 Contains the protocol version 1 RSA authentication identity of
369 the user. This file should not be readable by anyone but the us- 391 the user. This file should not be readable by anyone but the
370 er. It is possible to specify a passphrase when generating the 392 user. It is possible to specify a passphrase when generating the
371 key; that passphrase will be used to encrypt the private part of 393 key; that passphrase will be used to encrypt the private part of
372 this file using 128-bit AES. This file is not automatically ac- 394 this file using 128-bit AES. This file is not automatically
373 cessed by ssh-keygen but it is offered as the default file for 395 accessed by ssh-keygen but it is offered as the default file for
374 the private key. ssh(1) will read this file when a login attempt 396 the private key. ssh(1) will read this file when a login attempt
375 is made. 397 is made.
376 398
377 ~/.ssh/identity.pub 399 ~/.ssh/identity.pub
378 Contains the protocol version 1 RSA public key for authentica- 400 Contains the protocol version 1 RSA public key for
379 tion. The contents of this file should be added to 401 authentication. The contents of this file should be added to
380 ~/.ssh/authorized_keys on all machines where the user wishes to 402 ~/.ssh/authorized_keys on all machines where the user wishes to
381 log in using RSA authentication. There is no need to keep the 403 log in using RSA authentication. There is no need to keep the
382 contents of this file secret. 404 contents of this file secret.
383 405
384 ~/.ssh/id_dsa 406 ~/.ssh/id_dsa
385 Contains the protocol version 2 DSA authentication identity of 407 Contains the protocol version 2 DSA authentication identity of
386 the user. This file should not be readable by anyone but the us- 408 the user. This file should not be readable by anyone but the
387 er. It is possible to specify a passphrase when generating the 409 user. It is possible to specify a passphrase when generating the
388 key; that passphrase will be used to encrypt the private part of 410 key; that passphrase will be used to encrypt the private part of
389 this file using 128-bit AES. This file is not automatically ac- 411 this file using 128-bit AES. This file is not automatically
390 cessed by ssh-keygen but it is offered as the default file for 412 accessed by ssh-keygen but it is offered as the default file for
391 the private key. ssh(1) will read this file when a login attempt 413 the private key. ssh(1) will read this file when a login attempt
392 is made. 414 is made.
393 415
394 ~/.ssh/id_dsa.pub 416 ~/.ssh/id_dsa.pub
395 Contains the protocol version 2 DSA public key for authentica- 417 Contains the protocol version 2 DSA public key for
396 tion. The contents of this file should be added to 418 authentication. The contents of this file should be added to
397 ~/.ssh/authorized_keys on all machines where the user wishes to 419 ~/.ssh/authorized_keys on all machines where the user wishes to
398 log in using public key authentication. There is no need to keep 420 log in using public key authentication. There is no need to keep
399 the contents of this file secret. 421 the contents of this file secret.
400 422
401 ~/.ssh/id_rsa 423 ~/.ssh/id_rsa
402 Contains the protocol version 2 RSA authentication identity of 424 Contains the protocol version 2 RSA authentication identity of
403 the user. This file should not be readable by anyone but the us- 425 the user. This file should not be readable by anyone but the
404 er. It is possible to specify a passphrase when generating the 426 user. It is possible to specify a passphrase when generating the
405 key; that passphrase will be used to encrypt the private part of 427 key; that passphrase will be used to encrypt the private part of
406 this file using 128-bit AES. This file is not automatically ac- 428 this file using 128-bit AES. This file is not automatically
407 cessed by ssh-keygen but it is offered as the default file for 429 accessed by ssh-keygen but it is offered as the default file for
408 the private key. ssh(1) will read this file when a login attempt 430 the private key. ssh(1) will read this file when a login attempt
409 is made. 431 is made.
410 432
411 ~/.ssh/id_rsa.pub 433 ~/.ssh/id_rsa.pub
412 Contains the protocol version 2 RSA public key for authentica- 434 Contains the protocol version 2 RSA public key for
413 tion. The contents of this file should be added to 435 authentication. The contents of this file should be added to
414 ~/.ssh/authorized_keys on all machines where the user wishes to 436 ~/.ssh/authorized_keys on all machines where the user wishes to
415 log in using public key authentication. There is no need to keep 437 log in using public key authentication. There is no need to keep
416 the contents of this file secret. 438 the contents of this file secret.
@@ -431,4 +453,4 @@ AUTHORS
431 created OpenSSH. Markus Friedl contributed the support for SSH protocol 453 created OpenSSH. Markus Friedl contributed the support for SSH protocol
432 versions 1.5 and 2.0. 454 versions 1.5 and 2.0.
433 455
434OpenBSD 4.7 March 13, 2010 7 456OpenBSD 4.8 August 4, 2010 OpenBSD 4.8