summaryrefslogtreecommitdiff
path: root/ssh-keygen.0
diff options
context:
space:
mode:
Diffstat (limited to 'ssh-keygen.0')
-rw-r--r--ssh-keygen.060
1 files changed, 30 insertions, 30 deletions
diff --git a/ssh-keygen.0 b/ssh-keygen.0
index ff3848cfd..2db957554 100644
--- a/ssh-keygen.0
+++ b/ssh-keygen.0
@@ -1,4 +1,4 @@
1SSH-KEYGEN(1) OpenBSD Reference Manual SSH-KEYGEN(1) 1SSH-KEYGEN(1) BSD General Commands Manual SSH-KEYGEN(1)
2 2
3NAME 3NAME
4 ssh-keygen - authentication key generation, management and conversion 4 ssh-keygen - authentication key generation, management and conversion
@@ -35,17 +35,17 @@ DESCRIPTION
35 35
36 Normally this program generates the key and asks for a file in which to 36 Normally this program generates the key and asks for a file in which to
37 store the private key. The public key is stored in a file with the same 37 store the private key. The public key is stored in a file with the same
38 name but ``.pub'' appended. The program also asks for a passphrase. The 38 name but M-bM-^@M-^\.pubM-bM-^@M-^] appended. The program also asks for a passphrase. The
39 passphrase may be empty to indicate no passphrase (host keys must have an 39 passphrase may be empty to indicate no passphrase (host keys must have an
40 empty passphrase), or it may be a string of arbitrary length. A 40 empty passphrase), or it may be a string of arbitrary length. A
41 passphrase is similar to a password, except it can be a phrase with a se- 41 passphrase is similar to a password, except it can be a phrase with a
42 ries of words, punctuation, numbers, whitespace, or any string of charac- 42 series of words, punctuation, numbers, whitespace, or any string of char-
43 ters you want. Good passphrases are 10-30 characters long, are not sim- 43 acters you want. Good passphrases are 10-30 characters long, are not
44 ple sentences or otherwise easily guessable (English prose has only 1-2 44 simple sentences or otherwise easily guessable (English prose has only
45 bits of entropy per character, and provides very bad passphrases), and 45 1-2 bits of entropy per character, and provides very bad passphrases),
46 contain a mix of upper and lowercase letters, numbers, and non-alphanu- 46 and contain a mix of upper and lowercase letters, numbers, and non-
47 meric characters. The passphrase can be changed later by using the -p 47 alphanumeric characters. The passphrase can be changed later by using
48 option. 48 the -p option.
49 49
50 There is no way to recover a lost passphrase. If the passphrase is lost 50 There is no way to recover a lost passphrase. If the passphrase is lost
51 or forgotten, a new key must be generated and copied to the corresponding 51 or forgotten, a new key must be generated and copied to the corresponding
@@ -54,8 +54,8 @@ DESCRIPTION
54 For RSA1 keys, there is also a comment field in the key file that is only 54 For RSA1 keys, there is also a comment field in the key file that is only
55 for convenience to the user to help identify the key. The comment can 55 for convenience to the user to help identify the key. The comment can
56 tell what the key is for, or whatever is useful. The comment is initial- 56 tell what the key is for, or whatever is useful. The comment is initial-
57 ized to ``user@host'' when the key is created, but can be changed using 57 ized to M-bM-^@M-^\user@hostM-bM-^@M-^] when the key is created, but can be changed using the
58 the -c option. 58 -c option.
59 59
60 After a key is generated, instructions below detail where the keys should 60 After a key is generated, instructions below detail where the keys should
61 be placed to be activated. 61 be placed to be activated.
@@ -77,7 +77,7 @@ DESCRIPTION
77 the passphrase if the key has one, and for the new comment. 77 the passphrase if the key has one, and for the new comment.
78 78
79 -e This option will read a private or public OpenSSH key file and 79 -e This option will read a private or public OpenSSH key file and
80 print the key in a `SECSH Public Key File Format' to stdout. 80 print the key in a M-bM-^@M-^XSECSH Public Key File FormatM-bM-^@M-^Y to stdout.
81 This option allows exporting keys for use by several commercial 81 This option allows exporting keys for use by several commercial
82 SSH implementations. 82 SSH implementations.
83 83
@@ -88,8 +88,8 @@ DESCRIPTION
88 88
89 -i This option will read an unencrypted private (or public) key file 89 -i This option will read an unencrypted private (or public) key file
90 in SSH2-compatible format and print an OpenSSH compatible private 90 in SSH2-compatible format and print an OpenSSH compatible private
91 (or public) key to stdout. ssh-keygen also reads the `SECSH 91 (or public) key to stdout. ssh-keygen also reads the M-bM-^@M-^XSECSH
92 Public Key File Format'. This option allows importing keys from 92 Public Key File FormatM-bM-^@M-^Y. This option allows importing keys from
93 several commercial SSH implementations. 93 several commercial SSH implementations.
94 94
95 -l Show fingerprint of specified public key file. Private RSA1 keys 95 -l Show fingerprint of specified public key file. Private RSA1 keys
@@ -108,8 +108,8 @@ DESCRIPTION
108 108
109 -t type 109 -t type
110 Specifies the type of the key to create. The possible values are 110 Specifies the type of the key to create. The possible values are
111 ``rsa1'' for protocol version 1 and ``rsa'' or ``dsa'' for proto- 111 M-bM-^@M-^\rsa1M-bM-^@M-^] for protocol version 1 and M-bM-^@M-^\rsaM-bM-^@M-^] or M-bM-^@M-^\dsaM-bM-^@M-^] for protocol
112 col version 2. 112 version 2.
113 113
114 -B Show the bubblebabble digest of specified private or public key 114 -B Show the bubblebabble digest of specified private or public key
115 file. 115 file.
@@ -155,9 +155,9 @@ DESCRIPTION
155MODULI GENERATION 155MODULI GENERATION
156 ssh-keygen may be used to generate groups for the Diffie-Hellman Group 156 ssh-keygen may be used to generate groups for the Diffie-Hellman Group
157 Exchange (DH-GEX) protocol. Generating these groups is a two-step pro- 157 Exchange (DH-GEX) protocol. Generating these groups is a two-step pro-
158 cess: first, candidate primes are generated using a fast, but memory in- 158 cess: first, candidate primes are generated using a fast, but memory
159 tensive process. These candidate primes are then tested for suitability 159 intensive process. These candidate primes are then tested for suitabil-
160 (a CPU-intensive process). 160 ity (a CPU-intensive process).
161 161
162 Generation of primes is performed using the -G option. The desired 162 Generation of primes is performed using the -G option. The desired
163 length of the primes may be specified by the -b option. For example: 163 length of the primes may be specified by the -b option. For example:
@@ -188,8 +188,8 @@ MODULI GENERATION
188FILES 188FILES
189 $HOME/.ssh/identity 189 $HOME/.ssh/identity
190 Contains the protocol version 1 RSA authentication identity of 190 Contains the protocol version 1 RSA authentication identity of
191 the user. This file should not be readable by anyone but the us- 191 the user. This file should not be readable by anyone but the
192 er. It is possible to specify a passphrase when generating the 192 user. It is possible to specify a passphrase when generating the
193 key; that passphrase will be used to encrypt the private part of 193 key; that passphrase will be used to encrypt the private part of
194 this file using 3DES. This file is not automatically accessed by 194 this file using 3DES. This file is not automatically accessed by
195 ssh-keygen but it is offered as the default file for the private 195 ssh-keygen but it is offered as the default file for the private
@@ -204,8 +204,8 @@ FILES
204 204
205 $HOME/.ssh/id_dsa 205 $HOME/.ssh/id_dsa
206 Contains the protocol version 2 DSA authentication identity of 206 Contains the protocol version 2 DSA authentication identity of
207 the user. This file should not be readable by anyone but the us- 207 the user. This file should not be readable by anyone but the
208 er. It is possible to specify a passphrase when generating the 208 user. It is possible to specify a passphrase when generating the
209 key; that passphrase will be used to encrypt the private part of 209 key; that passphrase will be used to encrypt the private part of
210 this file using 3DES. This file is not automatically accessed by 210 this file using 3DES. This file is not automatically accessed by
211 ssh-keygen but it is offered as the default file for the private 211 ssh-keygen but it is offered as the default file for the private
@@ -220,8 +220,8 @@ FILES
220 220
221 $HOME/.ssh/id_rsa 221 $HOME/.ssh/id_rsa
222 Contains the protocol version 2 RSA authentication identity of 222 Contains the protocol version 2 RSA authentication identity of
223 the user. This file should not be readable by anyone but the us- 223 the user. This file should not be readable by anyone but the
224 er. It is possible to specify a passphrase when generating the 224 user. It is possible to specify a passphrase when generating the
225 key; that passphrase will be used to encrypt the private part of 225 key; that passphrase will be used to encrypt the private part of
226 this file using 3DES. This file is not automatically accessed by 226 this file using 3DES. This file is not automatically accessed by
227 ssh-keygen but it is offered as the default file for the private 227 ssh-keygen but it is offered as the default file for the private
@@ -241,14 +241,14 @@ FILES
241SEE ALSO 241SEE ALSO
242 ssh(1), ssh-add(1), ssh-agent(1), moduli(5), sshd(8) 242 ssh(1), ssh-add(1), ssh-agent(1), moduli(5), sshd(8)
243 243
244 J. Galbraith, and R. Thayer, SECSH Public Key File Format, draft-ietf- 244 J. Galbraith and R. Thayer, SECSH Public Key File Format, draft-ietf-
245 secsh-publickeyfile-01.txt, March 2001, work in progress material. 245 secsh-publickeyfile-01.txt, March 2001, work in progress material.
246 246
247AUTHORS 247AUTHORS
248 OpenSSH is a derivative of the original and free ssh 1.2.12 release by 248 OpenSSH is a derivative of the original and free ssh 1.2.12 release by
249 Tatu Ylonen. Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo 249 Tatu Ylonen. Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo
250 de Raadt and Dug Song removed many bugs, re-added newer features and 250 de Raadt and Dug Song removed many bugs, re-added newer features and cre-
251 created OpenSSH. Markus Friedl contributed the support for SSH protocol 251 ated OpenSSH. Markus Friedl contributed the support for SSH protocol
252 versions 1.5 and 2.0. 252 versions 1.5 and 2.0.
253 253
254OpenBSD 3.4 September 25, 1999 4 254BSD September 25, 1999 BSD