diff options
Diffstat (limited to 'ssh-keyscan.0')
-rw-r--r-- | ssh-keyscan.0 | 40 |
1 files changed, 20 insertions, 20 deletions
diff --git a/ssh-keyscan.0 b/ssh-keyscan.0 index 19031a27f..23d9f943c 100644 --- a/ssh-keyscan.0 +++ b/ssh-keyscan.0 | |||
@@ -57,17 +57,6 @@ SECURITY | |||
57 | detection of tampered keyfiles or man in the middle attacks which have | 57 | detection of tampered keyfiles or man in the middle attacks which have |
58 | begun after the ssh_known_hosts file was created. | 58 | begun after the ssh_known_hosts file was created. |
59 | 59 | ||
60 | EXAMPLES | ||
61 | Print the rsa1 host key for machine hostname: | ||
62 | |||
63 | $ ssh-keyscan hostname | ||
64 | |||
65 | Find all hosts from the file ssh_hosts which have new or different keys | ||
66 | from those in the sorted file ssh_known_hosts: | ||
67 | |||
68 | $ ssh-keyscan -t rsa,dsa -f ssh_hosts | \ | ||
69 | sort -u - ssh_known_hosts | diff ssh_known_hosts - | ||
70 | |||
71 | FILES | 60 | FILES |
72 | Input format: | 61 | Input format: |
73 | 62 | ||
@@ -81,22 +70,33 @@ FILES | |||
81 | 70 | ||
82 | host-or-namelist keytype base64-encoded-key | 71 | host-or-namelist keytype base64-encoded-key |
83 | 72 | ||
84 | Where keytype is either M-bM-^@M-^\ssh-rsaM-bM-^@M-^] or M-bM-^@M-^\ssh-dsaM-bM-^@M-^]. | 73 | Where keytype is either M-bM-^@M-^\ssh-rsaM-bM-^@M-^] or M-bM-^@M-^\ssh-dssM-bM-^@M-^]. |
85 | 74 | ||
86 | /etc/ssh/ssh_known_hosts | 75 | /etc/ssh/ssh_known_hosts |
87 | 76 | ||
88 | BUGS | 77 | EXAMPLES |
89 | It generates "Connection closed by remote host" messages on the consoles | 78 | Print the rsa1 host key for machine hostname: |
90 | of all the machines it scans if the server is older than version 2.9. | 79 | |
91 | This is because it opens a connection to the ssh port, reads the public | 80 | $ ssh-keyscan hostname |
92 | key, and drops the connection as soon as it gets the key. | 81 | |
82 | Find all hosts from the file ssh_hosts which have new or different keys | ||
83 | from those in the sorted file ssh_known_hosts: | ||
84 | |||
85 | $ ssh-keyscan -t rsa,dsa -f ssh_hosts | \ | ||
86 | sort -u - ssh_known_hosts | diff ssh_known_hosts - | ||
93 | 87 | ||
94 | SEE ALSO | 88 | SEE ALSO |
95 | ssh(1), sshd(8) | 89 | ssh(1), sshd(8) |
96 | 90 | ||
97 | AUTHORS | 91 | AUTHORS |
98 | David Mazieres <dm@lcs.mit.edu> wrote the initial version, and Wayne | 92 | David Mazieres M-bM-^LM-)dm@lcs.mit.eduM-bM-^LM-* wrote the initial version, and |
99 | Davison <wayned@users.sourceforge.net> added support for protocol version | 93 | Wayne Davison M-bM-^LM-)wayned@users.sourceforge.netM-bM-^LM-* added support for protocol |
100 | 2. | 94 | version 2. |
95 | |||
96 | BUGS | ||
97 | It generates "Connection closed by remote host" messages on the consoles | ||
98 | of all the machines it scans if the server is older than version 2.9. | ||
99 | This is because it opens a connection to the ssh port, reads the public | ||
100 | key, and drops the connection as soon as it gets the key. | ||
101 | 101 | ||
102 | BSD January 1, 1996 BSD | 102 | BSD January 1, 1996 BSD |