summaryrefslogtreecommitdiff
path: root/ssh-keyscan.0
diff options
context:
space:
mode:
Diffstat (limited to 'ssh-keyscan.0')
-rw-r--r--ssh-keyscan.040
1 files changed, 20 insertions, 20 deletions
diff --git a/ssh-keyscan.0 b/ssh-keyscan.0
index 23d9f943c..19031a27f 100644
--- a/ssh-keyscan.0
+++ b/ssh-keyscan.0
@@ -57,6 +57,17 @@ SECURITY
57 detection of tampered keyfiles or man in the middle attacks which have 57 detection of tampered keyfiles or man in the middle attacks which have
58 begun after the ssh_known_hosts file was created. 58 begun after the ssh_known_hosts file was created.
59 59
60EXAMPLES
61 Print the rsa1 host key for machine hostname:
62
63 $ ssh-keyscan hostname
64
65 Find all hosts from the file ssh_hosts which have new or different keys
66 from those in the sorted file ssh_known_hosts:
67
68 $ ssh-keyscan -t rsa,dsa -f ssh_hosts | \
69 sort -u - ssh_known_hosts | diff ssh_known_hosts -
70
60FILES 71FILES
61 Input format: 72 Input format:
62 73
@@ -70,33 +81,22 @@ FILES
70 81
71 host-or-namelist keytype base64-encoded-key 82 host-or-namelist keytype base64-encoded-key
72 83
73 Where keytype is either M-bM-^@M-^\ssh-rsaM-bM-^@M-^] or M-bM-^@M-^\ssh-dssM-bM-^@M-^]. 84 Where keytype is either M-bM-^@M-^\ssh-rsaM-bM-^@M-^] or M-bM-^@M-^\ssh-dsaM-bM-^@M-^].
74 85
75 /etc/ssh/ssh_known_hosts 86 /etc/ssh/ssh_known_hosts
76 87
77EXAMPLES
78 Print the rsa1 host key for machine hostname:
79
80 $ ssh-keyscan hostname
81
82 Find all hosts from the file ssh_hosts which have new or different keys
83 from those in the sorted file ssh_known_hosts:
84
85 $ ssh-keyscan -t rsa,dsa -f ssh_hosts | \
86 sort -u - ssh_known_hosts | diff ssh_known_hosts -
87
88SEE ALSO
89 ssh(1), sshd(8)
90
91AUTHORS
92 David Mazieres M-bM-^LM-)dm@lcs.mit.eduM-bM-^LM-* wrote the initial version, and
93 Wayne Davison M-bM-^LM-)wayned@users.sourceforge.netM-bM-^LM-* added support for protocol
94 version 2.
95
96BUGS 88BUGS
97 It generates "Connection closed by remote host" messages on the consoles 89 It generates "Connection closed by remote host" messages on the consoles
98 of all the machines it scans if the server is older than version 2.9. 90 of all the machines it scans if the server is older than version 2.9.
99 This is because it opens a connection to the ssh port, reads the public 91 This is because it opens a connection to the ssh port, reads the public
100 key, and drops the connection as soon as it gets the key. 92 key, and drops the connection as soon as it gets the key.
101 93
94SEE ALSO
95 ssh(1), sshd(8)
96
97AUTHORS
98 David Mazieres <dm@lcs.mit.edu> wrote the initial version, and Wayne
99 Davison <wayned@users.sourceforge.net> added support for protocol version
100 2.
101
102BSD January 1, 1996 BSD 102BSD January 1, 1996 BSD