summaryrefslogtreecommitdiff
path: root/ssh-keyscan.0
diff options
context:
space:
mode:
Diffstat (limited to 'ssh-keyscan.0')
-rw-r--r--ssh-keyscan.027
1 files changed, 14 insertions, 13 deletions
diff --git a/ssh-keyscan.0 b/ssh-keyscan.0
index 23d9f943c..c1334378f 100644
--- a/ssh-keyscan.0
+++ b/ssh-keyscan.0
@@ -1,4 +1,4 @@
1SSH-KEYSCAN(1) BSD General Commands Manual SSH-KEYSCAN(1) 1SSH-KEYSCAN(1) OpenBSD Reference Manual SSH-KEYSCAN(1)
2 2
3NAME 3NAME
4 ssh-keyscan - gather ssh public keys 4 ssh-keyscan - gather ssh public keys
@@ -29,14 +29,15 @@ DESCRIPTION
29 Set the timeout for connection attempts. If timeout seconds have 29 Set the timeout for connection attempts. If timeout seconds have
30 elapsed since a connection was initiated to a host or since the 30 elapsed since a connection was initiated to a host or since the
31 last time anything was read from that host, then the connection 31 last time anything was read from that host, then the connection
32 is closed and the host in question considered unavailable. 32 is closed and the host in question considered unavailable. De-
33 Default is 5 seconds. 33 fault is 5 seconds.
34 34
35 -t type 35 -t type
36 Specifies the type of the key to fetch from the scanned hosts. 36 Specifies the type of the key to fetch from the scanned hosts.
37 The possible values are M-bM-^@M-^\rsa1M-bM-^@M-^] for protocol version 1 and M-bM-^@M-^\rsaM-bM-^@M-^] 37 The possible values are ``rsa1'' for protocol version 1 and
38 or M-bM-^@M-^\dsaM-bM-^@M-^] for protocol version 2. Multiple values may be speci- 38 ``rsa'' or ``dsa'' for protocol version 2. Multiple values may
39 fied by separating them with commas. The default is M-bM-^@M-^\rsa1M-bM-^@M-^]. 39 be specified by separating them with commas. The default is
40 ``rsa1''.
40 41
41 -f filename 42 -f filename
42 Read hosts or addrlist namelist pairs from this file, one per 43 Read hosts or addrlist namelist pairs from this file, one per
@@ -53,9 +54,9 @@ DESCRIPTION
53SECURITY 54SECURITY
54 If a ssh_known_hosts file is constructed using ssh-keyscan without veri- 55 If a ssh_known_hosts file is constructed using ssh-keyscan without veri-
55 fying the keys, users will be vulnerable to attacks. On the other hand, 56 fying the keys, users will be vulnerable to attacks. On the other hand,
56 if the security model allows such a risk, ssh-keyscan can help in the 57 if the security model allows such a risk, ssh-keyscan can help in the de-
57 detection of tampered keyfiles or man in the middle attacks which have 58 tection of tampered keyfiles or man in the middle attacks which have be-
58 begun after the ssh_known_hosts file was created. 59 gun after the ssh_known_hosts file was created.
59 60
60FILES 61FILES
61 Input format: 62 Input format:
@@ -70,7 +71,7 @@ FILES
70 71
71 host-or-namelist keytype base64-encoded-key 72 host-or-namelist keytype base64-encoded-key
72 73
73 Where keytype is either M-bM-^@M-^\ssh-rsaM-bM-^@M-^] or M-bM-^@M-^\ssh-dssM-bM-^@M-^]. 74 Where keytype is either ``ssh-rsa'' or ``ssh-dss''.
74 75
75 /etc/ssh/ssh_known_hosts 76 /etc/ssh/ssh_known_hosts
76 77
@@ -89,8 +90,8 @@ SEE ALSO
89 ssh(1), sshd(8) 90 ssh(1), sshd(8)
90 91
91AUTHORS 92AUTHORS
92 David Mazieres M-bM-^LM-)dm@lcs.mit.eduM-bM-^LM-* wrote the initial version, and 93 David Mazieres <dm@lcs.mit.edu> wrote the initial version, and
93 Wayne Davison M-bM-^LM-)wayned@users.sourceforge.netM-bM-^LM-* added support for protocol 94 Wayne Davison <wayned@users.sourceforge.net> added support for protocol
94 version 2. 95 version 2.
95 96
96BUGS 97BUGS
@@ -99,4 +100,4 @@ BUGS
99 This is because it opens a connection to the ssh port, reads the public 100 This is because it opens a connection to the ssh port, reads the public
100 key, and drops the connection as soon as it gets the key. 101 key, and drops the connection as soon as it gets the key.
101 102
102BSD January 1, 1996 BSD 103OpenBSD 3.5 January 1, 1996 2