summaryrefslogtreecommitdiff
path: root/ssh-keyscan.0
diff options
context:
space:
mode:
Diffstat (limited to 'ssh-keyscan.0')
-rw-r--r--ssh-keyscan.027
1 files changed, 13 insertions, 14 deletions
diff --git a/ssh-keyscan.0 b/ssh-keyscan.0
index 67dbc1152..23d9f943c 100644
--- a/ssh-keyscan.0
+++ b/ssh-keyscan.0
@@ -1,4 +1,4 @@
1SSH-KEYSCAN(1) OpenBSD Reference Manual SSH-KEYSCAN(1) 1SSH-KEYSCAN(1) BSD General Commands Manual SSH-KEYSCAN(1)
2 2
3NAME 3NAME
4 ssh-keyscan - gather ssh public keys 4 ssh-keyscan - gather ssh public keys
@@ -29,15 +29,14 @@ DESCRIPTION
29 Set the timeout for connection attempts. If timeout seconds have 29 Set the timeout for connection attempts. If timeout seconds have
30 elapsed since a connection was initiated to a host or since the 30 elapsed since a connection was initiated to a host or since the
31 last time anything was read from that host, then the connection 31 last time anything was read from that host, then the connection
32 is closed and the host in question considered unavailable. De- 32 is closed and the host in question considered unavailable.
33 fault is 5 seconds. 33 Default is 5 seconds.
34 34
35 -t type 35 -t type
36 Specifies the type of the key to fetch from the scanned hosts. 36 Specifies the type of the key to fetch from the scanned hosts.
37 The possible values are ``rsa1'' for protocol version 1 and 37 The possible values are M-bM-^@M-^\rsa1M-bM-^@M-^] for protocol version 1 and M-bM-^@M-^\rsaM-bM-^@M-^]
38 ``rsa'' or ``dsa'' for protocol version 2. Multiple values may 38 or M-bM-^@M-^\dsaM-bM-^@M-^] for protocol version 2. Multiple values may be speci-
39 be specified by separating them with commas. The default is 39 fied by separating them with commas. The default is M-bM-^@M-^\rsa1M-bM-^@M-^].
40 ``rsa1''.
41 40
42 -f filename 41 -f filename
43 Read hosts or addrlist namelist pairs from this file, one per 42 Read hosts or addrlist namelist pairs from this file, one per
@@ -54,9 +53,9 @@ DESCRIPTION
54SECURITY 53SECURITY
55 If a ssh_known_hosts file is constructed using ssh-keyscan without veri- 54 If a ssh_known_hosts file is constructed using ssh-keyscan without veri-
56 fying the keys, users will be vulnerable to attacks. On the other hand, 55 fying the keys, users will be vulnerable to attacks. On the other hand,
57 if the security model allows such a risk, ssh-keyscan can help in the de- 56 if the security model allows such a risk, ssh-keyscan can help in the
58 tection of tampered keyfiles or man in the middle attacks which have be- 57 detection of tampered keyfiles or man in the middle attacks which have
59 gun after the ssh_known_hosts file was created. 58 begun after the ssh_known_hosts file was created.
60 59
61FILES 60FILES
62 Input format: 61 Input format:
@@ -71,7 +70,7 @@ FILES
71 70
72 host-or-namelist keytype base64-encoded-key 71 host-or-namelist keytype base64-encoded-key
73 72
74 Where keytype is either ``ssh-rsa'' or ``ssh-dss''. 73 Where keytype is either M-bM-^@M-^\ssh-rsaM-bM-^@M-^] or M-bM-^@M-^\ssh-dssM-bM-^@M-^].
75 74
76 /etc/ssh/ssh_known_hosts 75 /etc/ssh/ssh_known_hosts
77 76
@@ -90,8 +89,8 @@ SEE ALSO
90 ssh(1), sshd(8) 89 ssh(1), sshd(8)
91 90
92AUTHORS 91AUTHORS
93 David Mazieres <dm@lcs.mit.edu> wrote the initial version, and 92 David Mazieres M-bM-^LM-)dm@lcs.mit.eduM-bM-^LM-* wrote the initial version, and
94 Wayne Davison <wayned@users.sourceforge.net> added support for protocol 93 Wayne Davison M-bM-^LM-)wayned@users.sourceforge.netM-bM-^LM-* added support for protocol
95 version 2. 94 version 2.
96 95
97BUGS 96BUGS
@@ -100,4 +99,4 @@ BUGS
100 This is because it opens a connection to the ssh port, reads the public 99 This is because it opens a connection to the ssh port, reads the public
101 key, and drops the connection as soon as it gets the key. 100 key, and drops the connection as soon as it gets the key.
102 101
103OpenBSD 3.4 January 1, 1996 2 102BSD January 1, 1996 BSD