diff options
Diffstat (limited to 'ssh-keyscan.1')
-rw-r--r-- | ssh-keyscan.1 | 53 |
1 files changed, 26 insertions, 27 deletions
diff --git a/ssh-keyscan.1 b/ssh-keyscan.1 index f6596c481..572751f66 100644 --- a/ssh-keyscan.1 +++ b/ssh-keyscan.1 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ssh-keyscan.1,v 1.15 2003/03/28 10:11:43 jmc Exp $ | 1 | .\" $OpenBSD: ssh-keyscan.1,v 1.17 2003/06/10 09:12:11 jmc Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. | 3 | .\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. |
4 | .\" | 4 | .\" |
@@ -103,24 +103,6 @@ On the other hand, if the security model allows such a risk, | |||
103 | .Nm | 103 | .Nm |
104 | can help in the detection of tampered keyfiles or man in the middle | 104 | can help in the detection of tampered keyfiles or man in the middle |
105 | attacks which have begun after the ssh_known_hosts file was created. | 105 | attacks which have begun after the ssh_known_hosts file was created. |
106 | .Sh EXAMPLES | ||
107 | .Pp | ||
108 | Print the | ||
109 | .Pa rsa1 | ||
110 | host key for machine | ||
111 | .Pa hostname : | ||
112 | .Bd -literal | ||
113 | $ ssh-keyscan hostname | ||
114 | .Ed | ||
115 | .Pp | ||
116 | Find all hosts from the file | ||
117 | .Pa ssh_hosts | ||
118 | which have new or different keys from those in the sorted file | ||
119 | .Pa ssh_known_hosts : | ||
120 | .Bd -literal | ||
121 | $ ssh-keyscan -t rsa,dsa -f ssh_hosts | \e\ | ||
122 | sort -u - ssh_known_hosts | diff ssh_known_hosts - | ||
123 | .Ed | ||
124 | .Sh FILES | 106 | .Sh FILES |
125 | .Pa Input format: | 107 | .Pa Input format: |
126 | .Bd -literal | 108 | .Bd -literal |
@@ -142,19 +124,36 @@ Where | |||
142 | is either | 124 | is either |
143 | .Dq ssh-rsa | 125 | .Dq ssh-rsa |
144 | or | 126 | or |
145 | .Dq ssh-dsa . | 127 | .Dq ssh-dss . |
146 | .Pp | 128 | .Pp |
147 | .Pa /etc/ssh/ssh_known_hosts | 129 | .Pa /etc/ssh/ssh_known_hosts |
148 | .Sh BUGS | 130 | .Sh EXAMPLES |
149 | It generates "Connection closed by remote host" messages on the consoles | 131 | Print the |
150 | of all the machines it scans if the server is older than version 2.9. | 132 | .Pa rsa1 |
151 | This is because it opens a connection to the ssh port, reads the public | 133 | host key for machine |
152 | key, and drops the connection as soon as it gets the key. | 134 | .Pa hostname : |
135 | .Bd -literal | ||
136 | $ ssh-keyscan hostname | ||
137 | .Ed | ||
138 | .Pp | ||
139 | Find all hosts from the file | ||
140 | .Pa ssh_hosts | ||
141 | which have new or different keys from those in the sorted file | ||
142 | .Pa ssh_known_hosts : | ||
143 | .Bd -literal | ||
144 | $ ssh-keyscan -t rsa,dsa -f ssh_hosts | \e | ||
145 | sort -u - ssh_known_hosts | diff ssh_known_hosts - | ||
146 | .Ed | ||
153 | .Sh SEE ALSO | 147 | .Sh SEE ALSO |
154 | .Xr ssh 1 , | 148 | .Xr ssh 1 , |
155 | .Xr sshd 8 | 149 | .Xr sshd 8 |
156 | .Sh AUTHORS | 150 | .Sh AUTHORS |
157 | David Mazieres <dm@lcs.mit.edu> | 151 | .An David Mazieres Aq dm@lcs.mit.edu |
158 | wrote the initial version, and | 152 | wrote the initial version, and |
159 | Wayne Davison <wayned@users.sourceforge.net> | 153 | .An Wayne Davison Aq wayned@users.sourceforge.net |
160 | added support for protocol version 2. | 154 | added support for protocol version 2. |
155 | .Sh BUGS | ||
156 | It generates "Connection closed by remote host" messages on the consoles | ||
157 | of all the machines it scans if the server is older than version 2.9. | ||
158 | This is because it opens a connection to the ssh port, reads the public | ||
159 | key, and drops the connection as soon as it gets the key. | ||