summaryrefslogtreecommitdiff
path: root/ssh-keyscan.1
diff options
context:
space:
mode:
Diffstat (limited to 'ssh-keyscan.1')
-rw-r--r--ssh-keyscan.128
1 files changed, 14 insertions, 14 deletions
diff --git a/ssh-keyscan.1 b/ssh-keyscan.1
index 65ef43efd..dae4fd9fb 100644
--- a/ssh-keyscan.1
+++ b/ssh-keyscan.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-keyscan.1,v 1.33 2013/12/07 11:58:46 naddy Exp $ 1.\" $OpenBSD: ssh-keyscan.1,v 1.34 2014/01/28 14:13:39 jmc Exp $
2.\" 2.\"
3.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. 3.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>.
4.\" 4.\"
@@ -6,7 +6,7 @@
6.\" permitted provided that due credit is given to the author and the 6.\" permitted provided that due credit is given to the author and the
7.\" OpenBSD project by leaving this copyright notice intact. 7.\" OpenBSD project by leaving this copyright notice intact.
8.\" 8.\"
9.Dd $Mdocdate: December 7 2013 $ 9.Dd $Mdocdate: January 28 2014 $
10.Dt SSH-KEYSCAN 1 10.Dt SSH-KEYSCAN 1
11.Os 11.Os
12.Sh NAME 12.Sh NAME
@@ -56,14 +56,16 @@ Forces
56to use IPv6 addresses only. 56to use IPv6 addresses only.
57.It Fl f Ar file 57.It Fl f Ar file
58Read hosts or 58Read hosts or
59.Pa addrlist namelist 59.Dq addrlist namelist
60pairs from this file, one per line. 60pairs from
61.Ar file ,
62one per line.
61If 63If
62.Pa - 64.Pa -
63is supplied instead of a filename, 65is supplied instead of a filename,
64.Nm 66.Nm
65will read hosts or 67will read hosts or
66.Pa addrlist namelist 68.Dq addrlist namelist
67pairs from the standard input. 69pairs from the standard input.
68.It Fl H 70.It Fl H
69Hash all hostnames and addresses in the output. 71Hash all hostnames and addresses in the output.
@@ -78,7 +80,7 @@ Port to connect to on the remote host.
78.It Fl T Ar timeout 80.It Fl T Ar timeout
79Set the timeout for connection attempts. 81Set the timeout for connection attempts.
80If 82If
81.Pa timeout 83.Ar timeout
82seconds have elapsed since a connection was initiated to a host or since the 84seconds have elapsed since a connection was initiated to a host or since the
83last time anything was read from that host, then the connection is 85last time anything was read from that host, then the connection is
84closed and the host in question considered unavailable. 86closed and the host in question considered unavailable.
@@ -117,23 +119,23 @@ On the other hand, if the security model allows such a risk,
117can help in the detection of tampered keyfiles or man in the middle 119can help in the detection of tampered keyfiles or man in the middle
118attacks which have begun after the ssh_known_hosts file was created. 120attacks which have begun after the ssh_known_hosts file was created.
119.Sh FILES 121.Sh FILES
120.Pa Input format: 122Input format:
121.Bd -literal 123.Bd -literal
1221.2.3.4,1.2.4.4 name.my.domain,name,n.my.domain,n,1.2.3.4,1.2.4.4 1241.2.3.4,1.2.4.4 name.my.domain,name,n.my.domain,n,1.2.3.4,1.2.4.4
123.Ed 125.Ed
124.Pp 126.Pp
125.Pa Output format for rsa1 keys: 127Output format for rsa1 keys:
126.Bd -literal 128.Bd -literal
127host-or-namelist bits exponent modulus 129host-or-namelist bits exponent modulus
128.Ed 130.Ed
129.Pp 131.Pp
130.Pa Output format for rsa, dsa and ecdsa keys: 132Output format for rsa, dsa and ecdsa keys:
131.Bd -literal 133.Bd -literal
132host-or-namelist keytype base64-encoded-key 134host-or-namelist keytype base64-encoded-key
133.Ed 135.Ed
134.Pp 136.Pp
135Where 137Where
136.Pa keytype 138.Ar keytype
137is either 139is either
138.Dq ecdsa-sha2-nistp256 , 140.Dq ecdsa-sha2-nistp256 ,
139.Dq ecdsa-sha2-nistp384 , 141.Dq ecdsa-sha2-nistp384 ,
@@ -145,10 +147,8 @@ or
145.Pp 147.Pp
146.Pa /etc/ssh/ssh_known_hosts 148.Pa /etc/ssh/ssh_known_hosts
147.Sh EXAMPLES 149.Sh EXAMPLES
148Print the 150Print the rsa host key for machine
149.Pa rsa 151.Ar hostname :
150host key for machine
151.Pa hostname :
152.Bd -literal 152.Bd -literal
153$ ssh-keyscan hostname 153$ ssh-keyscan hostname
154.Ed 154.Ed