diff options
Diffstat (limited to 'ssh-keyscan.1')
-rw-r--r-- | ssh-keyscan.1 | 20 |
1 files changed, 13 insertions, 7 deletions
diff --git a/ssh-keyscan.1 b/ssh-keyscan.1 index 2f33ddf20..f6596c481 100644 --- a/ssh-keyscan.1 +++ b/ssh-keyscan.1 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ssh-keyscan.1,v 1.14 2002/02/13 08:33:47 mpech Exp $ | 1 | .\" $OpenBSD: ssh-keyscan.1,v 1.15 2003/03/28 10:11:43 jmc Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. | 3 | .\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. |
4 | .\" | 4 | .\" |
@@ -14,6 +14,7 @@ | |||
14 | .Nd gather ssh public keys | 14 | .Nd gather ssh public keys |
15 | .Sh SYNOPSIS | 15 | .Sh SYNOPSIS |
16 | .Nm ssh-keyscan | 16 | .Nm ssh-keyscan |
17 | .Bk -words | ||
17 | .Op Fl v46 | 18 | .Op Fl v46 |
18 | .Op Fl p Ar port | 19 | .Op Fl p Ar port |
19 | .Op Fl T Ar timeout | 20 | .Op Fl T Ar timeout |
@@ -21,10 +22,12 @@ | |||
21 | .Op Fl f Ar file | 22 | .Op Fl f Ar file |
22 | .Op Ar host | addrlist namelist | 23 | .Op Ar host | addrlist namelist |
23 | .Op Ar ... | 24 | .Op Ar ... |
25 | .Ek | ||
24 | .Sh DESCRIPTION | 26 | .Sh DESCRIPTION |
25 | .Nm | 27 | .Nm |
26 | is a utility for gathering the public ssh host keys of a number of | 28 | is a utility for gathering the public ssh host keys of a number of |
27 | hosts. It was designed to aid in building and verifying | 29 | hosts. |
30 | It was designed to aid in building and verifying | ||
28 | .Pa ssh_known_hosts | 31 | .Pa ssh_known_hosts |
29 | files. | 32 | files. |
30 | .Nm | 33 | .Nm |
@@ -33,9 +36,11 @@ scripts. | |||
33 | .Pp | 36 | .Pp |
34 | .Nm | 37 | .Nm |
35 | uses non-blocking socket I/O to contact as many hosts as possible in | 38 | uses non-blocking socket I/O to contact as many hosts as possible in |
36 | parallel, so it is very efficient. The keys from a domain of 1,000 | 39 | parallel, so it is very efficient. |
40 | The keys from a domain of 1,000 | ||
37 | hosts can be collected in tens of seconds, even when some of those | 41 | hosts can be collected in tens of seconds, even when some of those |
38 | hosts are down or do not run ssh. For scanning, one does not need | 42 | hosts are down or do not run ssh. |
43 | For scanning, one does not need | ||
39 | login access to the machines that are being scanned, nor does the | 44 | login access to the machines that are being scanned, nor does the |
40 | scanning process involve any encryption. | 45 | scanning process involve any encryption. |
41 | .Pp | 46 | .Pp |
@@ -44,12 +49,13 @@ The options are as follows: | |||
44 | .It Fl p Ar port | 49 | .It Fl p Ar port |
45 | Port to connect to on the remote host. | 50 | Port to connect to on the remote host. |
46 | .It Fl T Ar timeout | 51 | .It Fl T Ar timeout |
47 | Set the timeout for connection attempts. If | 52 | Set the timeout for connection attempts. |
53 | If | ||
48 | .Pa timeout | 54 | .Pa timeout |
49 | seconds have elapsed since a connection was initiated to a host or since the | 55 | seconds have elapsed since a connection was initiated to a host or since the |
50 | last time anything was read from that host, then the connection is | 56 | last time anything was read from that host, then the connection is |
51 | closed and the host in question considered unavailable. Default is 5 | 57 | closed and the host in question considered unavailable. |
52 | seconds. | 58 | Default is 5 seconds. |
53 | .It Fl t Ar type | 59 | .It Fl t Ar type |
54 | Specifies the type of the key to fetch from the scanned hosts. | 60 | Specifies the type of the key to fetch from the scanned hosts. |
55 | The possible values are | 61 | The possible values are |