diff options
Diffstat (limited to 'ssh-keyscan.1')
-rw-r--r-- | ssh-keyscan.1 | 52 |
1 files changed, 30 insertions, 22 deletions
diff --git a/ssh-keyscan.1 b/ssh-keyscan.1 index 9efcf5213..7e846f77c 100644 --- a/ssh-keyscan.1 +++ b/ssh-keyscan.1 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ssh-keyscan.1,v 1.18 2004/07/12 23:34:25 brad Exp $ | 1 | .\" $OpenBSD: ssh-keyscan.1,v 1.20 2005/03/01 15:47:14 jmc Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. | 3 | .\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. |
4 | .\" | 4 | .\" |
@@ -15,11 +15,11 @@ | |||
15 | .Sh SYNOPSIS | 15 | .Sh SYNOPSIS |
16 | .Nm ssh-keyscan | 16 | .Nm ssh-keyscan |
17 | .Bk -words | 17 | .Bk -words |
18 | .Op Fl v46 | 18 | .Op Fl 46Hv |
19 | .Op Fl f Ar file | ||
19 | .Op Fl p Ar port | 20 | .Op Fl p Ar port |
20 | .Op Fl T Ar timeout | 21 | .Op Fl T Ar timeout |
21 | .Op Fl t Ar type | 22 | .Op Fl t Ar type |
22 | .Op Fl f Ar file | ||
23 | .Op Ar host | addrlist namelist | 23 | .Op Ar host | addrlist namelist |
24 | .Op Ar ... | 24 | .Op Ar ... |
25 | .Ek | 25 | .Ek |
@@ -46,6 +46,33 @@ scanning process involve any encryption. | |||
46 | .Pp | 46 | .Pp |
47 | The options are as follows: | 47 | The options are as follows: |
48 | .Bl -tag -width Ds | 48 | .Bl -tag -width Ds |
49 | .It Fl 4 | ||
50 | Forces | ||
51 | .Nm | ||
52 | to use IPv4 addresses only. | ||
53 | .It Fl 6 | ||
54 | Forces | ||
55 | .Nm | ||
56 | to use IPv6 addresses only. | ||
57 | .It Fl f Ar file | ||
58 | Read hosts or | ||
59 | .Pa addrlist namelist | ||
60 | pairs from this file, one per line. | ||
61 | If | ||
62 | .Pa - | ||
63 | is supplied instead of a filename, | ||
64 | .Nm | ||
65 | will read hosts or | ||
66 | .Pa addrlist namelist | ||
67 | pairs from the standard input. | ||
68 | .It Fl H | ||
69 | Hash all hostnames and addresses in the output. | ||
70 | Hashed names may be used normally by | ||
71 | .Nm ssh | ||
72 | and | ||
73 | .Nm sshd , | ||
74 | but they do not reveal identifying information should the file's contents | ||
75 | be disclosed. | ||
49 | .It Fl p Ar port | 76 | .It Fl p Ar port |
50 | Port to connect to on the remote host. | 77 | Port to connect to on the remote host. |
51 | .It Fl T Ar timeout | 78 | .It Fl T Ar timeout |
@@ -68,30 +95,11 @@ for protocol version 2. | |||
68 | Multiple values may be specified by separating them with commas. | 95 | Multiple values may be specified by separating them with commas. |
69 | The default is | 96 | The default is |
70 | .Dq rsa1 . | 97 | .Dq rsa1 . |
71 | .It Fl f Ar filename | ||
72 | Read hosts or | ||
73 | .Pa addrlist namelist | ||
74 | pairs from this file, one per line. | ||
75 | If | ||
76 | .Pa - | ||
77 | is supplied instead of a filename, | ||
78 | .Nm | ||
79 | will read hosts or | ||
80 | .Pa addrlist namelist | ||
81 | pairs from the standard input. | ||
82 | .It Fl v | 98 | .It Fl v |
83 | Verbose mode. | 99 | Verbose mode. |
84 | Causes | 100 | Causes |
85 | .Nm | 101 | .Nm |
86 | to print debugging messages about its progress. | 102 | to print debugging messages about its progress. |
87 | .It Fl 4 | ||
88 | Forces | ||
89 | .Nm | ||
90 | to use IPv4 addresses only. | ||
91 | .It Fl 6 | ||
92 | Forces | ||
93 | .Nm | ||
94 | to use IPv6 addresses only. | ||
95 | .El | 103 | .El |
96 | .Sh SECURITY | 104 | .Sh SECURITY |
97 | If a ssh_known_hosts file is constructed using | 105 | If a ssh_known_hosts file is constructed using |