2004-05-13 08:45:46 +02:00
|
|
|
.\" $OpenBSD: ssh-agent.1,v 1.40 2004/05/13 02:47:50 dtucker Exp $
|
1999-10-29 01:15:49 +02:00
|
|
|
.\"
|
|
|
|
.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
|
|
|
|
.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
|
|
|
.\" All rights reserved
|
|
|
|
.\"
|
2000-09-16 04:29:08 +02:00
|
|
|
.\" As far as I am concerned, the code I have written for this software
|
|
|
|
.\" can be used freely for any purpose. Any derived versions of this
|
|
|
|
.\" software must be clearly marked as such, and if the derived work is
|
|
|
|
.\" incompatible with the protocol description in the RFC file, it must be
|
|
|
|
.\" called by a name other than "ssh" or "Secure Shell".
|
|
|
|
.\"
|
2001-03-05 07:59:27 +01:00
|
|
|
.\" Copyright (c) 1999,2000 Markus Friedl. All rights reserved.
|
|
|
|
.\" Copyright (c) 1999 Aaron Campbell. All rights reserved.
|
|
|
|
.\" Copyright (c) 1999 Theo de Raadt. All rights reserved.
|
2000-09-16 04:29:08 +02:00
|
|
|
.\"
|
|
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
|
|
.\" modification, are permitted provided that the following conditions
|
|
|
|
.\" are met:
|
|
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
|
|
.\" documentation and/or other materials provided with the distribution.
|
|
|
|
.\"
|
|
|
|
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
1999-10-29 01:15:49 +02:00
|
|
|
.\"
|
|
|
|
.Dd September 25, 1999
|
|
|
|
.Dt SSH-AGENT 1
|
|
|
|
.Os
|
|
|
|
.Sh NAME
|
|
|
|
.Nm ssh-agent
|
|
|
|
.Nd authentication agent
|
|
|
|
.Sh SYNOPSIS
|
2000-04-13 04:26:34 +02:00
|
|
|
.Nm ssh-agent
|
2002-06-06 23:46:08 +02:00
|
|
|
.Op Fl a Ar bind_address
|
2000-11-21 22:24:55 +01:00
|
|
|
.Op Fl c Li | Fl s
|
2003-01-22 01:47:19 +01:00
|
|
|
.Op Fl t Ar life
|
2001-09-12 19:02:49 +02:00
|
|
|
.Op Fl d
|
|
|
|
.Op Ar command Op Ar args ...
|
2000-11-21 22:24:55 +01:00
|
|
|
.Nm ssh-agent
|
2001-09-12 19:02:49 +02:00
|
|
|
.Op Fl c Li | Fl s
|
2000-11-21 22:24:55 +01:00
|
|
|
.Fl k
|
2000-04-13 04:26:34 +02:00
|
|
|
.Sh DESCRIPTION
|
1999-10-29 01:15:49 +02:00
|
|
|
.Nm
|
2000-08-23 02:46:23 +02:00
|
|
|
is a program to hold private keys used for public key authentication
|
|
|
|
(RSA, DSA).
|
2000-03-26 05:04:51 +02:00
|
|
|
The idea is that
|
1999-10-29 01:15:49 +02:00
|
|
|
.Nm
|
|
|
|
is started in the beginning of an X-session or a login session, and
|
|
|
|
all other windows or programs are started as clients to the ssh-agent
|
2000-03-26 05:04:51 +02:00
|
|
|
program.
|
|
|
|
Through use of environment variables the agent can be located
|
2000-08-23 02:46:23 +02:00
|
|
|
and automatically used for authentication when logging in to other
|
1999-10-29 01:15:49 +02:00
|
|
|
machines using
|
|
|
|
.Xr ssh 1 .
|
|
|
|
.Pp
|
|
|
|
The options are as follows:
|
|
|
|
.Bl -tag -width Ds
|
2002-06-06 23:46:08 +02:00
|
|
|
.It Fl a Ar bind_address
|
|
|
|
Bind the agent to the unix-domain socket
|
|
|
|
.Ar bind_address .
|
|
|
|
The default is
|
2002-06-26 01:16:31 +02:00
|
|
|
.Pa /tmp/ssh-XXXXXXXX/agent.<ppid> .
|
1999-10-29 01:15:49 +02:00
|
|
|
.It Fl c
|
|
|
|
Generate C-shell commands on
|
|
|
|
.Dv stdout .
|
|
|
|
This is the default if
|
|
|
|
.Ev SHELL
|
|
|
|
looks like it's a csh style of shell.
|
|
|
|
.It Fl s
|
|
|
|
Generate Bourne shell commands on
|
|
|
|
.Dv stdout .
|
|
|
|
This is the default if
|
|
|
|
.Ev SHELL
|
|
|
|
does not look like it's a csh style of shell.
|
|
|
|
.It Fl k
|
|
|
|
Kill the current agent (given by the
|
|
|
|
.Ev SSH_AGENT_PID
|
|
|
|
environment variable).
|
2003-01-22 01:47:19 +01:00
|
|
|
.It Fl t Ar life
|
2003-04-01 13:42:14 +02:00
|
|
|
Set a default value for the maximum lifetime of identities added to the agent.
|
2003-01-22 01:47:19 +01:00
|
|
|
The lifetime may be specified in seconds or in a time format specified in
|
|
|
|
.Xr sshd 8 .
|
|
|
|
A lifetime specified for an identity with
|
|
|
|
.Xr ssh-add 1
|
|
|
|
overrides this value.
|
|
|
|
Without this option the default maximum lifetime is forever.
|
2001-07-04 05:48:02 +02:00
|
|
|
.It Fl d
|
2003-04-01 13:42:14 +02:00
|
|
|
Debug mode.
|
|
|
|
When this option is specified
|
2001-07-04 05:48:02 +02:00
|
|
|
.Nm
|
2001-07-18 17:51:00 +02:00
|
|
|
will not fork.
|
1999-10-29 01:15:49 +02:00
|
|
|
.El
|
|
|
|
.Pp
|
|
|
|
If a commandline is given, this is executed as a subprocess of the agent.
|
|
|
|
When the command dies, so does the agent.
|
|
|
|
.Pp
|
2000-03-26 05:04:51 +02:00
|
|
|
The agent initially does not have any private keys.
|
|
|
|
Keys are added using
|
1999-10-29 01:15:49 +02:00
|
|
|
.Xr ssh-add 1 .
|
2000-04-13 04:26:34 +02:00
|
|
|
When executed without arguments,
|
1999-10-29 01:15:49 +02:00
|
|
|
.Xr ssh-add 1
|
2002-02-05 02:24:19 +01:00
|
|
|
adds the files
|
|
|
|
.Pa $HOME/.ssh/id_rsa ,
|
2002-06-21 02:41:51 +02:00
|
|
|
.Pa $HOME/.ssh/id_dsa
|
2002-02-05 02:24:19 +01:00
|
|
|
and
|
|
|
|
.Pa $HOME/.ssh/identity .
|
2000-04-13 04:26:34 +02:00
|
|
|
If the identity has a passphrase,
|
1999-10-29 01:15:49 +02:00
|
|
|
.Xr ssh-add 1
|
|
|
|
asks for the passphrase (using a small X11 application if running
|
2000-03-26 05:04:51 +02:00
|
|
|
under X11, or from the terminal if running without X).
|
|
|
|
It then sends the identity to the agent.
|
|
|
|
Several identities can be stored in the
|
1999-10-29 01:15:49 +02:00
|
|
|
agent; the agent can automatically use any of these identities.
|
|
|
|
.Ic ssh-add -l
|
|
|
|
displays the identities currently held by the agent.
|
|
|
|
.Pp
|
|
|
|
The idea is that the agent is run in the user's local PC, laptop, or
|
2000-03-26 05:04:51 +02:00
|
|
|
terminal.
|
|
|
|
Authentication data need not be stored on any other
|
1999-10-29 01:15:49 +02:00
|
|
|
machine, and authentication passphrases never go over the network.
|
|
|
|
However, the connection to the agent is forwarded over SSH
|
|
|
|
remote logins, and the user can thus use the privileges given by the
|
|
|
|
identities anywhere in the network in a secure way.
|
|
|
|
.Pp
|
2003-05-15 02:16:21 +02:00
|
|
|
There are two main ways to get an agent set up:
|
2004-05-13 08:45:46 +02:00
|
|
|
The first is that the agent starts a new subcommand into which some environment
|
|
|
|
variables are exported, eg
|
|
|
|
.Cm ssh-agent xterm & .
|
|
|
|
The second is that the agent prints the needed shell commands (either
|
1999-10-29 01:15:49 +02:00
|
|
|
.Xr sh 1
|
|
|
|
or
|
|
|
|
.Xr csh 1
|
2004-05-13 08:45:46 +02:00
|
|
|
syntax can be generated) which can be evalled in the calling shell, eg
|
|
|
|
.Cm eval `ssh-agent -s`
|
|
|
|
for Bourne-type shells such as
|
|
|
|
.Xr sh 1
|
|
|
|
or
|
|
|
|
.Xr ksh 1
|
|
|
|
and
|
|
|
|
.Cm eval `ssh-agent -c`
|
|
|
|
for
|
|
|
|
.Xr csh 1
|
|
|
|
and derivatives.
|
|
|
|
.Pp
|
1999-10-29 01:15:49 +02:00
|
|
|
Later
|
|
|
|
.Xr ssh 1
|
2001-04-04 03:51:25 +02:00
|
|
|
looks at these variables and uses them to establish a connection to the agent.
|
1999-10-29 01:15:49 +02:00
|
|
|
.Pp
|
2001-12-06 17:37:51 +01:00
|
|
|
The agent will never send a private key over its request channel.
|
|
|
|
Instead, operations that require a private key will be performed
|
|
|
|
by the agent, and the result will be returned to the requester.
|
|
|
|
This way, private keys are not exposed to clients using the agent.
|
|
|
|
.Pp
|
1999-10-29 01:15:49 +02:00
|
|
|
A unix-domain socket is created
|
|
|
|
and the name of this socket is stored in the
|
|
|
|
.Ev SSH_AUTH_SOCK
|
|
|
|
environment
|
2000-03-26 05:04:51 +02:00
|
|
|
variable.
|
|
|
|
The socket is made accessible only to the current user.
|
1999-10-29 01:15:49 +02:00
|
|
|
This method is easily abused by root or another instance of the same
|
|
|
|
user.
|
|
|
|
.Pp
|
|
|
|
The
|
|
|
|
.Ev SSH_AGENT_PID
|
2002-06-23 02:35:25 +02:00
|
|
|
environment variable holds the agent's process ID.
|
1999-10-29 01:15:49 +02:00
|
|
|
.Pp
|
|
|
|
The agent exits automatically when the command given on the command
|
|
|
|
line terminates.
|
|
|
|
.Sh FILES
|
|
|
|
.Bl -tag -width Ds
|
|
|
|
.It Pa $HOME/.ssh/identity
|
2001-04-11 17:59:35 +02:00
|
|
|
Contains the protocol version 1 RSA authentication identity of the user.
|
2000-08-23 02:46:23 +02:00
|
|
|
.It Pa $HOME/.ssh/id_dsa
|
2001-04-11 17:59:35 +02:00
|
|
|
Contains the protocol version 2 DSA authentication identity of the user.
|
|
|
|
.It Pa $HOME/.ssh/id_rsa
|
|
|
|
Contains the protocol version 2 RSA authentication identity of the user.
|
2002-06-26 01:16:31 +02:00
|
|
|
.It Pa /tmp/ssh-XXXXXXXX/agent.<ppid>
|
1999-10-29 01:15:49 +02:00
|
|
|
Unix-domain sockets used to contain the connection to the
|
2000-03-26 05:04:51 +02:00
|
|
|
authentication agent.
|
|
|
|
These sockets should only be readable by the owner.
|
|
|
|
The sockets should get automatically removed when the agent exits.
|
2000-07-11 09:31:38 +02:00
|
|
|
.El
|
2003-06-11 14:04:39 +02:00
|
|
|
.Sh SEE ALSO
|
|
|
|
.Xr ssh 1 ,
|
|
|
|
.Xr ssh-add 1 ,
|
|
|
|
.Xr ssh-keygen 1 ,
|
|
|
|
.Xr sshd 8
|
2000-11-13 12:57:25 +01:00
|
|
|
.Sh AUTHORS
|
2001-01-29 09:34:16 +01:00
|
|
|
OpenSSH is a derivative of the original and free
|
|
|
|
ssh 1.2.12 release by Tatu Ylonen.
|
|
|
|
Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos,
|
|
|
|
Theo de Raadt and Dug Song
|
|
|
|
removed many bugs, re-added newer features and
|
|
|
|
created OpenSSH.
|
|
|
|
Markus Friedl contributed the support for SSH
|
|
|
|
protocol versions 1.5 and 2.0.
|