2014-08-30 17:33:50 +02:00
|
|
|
.\" $OpenBSD: ssh-keyscan.1,v 1.36 2014/08/30 15:33:50 sobrado Exp $
|
2001-03-05 07:50:47 +01:00
|
|
|
.\"
|
|
|
|
.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>.
|
|
|
|
.\"
|
|
|
|
.\" Modification and redistribution in source and binary forms is
|
|
|
|
.\" permitted provided that due credit is given to the author and the
|
2001-06-09 03:30:39 +02:00
|
|
|
.\" OpenBSD project by leaving this copyright notice intact.
|
2001-01-29 08:39:26 +01:00
|
|
|
.\"
|
2014-08-30 17:33:50 +02:00
|
|
|
.Dd $Mdocdate: August 30 2014 $
|
2001-03-05 07:50:47 +01:00
|
|
|
.Dt SSH-KEYSCAN 1
|
2000-12-05 02:15:09 +01:00
|
|
|
.Os
|
|
|
|
.Sh NAME
|
|
|
|
.Nm ssh-keyscan
|
|
|
|
.Nd gather ssh public keys
|
|
|
|
.Sh SYNOPSIS
|
|
|
|
.Nm ssh-keyscan
|
2003-04-01 13:42:14 +02:00
|
|
|
.Bk -words
|
2005-03-02 02:04:01 +01:00
|
|
|
.Op Fl 46Hv
|
|
|
|
.Op Fl f Ar file
|
2001-08-07 00:41:30 +02:00
|
|
|
.Op Fl p Ar port
|
|
|
|
.Op Fl T Ar timeout
|
|
|
|
.Op Fl t Ar type
|
|
|
|
.Op Ar host | addrlist namelist
|
2008-11-03 09:27:07 +01:00
|
|
|
.Ar ...
|
2003-04-01 13:42:14 +02:00
|
|
|
.Ek
|
2000-12-05 02:15:09 +01:00
|
|
|
.Sh DESCRIPTION
|
|
|
|
.Nm
|
|
|
|
is a utility for gathering the public ssh host keys of a number of
|
2003-04-01 13:42:14 +02:00
|
|
|
hosts.
|
|
|
|
It was designed to aid in building and verifying
|
2000-12-05 02:15:09 +01:00
|
|
|
.Pa ssh_known_hosts
|
|
|
|
files.
|
|
|
|
.Nm
|
|
|
|
provides a minimal interface suitable for use by shell and perl
|
|
|
|
scripts.
|
|
|
|
.Pp
|
|
|
|
.Nm
|
|
|
|
uses non-blocking socket I/O to contact as many hosts as possible in
|
2003-04-01 13:42:14 +02:00
|
|
|
parallel, so it is very efficient.
|
|
|
|
The keys from a domain of 1,000
|
2000-12-05 02:15:09 +01:00
|
|
|
hosts can be collected in tens of seconds, even when some of those
|
2003-04-01 13:42:14 +02:00
|
|
|
hosts are down or do not run ssh.
|
|
|
|
For scanning, one does not need
|
2001-09-12 20:35:30 +02:00
|
|
|
login access to the machines that are being scanned, nor does the
|
|
|
|
scanning process involve any encryption.
|
2001-08-07 00:01:29 +02:00
|
|
|
.Pp
|
|
|
|
The options are as follows:
|
2000-12-05 02:15:09 +01:00
|
|
|
.Bl -tag -width Ds
|
2005-03-02 02:04:01 +01:00
|
|
|
.It Fl 4
|
|
|
|
Forces
|
|
|
|
.Nm
|
|
|
|
to use IPv4 addresses only.
|
|
|
|
.It Fl 6
|
|
|
|
Forces
|
|
|
|
.Nm
|
|
|
|
to use IPv6 addresses only.
|
|
|
|
.It Fl f Ar file
|
|
|
|
Read hosts or
|
2014-02-04 01:09:12 +01:00
|
|
|
.Dq addrlist namelist
|
|
|
|
pairs from
|
|
|
|
.Ar file ,
|
|
|
|
one per line.
|
2005-03-02 02:04:01 +01:00
|
|
|
If
|
|
|
|
.Pa -
|
|
|
|
is supplied instead of a filename,
|
|
|
|
.Nm
|
|
|
|
will read hosts or
|
2014-02-04 01:09:12 +01:00
|
|
|
.Dq addrlist namelist
|
2005-03-02 02:04:01 +01:00
|
|
|
pairs from the standard input.
|
2005-03-01 11:48:03 +01:00
|
|
|
.It Fl H
|
|
|
|
Hash all hostnames and addresses in the output.
|
|
|
|
Hashed names may be used normally by
|
|
|
|
.Nm ssh
|
|
|
|
and
|
|
|
|
.Nm sshd ,
|
|
|
|
but they do not reveal identifying information should the file's contents
|
|
|
|
be disclosed.
|
2001-08-07 00:41:30 +02:00
|
|
|
.It Fl p Ar port
|
|
|
|
Port to connect to on the remote host.
|
2001-09-12 19:06:13 +02:00
|
|
|
.It Fl T Ar timeout
|
2003-04-01 13:42:14 +02:00
|
|
|
Set the timeout for connection attempts.
|
|
|
|
If
|
2014-02-04 01:09:12 +01:00
|
|
|
.Ar timeout
|
2000-12-05 02:15:09 +01:00
|
|
|
seconds have elapsed since a connection was initiated to a host or since the
|
|
|
|
last time anything was read from that host, then the connection is
|
2003-04-01 13:42:14 +02:00
|
|
|
closed and the host in question considered unavailable.
|
|
|
|
Default is 5 seconds.
|
2001-08-07 00:41:30 +02:00
|
|
|
.It Fl t Ar type
|
2001-09-12 19:06:13 +02:00
|
|
|
Specifies the type of the key to fetch from the scanned hosts.
|
2001-08-07 00:41:30 +02:00
|
|
|
The possible values are
|
|
|
|
.Dq rsa1
|
|
|
|
for protocol version 1 and
|
2010-08-31 14:41:14 +02:00
|
|
|
.Dq dsa ,
|
2013-12-18 07:46:27 +01:00
|
|
|
.Dq ecdsa ,
|
|
|
|
.Dq ed25519 ,
|
2001-08-07 00:41:30 +02:00
|
|
|
or
|
2010-08-31 14:41:14 +02:00
|
|
|
.Dq rsa
|
2001-08-07 00:41:30 +02:00
|
|
|
for protocol version 2.
|
|
|
|
Multiple values may be specified by separating them with commas.
|
2012-04-22 03:24:21 +02:00
|
|
|
The default is to fetch
|
2014-04-20 05:00:51 +02:00
|
|
|
.Dq rsa ,
|
|
|
|
.Dq ecdsa ,
|
2012-04-22 03:24:21 +02:00
|
|
|
and
|
2014-04-20 05:00:51 +02:00
|
|
|
.Dq ed25519
|
2012-04-22 03:24:21 +02:00
|
|
|
keys.
|
2001-08-07 00:41:30 +02:00
|
|
|
.It Fl v
|
|
|
|
Verbose mode.
|
|
|
|
Causes
|
|
|
|
.Nm
|
|
|
|
to print debugging messages about its progress.
|
2001-01-06 16:18:16 +01:00
|
|
|
.El
|
2001-08-07 00:01:29 +02:00
|
|
|
.Sh SECURITY
|
2006-10-17 23:53:06 +02:00
|
|
|
If an ssh_known_hosts file is constructed using
|
2001-08-07 00:01:29 +02:00
|
|
|
.Nm
|
2001-09-12 20:35:30 +02:00
|
|
|
without verifying the keys, users will be vulnerable to
|
2004-07-17 08:13:15 +02:00
|
|
|
.Em man in the middle
|
2001-08-07 00:01:29 +02:00
|
|
|
attacks.
|
2001-09-12 20:35:30 +02:00
|
|
|
On the other hand, if the security model allows such a risk,
|
2001-08-07 00:01:29 +02:00
|
|
|
.Nm
|
2001-09-12 20:35:30 +02:00
|
|
|
can help in the detection of tampered keyfiles or man in the middle
|
|
|
|
attacks which have begun after the ssh_known_hosts file was created.
|
2000-12-05 02:15:09 +01:00
|
|
|
.Sh FILES
|
2014-02-04 01:09:12 +01:00
|
|
|
Input format:
|
2001-08-07 00:41:30 +02:00
|
|
|
.Bd -literal
|
2000-12-05 02:15:09 +01:00
|
|
|
1.2.3.4,1.2.4.4 name.my.domain,name,n.my.domain,n,1.2.3.4,1.2.4.4
|
2001-08-07 00:41:30 +02:00
|
|
|
.Ed
|
2000-12-05 02:15:09 +01:00
|
|
|
.Pp
|
2014-04-20 05:00:51 +02:00
|
|
|
Output format for RSA1 keys:
|
2001-08-07 00:41:30 +02:00
|
|
|
.Bd -literal
|
2000-12-05 02:15:09 +01:00
|
|
|
host-or-namelist bits exponent modulus
|
2001-08-07 00:41:30 +02:00
|
|
|
.Ed
|
|
|
|
.Pp
|
2014-08-30 17:33:50 +02:00
|
|
|
Output format for RSA, DSA, ECDSA, and Ed25519 keys:
|
2001-08-07 00:41:30 +02:00
|
|
|
.Bd -literal
|
|
|
|
host-or-namelist keytype base64-encoded-key
|
|
|
|
.Ed
|
|
|
|
.Pp
|
|
|
|
Where
|
2014-02-04 01:09:12 +01:00
|
|
|
.Ar keytype
|
2001-08-07 00:41:30 +02:00
|
|
|
is either
|
2010-08-31 14:41:14 +02:00
|
|
|
.Dq ecdsa-sha2-nistp256 ,
|
|
|
|
.Dq ecdsa-sha2-nistp384 ,
|
|
|
|
.Dq ecdsa-sha2-nistp521 ,
|
2013-12-07 01:24:01 +01:00
|
|
|
.Dq ssh-ed25519 ,
|
2010-08-31 14:41:14 +02:00
|
|
|
.Dq ssh-dss
|
2001-08-07 00:41:30 +02:00
|
|
|
or
|
2010-08-31 14:41:14 +02:00
|
|
|
.Dq ssh-rsa .
|
2000-12-05 02:15:09 +01:00
|
|
|
.Pp
|
2002-02-10 08:32:28 +01:00
|
|
|
.Pa /etc/ssh/ssh_known_hosts
|
2003-06-11 14:04:39 +02:00
|
|
|
.Sh EXAMPLES
|
2014-02-04 01:09:12 +01:00
|
|
|
Print the rsa host key for machine
|
|
|
|
.Ar hostname :
|
2003-06-11 14:04:39 +02:00
|
|
|
.Bd -literal
|
|
|
|
$ ssh-keyscan hostname
|
|
|
|
.Ed
|
|
|
|
.Pp
|
|
|
|
Find all hosts from the file
|
|
|
|
.Pa ssh_hosts
|
|
|
|
which have new or different keys from those in the sorted file
|
|
|
|
.Pa ssh_known_hosts :
|
|
|
|
.Bd -literal
|
2014-04-20 05:00:51 +02:00
|
|
|
$ ssh-keyscan -t rsa,dsa,ecdsa,ed25519 -f ssh_hosts | \e
|
2003-06-11 14:04:39 +02:00
|
|
|
sort -u - ssh_known_hosts | diff ssh_known_hosts -
|
|
|
|
.Ed
|
2000-12-05 02:15:09 +01:00
|
|
|
.Sh SEE ALSO
|
2001-03-05 07:50:47 +01:00
|
|
|
.Xr ssh 1 ,
|
2000-12-05 02:15:09 +01:00
|
|
|
.Xr sshd 8
|
2001-06-25 06:10:54 +02:00
|
|
|
.Sh AUTHORS
|
2005-10-03 10:20:28 +02:00
|
|
|
.An -nosplit
|
2013-07-18 08:14:13 +02:00
|
|
|
.An David Mazieres Aq Mt dm@lcs.mit.edu
|
2001-08-07 00:41:30 +02:00
|
|
|
wrote the initial version, and
|
2013-07-18 08:14:13 +02:00
|
|
|
.An Wayne Davison Aq Mt wayned@users.sourceforge.net
|
2001-08-07 00:41:30 +02:00
|
|
|
added support for protocol version 2.
|
2003-06-11 14:04:39 +02:00
|
|
|
.Sh BUGS
|
|
|
|
It generates "Connection closed by remote host" messages on the consoles
|
|
|
|
of all the machines it scans if the server is older than version 2.9.
|
|
|
|
This is because it opens a connection to the ssh port, reads the public
|
|
|
|
key, and drops the connection as soon as it gets the key.
|