mirror of
https://github.com/PowerShell/openssh-portable.git
synced 2025-07-29 08:44:52 +02:00
- jmc@cvs.openbsd.org 2005/03/01 18:15:56
[ssh-keygen.1] sort options (no attempt made at synopsis clean up though); spelling (occurance -> occurrence); use prompt before examples; grammar;
This commit is contained in:
parent
792c01749a
commit
265d309ebc
@ -29,6 +29,12 @@
|
|||||||
- jmc@cvs.openbsd.org 2005/03/01 17:32:19
|
- jmc@cvs.openbsd.org 2005/03/01 17:32:19
|
||||||
[ssh-add.1]
|
[ssh-add.1]
|
||||||
sort options;
|
sort options;
|
||||||
|
- jmc@cvs.openbsd.org 2005/03/01 18:15:56
|
||||||
|
[ssh-keygen.1]
|
||||||
|
sort options (no attempt made at synopsis clean up though);
|
||||||
|
spelling (occurance -> occurrence);
|
||||||
|
use prompt before examples;
|
||||||
|
grammar;
|
||||||
|
|
||||||
20050301
|
20050301
|
||||||
- (djm) OpenBSD CVS sync:
|
- (djm) OpenBSD CVS sync:
|
||||||
@ -2248,4 +2254,4 @@
|
|||||||
- (djm) Trim deprecated options from INSTALL. Mention UsePAM
|
- (djm) Trim deprecated options from INSTALL. Mention UsePAM
|
||||||
- (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
|
- (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
|
||||||
|
|
||||||
$Id: ChangeLog,v 1.3683 2005/03/02 01:04:50 djm Exp $
|
$Id: ChangeLog,v 1.3684 2005/03/02 01:05:06 djm Exp $
|
||||||
|
134
ssh-keygen.1
134
ssh-keygen.1
@ -1,4 +1,4 @@
|
|||||||
.\" $OpenBSD: ssh-keygen.1,v 1.65 2005/03/01 15:05:00 jmc Exp $
|
.\" $OpenBSD: ssh-keygen.1,v 1.66 2005/03/01 18:15:56 jmc Exp $
|
||||||
.\"
|
.\"
|
||||||
.\" -*- nroff -*-
|
.\" -*- nroff -*-
|
||||||
.\"
|
.\"
|
||||||
@ -183,16 +183,23 @@ Specifies the number of primality tests to perform when screening DH-GEX
|
|||||||
candidates using the
|
candidates using the
|
||||||
.Fl T
|
.Fl T
|
||||||
command.
|
command.
|
||||||
|
.It Fl B
|
||||||
|
Show the bubblebabble digest of specified private or public key file.
|
||||||
.It Fl b Ar bits
|
.It Fl b Ar bits
|
||||||
Specifies the number of bits in the key to create.
|
Specifies the number of bits in the key to create.
|
||||||
Minimum is 512 bits.
|
Minimum is 512 bits.
|
||||||
Generally, 1024 bits is considered sufficient.
|
Generally, 1024 bits is considered sufficient.
|
||||||
The default is 1024 bits.
|
The default is 1024 bits.
|
||||||
|
.It Fl C Ar comment
|
||||||
|
Provides a new comment.
|
||||||
.It Fl c
|
.It Fl c
|
||||||
Requests changing the comment in the private and public key files.
|
Requests changing the comment in the private and public key files.
|
||||||
This operation is only supported for RSA1 keys.
|
This operation is only supported for RSA1 keys.
|
||||||
The program will prompt for the file containing the private keys, for
|
The program will prompt for the file containing the private keys, for
|
||||||
the passphrase if the key has one, and for the new comment.
|
the passphrase if the key has one, and for the new comment.
|
||||||
|
.It Fl D Ar reader
|
||||||
|
Download the RSA public key stored in the smartcard in
|
||||||
|
.Ar reader .
|
||||||
.It Fl e
|
.It Fl e
|
||||||
This option will read a private or public OpenSSH key file and
|
This option will read a private or public OpenSSH key file and
|
||||||
print the key in a
|
print the key in a
|
||||||
@ -200,12 +207,41 @@ print the key in a
|
|||||||
to stdout.
|
to stdout.
|
||||||
This option allows exporting keys for use by several commercial
|
This option allows exporting keys for use by several commercial
|
||||||
SSH implementations.
|
SSH implementations.
|
||||||
|
.It Fl F Ar hostname
|
||||||
|
Search for the specified
|
||||||
|
.Ar hostname
|
||||||
|
in a
|
||||||
|
.Pa known_hosts
|
||||||
|
file, listing any occurrences found.
|
||||||
|
This option is useful to find hashed host names or addresses and may also be
|
||||||
|
used in conjunction with the
|
||||||
|
.Fl H
|
||||||
|
option to print found keys in a hashed format.
|
||||||
|
.It Fl f Ar filename
|
||||||
|
Specifies the filename of the key file.
|
||||||
|
.It Fl G Ar output_file
|
||||||
|
Generate candidate primes for DH-GEX.
|
||||||
|
These primes must be screened for
|
||||||
|
safety (using the
|
||||||
|
.Fl T
|
||||||
|
option) before use.
|
||||||
.It Fl g
|
.It Fl g
|
||||||
Use generic DNS format when printing fingerprint resource records using the
|
Use generic DNS format when printing fingerprint resource records using the
|
||||||
.Fl r
|
.Fl r
|
||||||
command.
|
command.
|
||||||
.It Fl f Ar filename
|
.It Fl H
|
||||||
Specifies the filename of the key file.
|
Hash a
|
||||||
|
.Pa known_hosts
|
||||||
|
file, printing the result to standard output.
|
||||||
|
This replaces all hostnames and addresses with hashed representations.
|
||||||
|
These hashes may be used normally by
|
||||||
|
.Nm ssh
|
||||||
|
and
|
||||||
|
.Nm sshd ,
|
||||||
|
but they do not reveal identifying information should the file's contents
|
||||||
|
be disclosed.
|
||||||
|
This option will not modify existing hashed hostnames and is therefore safe
|
||||||
|
to use on files that mix hashed and non-hashed names.
|
||||||
.It Fl i
|
.It Fl i
|
||||||
This option will read an unencrypted private (or public) key file
|
This option will read an unencrypted private (or public) key file
|
||||||
in SSH2-compatible format and print an OpenSSH compatible private
|
in SSH2-compatible format and print an OpenSSH compatible private
|
||||||
@ -221,6 +257,13 @@ Private RSA1 keys are also supported.
|
|||||||
For RSA and DSA keys
|
For RSA and DSA keys
|
||||||
.Nm
|
.Nm
|
||||||
tries to find the matching public key file and prints its fingerprint.
|
tries to find the matching public key file and prints its fingerprint.
|
||||||
|
.It Fl M Ar memory
|
||||||
|
Specify the amount of memory to use (in megabytes) when generating
|
||||||
|
candidate moduli for DH-GEX.
|
||||||
|
.It Fl N Ar new_passphrase
|
||||||
|
Provides the new passphrase.
|
||||||
|
.It Fl P Ar passphrase
|
||||||
|
Provides the (old) passphrase.
|
||||||
.It Fl p
|
.It Fl p
|
||||||
Requests changing the passphrase of a private key file instead of
|
Requests changing the passphrase of a private key file instead of
|
||||||
creating a new private key.
|
creating a new private key.
|
||||||
@ -233,48 +276,6 @@ Silence
|
|||||||
Used by
|
Used by
|
||||||
.Pa /etc/rc
|
.Pa /etc/rc
|
||||||
when creating a new key.
|
when creating a new key.
|
||||||
.It Fl y
|
|
||||||
This option will read a private
|
|
||||||
OpenSSH format file and print an OpenSSH public key to stdout.
|
|
||||||
.It Fl t Ar type
|
|
||||||
Specifies the type of the key to create.
|
|
||||||
The possible values are
|
|
||||||
.Dq rsa1
|
|
||||||
for protocol version 1 and
|
|
||||||
.Dq rsa
|
|
||||||
or
|
|
||||||
.Dq dsa
|
|
||||||
for protocol version 2.
|
|
||||||
.It Fl B
|
|
||||||
Show the bubblebabble digest of specified private or public key file.
|
|
||||||
.It Fl C Ar comment
|
|
||||||
Provides the new comment.
|
|
||||||
.It Fl D Ar reader
|
|
||||||
Download the RSA public key stored in the smartcard in
|
|
||||||
.Ar reader .
|
|
||||||
.It Fl F Ar hostname
|
|
||||||
Search for the specified
|
|
||||||
.Ar hostname
|
|
||||||
in a
|
|
||||||
.Pa known_hosts
|
|
||||||
file, listing any occurances found.
|
|
||||||
This option is useful to find hashed host names or addresses and may also be
|
|
||||||
used in conjunction with the
|
|
||||||
.Fl H
|
|
||||||
option to print found keys in a hashed format.
|
|
||||||
.It Fl H
|
|
||||||
Hash a
|
|
||||||
.Pa known_hosts
|
|
||||||
file, printing the result to standard output.
|
|
||||||
This replaces all hostnames and addresses with hashed representations.
|
|
||||||
These hashes may be used normally by
|
|
||||||
.Nm ssh
|
|
||||||
and
|
|
||||||
.Nm sshd ,
|
|
||||||
but they do not reveal identifying information should the file's contents
|
|
||||||
be disclosed.
|
|
||||||
This option will not modify existing hashed hostnames and is therefore safe
|
|
||||||
to use on files that mix hashed and non-hashed names.
|
|
||||||
.It Fl R Ar hostname
|
.It Fl R Ar hostname
|
||||||
Removes all keys belonging to
|
Removes all keys belonging to
|
||||||
.Ar hostname
|
.Ar hostname
|
||||||
@ -284,27 +285,25 @@ file.
|
|||||||
This option is useful to delete hashed hosts (see the
|
This option is useful to delete hashed hosts (see the
|
||||||
.Fl H
|
.Fl H
|
||||||
option above).
|
option above).
|
||||||
.It Fl G Ar output_file
|
.It Fl r Ar hostname
|
||||||
Generate candidate primes for DH-GEX.
|
Print the SSHFP fingerprint resource record named
|
||||||
These primes must be screened for
|
.Ar hostname
|
||||||
safety (using the
|
for the specified public key file.
|
||||||
.Fl T
|
|
||||||
option) before use.
|
|
||||||
.It Fl M Ar memory
|
|
||||||
Specify the amount of memory to use (in megabytes) when generating
|
|
||||||
candidate moduli for DH-GEX.
|
|
||||||
.It Fl N Ar new_passphrase
|
|
||||||
Provides the new passphrase.
|
|
||||||
.It Fl P Ar passphrase
|
|
||||||
Provides the (old) passphrase.
|
|
||||||
.It Fl S Ar start
|
.It Fl S Ar start
|
||||||
Specify start point (in hex) when generating candidate moduli for DH-GEX.
|
Specify start point (in hex) when generating candidate moduli for DH-GEX.
|
||||||
.It Fl T Ar output_file
|
.It Fl T Ar output_file
|
||||||
Test DH group exchange candidate primes (generated using the
|
Test DH group exchange candidate primes (generated using the
|
||||||
.Fl G
|
.Fl G
|
||||||
option) for safety.
|
option) for safety.
|
||||||
.It Fl W Ar generator
|
.It Fl t Ar type
|
||||||
Specify desired generator when testing candidate moduli for DH-GEX.
|
Specifies the type of key to create.
|
||||||
|
The possible values are
|
||||||
|
.Dq rsa1
|
||||||
|
for protocol version 1 and
|
||||||
|
.Dq rsa
|
||||||
|
or
|
||||||
|
.Dq dsa
|
||||||
|
for protocol version 2.
|
||||||
.It Fl U Ar reader
|
.It Fl U Ar reader
|
||||||
Upload an existing RSA private key into the smartcard in
|
Upload an existing RSA private key into the smartcard in
|
||||||
.Ar reader .
|
.Ar reader .
|
||||||
@ -318,10 +317,11 @@ Multiple
|
|||||||
.Fl v
|
.Fl v
|
||||||
options increase the verbosity.
|
options increase the verbosity.
|
||||||
The maximum is 3.
|
The maximum is 3.
|
||||||
.It Fl r Ar hostname
|
.It Fl W Ar generator
|
||||||
Print the SSHFP fingerprint resource record named
|
Specify desired generator when testing candidate moduli for DH-GEX.
|
||||||
.Ar hostname
|
.It Fl y
|
||||||
for the specified public key file.
|
This option will read a private
|
||||||
|
OpenSSH format file and print an OpenSSH public key to stdout.
|
||||||
.El
|
.El
|
||||||
.Sh MODULI GENERATION
|
.Sh MODULI GENERATION
|
||||||
.Nm
|
.Nm
|
||||||
@ -340,7 +340,7 @@ The desired length of the primes may be specified by the
|
|||||||
option.
|
option.
|
||||||
For example:
|
For example:
|
||||||
.Pp
|
.Pp
|
||||||
.Dl ssh-keygen -G moduli-2048.candidates -b 2048
|
.Dl # ssh-keygen -G moduli-2048.candidates -b 2048
|
||||||
.Pp
|
.Pp
|
||||||
By default, the search for primes begins at a random point in the
|
By default, the search for primes begins at a random point in the
|
||||||
desired length range.
|
desired length range.
|
||||||
@ -360,7 +360,7 @@ will read candidates from standard input (or a file specified using the
|
|||||||
option).
|
option).
|
||||||
For example:
|
For example:
|
||||||
.Pp
|
.Pp
|
||||||
.Dl ssh-keygen -T moduli-2048 -f moduli-2048.candidates
|
.Dl # ssh-keygen -T moduli-2048 -f moduli-2048.candidates
|
||||||
.Pp
|
.Pp
|
||||||
By default, each candidate will be subjected to 100 primality tests.
|
By default, each candidate will be subjected to 100 primality tests.
|
||||||
This may be overridden using the
|
This may be overridden using the
|
||||||
@ -371,7 +371,7 @@ prime under consideration.
|
|||||||
If a specific generator is desired, it may be requested using the
|
If a specific generator is desired, it may be requested using the
|
||||||
.Fl W
|
.Fl W
|
||||||
option.
|
option.
|
||||||
Valid generator values are 2, 3 and 5.
|
Valid generator values are 2, 3, and 5.
|
||||||
.Pp
|
.Pp
|
||||||
Screened DH groups may be installed in
|
Screened DH groups may be installed in
|
||||||
.Pa /etc/moduli .
|
.Pa /etc/moduli .
|
||||||
|
Loading…
x
Reference in New Issue
Block a user