mirror of
https://github.com/PowerShell/openssh-portable.git
synced 2025-07-29 08:44:52 +02:00
- djm@cvs.openbsd.org 2010/03/04 23:19:29
[ssh.1 sshd.8] move section on CA and revoked keys from ssh.1 to sshd.8's known hosts format section and rework it a bit; requested by jmc@
This commit is contained in:
parent
c6db99ec14
commit
a7dab8bfe5
@ -12,6 +12,10 @@
|
|||||||
- djm@cvs.openbsd.org 2010/03/04 23:17:25
|
- djm@cvs.openbsd.org 2010/03/04 23:17:25
|
||||||
[sshd_config.5]
|
[sshd_config.5]
|
||||||
missing word; spotted by jmc@
|
missing word; spotted by jmc@
|
||||||
|
- djm@cvs.openbsd.org 2010/03/04 23:19:29
|
||||||
|
[ssh.1 sshd.8]
|
||||||
|
move section on CA and revoked keys from ssh.1 to sshd.8's known hosts
|
||||||
|
format section and rework it a bit; requested by jmc@
|
||||||
- (tim) [ssh-pkcs11.c] Fix "non-constant initializer" errors in older
|
- (tim) [ssh-pkcs11.c] Fix "non-constant initializer" errors in older
|
||||||
compilers. OK djm@
|
compilers. OK djm@
|
||||||
|
|
||||||
|
35
ssh.1
35
ssh.1
@ -34,7 +34,7 @@
|
|||||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.\" $OpenBSD: ssh.1,v 1.298 2010/03/04 12:51:25 jmc Exp $
|
.\" $OpenBSD: ssh.1,v 1.299 2010/03/04 23:19:29 djm Exp $
|
||||||
.Dd $Mdocdate: March 4 2010 $
|
.Dd $Mdocdate: March 4 2010 $
|
||||||
.Dt SSH 1
|
.Dt SSH 1
|
||||||
.Os
|
.Os
|
||||||
@ -1104,39 +1104,6 @@ option in
|
|||||||
.Xr ssh_config 5
|
.Xr ssh_config 5
|
||||||
for more information.
|
for more information.
|
||||||
.Pp
|
.Pp
|
||||||
Host keys may also be presented as certificates signed by a trusted
|
|
||||||
certification authority (CA).
|
|
||||||
In this case, trust of the CA key alone is sufficient for the host key
|
|
||||||
to be accepted.
|
|
||||||
To specify a public key as a trusted CA key in a known hosts file,
|
|
||||||
it should be added after a
|
|
||||||
.Dq @cert-authority
|
|
||||||
tag and a set of one or more domain-name wildcards separated by commas.
|
|
||||||
For example:
|
|
||||||
.Pp
|
|
||||||
.Dl @cert-authority *.mydomain.org,*.mydomain.com ssh-rsa AAAAB5W...
|
|
||||||
.Pp
|
|
||||||
See the
|
|
||||||
.Sx CERTIFICATES
|
|
||||||
section of
|
|
||||||
.Xr ssh-keygen 1
|
|
||||||
for more details.
|
|
||||||
.Pp
|
|
||||||
Keys may also be marked as revoked using the
|
|
||||||
.Dq @revoked
|
|
||||||
marker.
|
|
||||||
Revoked keys will always trigger a warning when encountered and the host
|
|
||||||
that presented them will be treated as untrusted.
|
|
||||||
For example:
|
|
||||||
.Pp
|
|
||||||
.Dl @revoked * ssh-rsa AAAAB5W...
|
|
||||||
.Pp
|
|
||||||
Revoking a key revokes it for direct use and as a certification authority.
|
|
||||||
Do not use both the
|
|
||||||
.Dq @cert-authority
|
|
||||||
and
|
|
||||||
.Dq @revoked
|
|
||||||
markers on the same line.
|
|
||||||
.Sh SSH-BASED VIRTUAL PRIVATE NETWORKS
|
.Sh SSH-BASED VIRTUAL PRIVATE NETWORKS
|
||||||
.Nm
|
.Nm
|
||||||
contains support for Virtual Private Network (VPN) tunnelling
|
contains support for Virtual Private Network (VPN) tunnelling
|
||||||
|
50
sshd.8
50
sshd.8
@ -34,8 +34,8 @@
|
|||||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.\" $OpenBSD: sshd.8,v 1.253 2010/03/03 22:49:50 djm Exp $
|
.\" $OpenBSD: sshd.8,v 1.254 2010/03/04 23:19:29 djm Exp $
|
||||||
.Dd $Mdocdate: March 3 2010 $
|
.Dd $Mdocdate: March 4 2010 $
|
||||||
.Dt SSHD 8
|
.Dt SSHD 8
|
||||||
.Os
|
.Os
|
||||||
.Sh NAME
|
.Sh NAME
|
||||||
@ -634,10 +634,19 @@ be prepared by the administrator (optional), and the per-user file is
|
|||||||
maintained automatically: whenever the user connects from an unknown host,
|
maintained automatically: whenever the user connects from an unknown host,
|
||||||
its key is added to the per-user file.
|
its key is added to the per-user file.
|
||||||
.Pp
|
.Pp
|
||||||
Each line in these files contains the following fields: hostnames,
|
Each line in these files contains the following fields: markers (optional),
|
||||||
bits, exponent, modulus, comment.
|
hostnames, bits, exponent, modulus, comment.
|
||||||
The fields are separated by spaces.
|
The fields are separated by spaces.
|
||||||
.Pp
|
.Pp
|
||||||
|
The marker is optional, but if it is present then it must be one of
|
||||||
|
.Dq @cert-authority ,
|
||||||
|
to indicate that the line contains a certification authority (CA) key,
|
||||||
|
or
|
||||||
|
.Dq @revoked ,
|
||||||
|
to indicate that the key contained on the line is revoked and must not ever
|
||||||
|
be accepted.
|
||||||
|
Only one marker should be used on a key line.
|
||||||
|
.Pp
|
||||||
Hostnames is a comma-separated list of patterns
|
Hostnames is a comma-separated list of patterns
|
||||||
.Pf ( Ql *
|
.Pf ( Ql *
|
||||||
and
|
and
|
||||||
@ -677,8 +686,25 @@ Lines starting with
|
|||||||
and empty lines are ignored as comments.
|
and empty lines are ignored as comments.
|
||||||
.Pp
|
.Pp
|
||||||
When performing host authentication, authentication is accepted if any
|
When performing host authentication, authentication is accepted if any
|
||||||
matching line has the proper key.
|
matching line has the proper key; either one that matches exactly or,
|
||||||
It is thus permissible (but not
|
if the server has presented a certificate for authentication, the key
|
||||||
|
of the certification authority that signed the certificate.
|
||||||
|
For a key to be trusted as a certification authority, it must use the
|
||||||
|
.Dq @cert-authority
|
||||||
|
marker described above.
|
||||||
|
.Pp
|
||||||
|
The known hosts file also provides a facility to mark keys as revoked,
|
||||||
|
for example when it is known that the associated private key has been
|
||||||
|
stolen.
|
||||||
|
Revoked keys are specified by including the
|
||||||
|
.Dq @revoked
|
||||||
|
marker at the beginning of the key line, and are never accepted for
|
||||||
|
authentication or as certification authorities, but instead will
|
||||||
|
produce a warning from
|
||||||
|
.Xr ssh 1
|
||||||
|
when they are encountered.
|
||||||
|
.Pp
|
||||||
|
It is permissible (but not
|
||||||
recommended) to have several lines or different host keys for the same
|
recommended) to have several lines or different host keys for the same
|
||||||
names.
|
names.
|
||||||
This will inevitably happen when short forms of host names
|
This will inevitably happen when short forms of host names
|
||||||
@ -689,10 +715,16 @@ accepted if valid information can be found from either file.
|
|||||||
.Pp
|
.Pp
|
||||||
Note that the lines in these files are typically hundreds of characters
|
Note that the lines in these files are typically hundreds of characters
|
||||||
long, and you definitely don't want to type in the host keys by hand.
|
long, and you definitely don't want to type in the host keys by hand.
|
||||||
Rather, generate them by a script
|
Rather, generate them by a script,
|
||||||
|
.Xr ssh-keyscan 1
|
||||||
or by taking
|
or by taking
|
||||||
.Pa /etc/ssh/ssh_host_key.pub
|
.Pa /etc/ssh/ssh_host_key.pub
|
||||||
and adding the host names at the front.
|
and adding the host names at the front.
|
||||||
|
.Xr ssh-keygen 1
|
||||||
|
also offers some basic automated editing for
|
||||||
|
.Pa ~/.ssh/known_hosts
|
||||||
|
including removing hosts matching a host name and converting all host
|
||||||
|
names to their hashed representations.
|
||||||
.Pp
|
.Pp
|
||||||
An example ssh_known_hosts file:
|
An example ssh_known_hosts file:
|
||||||
.Bd -literal -offset 3n
|
.Bd -literal -offset 3n
|
||||||
@ -702,6 +734,10 @@ cvs.example.net,192.0.2.10 ssh-rsa AAAA1234.....=
|
|||||||
# A hashed hostname
|
# A hashed hostname
|
||||||
|1|JfKTdBh7rNbXkVAQCRp4OQoPfmI=|USECr3SWf1JUPsms5AqfD5QfxkM= ssh-rsa
|
|1|JfKTdBh7rNbXkVAQCRp4OQoPfmI=|USECr3SWf1JUPsms5AqfD5QfxkM= ssh-rsa
|
||||||
AAAA1234.....=
|
AAAA1234.....=
|
||||||
|
# A revoked key
|
||||||
|
@revoked * ssh-rsa AAAAB5W...
|
||||||
|
# A CA key, accepted for any host in *.mydomain.com or *.mydomain.org
|
||||||
|
@cert-authority *.mydomain.org,*.mydomain.com ssh-rsa AAAAB5W...
|
||||||
.Ed
|
.Ed
|
||||||
.Sh FILES
|
.Sh FILES
|
||||||
.Bl -tag -width Ds -compact
|
.Bl -tag -width Ds -compact
|
||||||
|
Loading…
x
Reference in New Issue
Block a user