summaryrefslogtreecommitdiff
path: root/other/openssh-reverse/ssh-keygen.0
diff options
context:
space:
mode:
authorSkyperTHC2026-03-03 06:28:55 +0000
committerSkyperTHC2026-03-03 06:28:55 +0000
commit5d3573ef7a109ee70416fe94db098fe6a769a798 (patch)
treedc2d5b294c9db8ab2db7433511f94e1c4bb8b698 /other/openssh-reverse/ssh-keygen.0
parentc6c59dc73cc4586357f93ab38ecf459e98675cc5 (diff)
packetstorm sync
Diffstat (limited to 'other/openssh-reverse/ssh-keygen.0')
-rw-r--r--other/openssh-reverse/ssh-keygen.0152
1 files changed, 152 insertions, 0 deletions
diff --git a/other/openssh-reverse/ssh-keygen.0 b/other/openssh-reverse/ssh-keygen.0
new file mode 100644
index 0000000..deec172
--- /dev/null
+++ b/other/openssh-reverse/ssh-keygen.0
@@ -0,0 +1,152 @@
1
2SSH-KEYGEN(1) System Reference Manual SSH-KEYGEN(1)
3
4NAME
5 ssh-keygen - authentication key generation
6
7SYNOPSIS
8 ssh-keygen [-dq] [-b bits] [-N new_passphrase] [-C comment] [-f keyfile]
9 ssh-keygen -p [-P old_passphrase] [-N new_passphrase] [-f keyfile]
10 ssh-keygen -x [-f keyfile]
11 ssh-keygen -X [-f keyfile]
12 ssh-keygen -y [-f keyfile]
13 ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile]
14 ssh-keygen -l [-f keyfile]
15 ssh-keygen -R
16
17DESCRIPTION
18 ssh-keygen generates and manages authentication keys for ssh(1). ssh-
19 keygen defaults to generating an RSA key for use by protocols 1.3 and
20 1.5; specifying the -d flag will create a DSA key instead for use by pro-
21 tocol 2.0.
22
23 Normally each user wishing to use SSH with RSA or DSA authentication runs
24 this once to create the authentication key in $HOME/.ssh/identity or
25 $HOME/.ssh/id_dsa. Additionally, the system administrator may use this to
26 generate host keys, as seen in /etc/rc.
27
28 Normally this program generates the key and asks for a file in which to
29 store the private key. The public key is stored in a file with the same
30 name but ``.pub'' appended. The program also asks for a passphrase. The
31 passphrase may be empty to indicate no passphrase (host keys must have
32 empty passphrase), or it may be a string of arbitrary length. Good
33 passphrases are 10-30 characters long and are not simple sentences or
34 otherwise easily guessable (English prose has only 1-2 bits of entropy
35 per word, and provides very bad passphrases). The passphrase can be
36 changed later by using the -p option.
37
38 There is no way to recover a lost passphrase. If the passphrase is lost
39 or forgotten, you will have to generate a new key and copy the corre-
40 sponding public key to other machines.
41
42 For RSA, there is also a comment field in the key file that is only for
43 convenience to the user to help identify the key. The comment can tell
44 what the key is for, or whatever is useful. The comment is initialized
45 to ``user@host'' when the key is created, but can be changed using the -c
46 option.
47
48 After a key is generated, instructions below detail where the keys should
49 be placed to be activated.
50
51 The options are as follows:
52
53 -b bits
54 Specifies the number of bits in the key to create. Minimum is
55 512 bits. Generally 1024 bits is considered sufficient, and key
56 sizes above that no longer improve security but make things slow-
57 er. The default is 1024 bits.
58
59 -c Requests changing the comment in the private and public key
60 files. The program will prompt for the file containing the pri-
61 vate keys, for passphrase if the key has one, and for the new
62 comment.
63
64
65
66 -f Specifies the filename of the key file.
67
68 -l Show fingerprint of specified private or public key file.
69
70 -p Requests changing the passphrase of a private key file instead of
71 creating a new private key. The program will prompt for the file
72 containing the private key, for the old passphrase, and twice for
73 the new passphrase.
74
75 -q Silence ssh-keygen. Used by /etc/rc when creating a new key.
76
77 -C comment
78 Provides the new comment.
79
80 -N new_passphrase
81 Provides the new passphrase.
82
83 -P passphrase
84 Provides the (old) passphrase.
85
86 -R If RSA support is functional, immediately exits with code 0. If
87 RSA support is not functional, exits with code 1. This flag will
88 be removed once the RSA patent expires.
89
90 -x This option will read a private OpenSSH DSA format file and print
91 a SSH2-compatible public key to stdout.
92
93 -X This option will read a SSH2-compatible public key file and print
94 an OpenSSH DSA compatible public key to stdout.
95
96 -y This option will read a private OpenSSH DSA format file and print
97 an OpenSSH DSA public key to stdout.
98
99FILES
100 $HOME/.ssh/identity
101 Contains the RSA authentication identity of the user. This file
102 should not be readable by anyone but the user. It is possible to
103 specify a passphrase when generating the key; that passphrase
104 will be used to encrypt the private part of this file using 3DES.
105 This file is not automatically accessed by ssh-keygen but it is
106 offered as the default file for the private key. sshd(8) will
107 read this file when a login attempt is made.
108
109 $HOME/.ssh/identity.pub
110 Contains the public key for authentication. The contents of this
111 file should be added to $HOME/.ssh/authorized_keys on all ma-
112 chines where you wish to log in using RSA authentication. There
113 is no need to keep the contents of this file secret.
114
115 $HOME/.ssh/id_dsa
116 Contains the DSA authentication identity of the user. This file
117 should not be readable by anyone but the user. It is possible to
118 specify a passphrase when generating the key; that passphrase
119 will be used to encrypt the private part of this file using 3DES.
120 This file is not automatically accessed by ssh-keygen but it is
121 offered as the default file for the private key. sshd(8) will
122 read this file when a login attempt is made.
123
124 $HOME/.ssh/id_dsa.pub
125 Contains the public key for authentication. The contents of this
126 file should be added to $HOME/.ssh/authorized_keys2 on all ma-
127 chines where you wish to log in using DSA authentication. There
128 is no need to keep the contents of this file secret.
129
130AUTHOR
131 Tatu Ylonen <ylo@cs.hut.fi>
132
133 OpenSSH is a derivative of the original (free) ssh 1.2.12 release, but
134 with bugs removed and newer features re-added. Rapidly after the 1.2.12
135 release, newer versions bore successively more restrictive licenses.
136 This version of OpenSSH
137
138 o has all components of a restrictive nature (i.e., patents) directly
139 removed from the source code; any licensed or patented components are
140 chosen from external libraries.
141
142 o has been updated to support ssh protocol 1.5.
143
144 o contains added support for kerberos(8) authentication and ticket
145 passing.
146
147 o supports one-time password authentication with skey(1).
148
149SEE ALSO
150 ssh(1), ssh-add(1), ssh-agent(1), sshd(8),
151
152BSD Experimental September 25, 1999 3