diff options
| author | SkyperTHC | 2026-03-03 06:28:55 +0000 |
|---|---|---|
| committer | SkyperTHC | 2026-03-03 06:28:55 +0000 |
| commit | 5d3573ef7a109ee70416fe94db098fe6a769a798 (patch) | |
| tree | dc2d5b294c9db8ab2db7433511f94e1c4bb8b698 /other/ssharp/ssh-agent.0 | |
| parent | c6c59dc73cc4586357f93ab38ecf459e98675cc5 (diff) | |
packetstorm sync
Diffstat (limited to 'other/ssharp/ssh-agent.0')
| -rw-r--r-- | other/ssharp/ssh-agent.0 | 100 |
1 files changed, 100 insertions, 0 deletions
diff --git a/other/ssharp/ssh-agent.0 b/other/ssharp/ssh-agent.0 new file mode 100644 index 0000000..cf5f3bb --- /dev/null +++ b/other/ssharp/ssh-agent.0 | |||
| @@ -0,0 +1,100 @@ | |||
| 1 | |||
| 2 | SSH-AGENT(1) System Reference Manual SSH-AGENT(1) | ||
| 3 | |||
| 4 | NAME | ||
| 5 | ssh-agent - authentication agent | ||
| 6 | |||
| 7 | SYNOPSIS | ||
| 8 | ssh-agent command args ... | ||
| 9 | ssh-agent [-c | -s] | ||
| 10 | ssh-agent -k | ||
| 11 | |||
| 12 | DESCRIPTION | ||
| 13 | ssh-agent is a program to hold private keys used for public key authentiM-- | ||
| 14 | cation (RSA, DSA). The idea is that ssh-agent is started in the beginM-- | ||
| 15 | ning of an X-session or a login session, and all other windows or proM-- | ||
| 16 | grams are started as clients to the ssh-agent program. Through use of | ||
| 17 | environment variables the agent can be located and automatically used for | ||
| 18 | authentication when logging in to other machines using ssh(1). | ||
| 19 | |||
| 20 | The options are as follows: | ||
| 21 | |||
| 22 | -c Generate C-shell commands on stdout. This is the default if SHELL | ||
| 23 | looks like it's a csh style of shell. | ||
| 24 | |||
| 25 | -s Generate Bourne shell commands on stdout. This is the default if | ||
| 26 | SHELL does not look like it's a csh style of shell. | ||
| 27 | |||
| 28 | -k Kill the current agent (given by the SSH_AGENT_PID environment | ||
| 29 | variable). | ||
| 30 | |||
| 31 | If a commandline is given, this is executed as a subprocess of the agent. | ||
| 32 | When the command dies, so does the agent. | ||
| 33 | |||
| 34 | The agent initially does not have any private keys. Keys are added using | ||
| 35 | ssh-add(1). When executed without arguments, ssh-add(1) adds the | ||
| 36 | $HOME/.ssh/identity file. If the identity has a passphrase, ssh-add(1) | ||
| 37 | asks for the passphrase (using a small X11 application if running under | ||
| 38 | X11, or from the terminal if running without X). It then sends the idenM-- | ||
| 39 | tity to the agent. Several identities can be stored in the agent; the | ||
| 40 | agent can automatically use any of these identities. ssh-add -l displays | ||
| 41 | the identities currently held by the agent. | ||
| 42 | |||
| 43 | The idea is that the agent is run in the user's local PC, laptop, or terM-- | ||
| 44 | minal. Authentication data need not be stored on any other machine, and | ||
| 45 | authentication passphrases never go over the network. However, the conM-- | ||
| 46 | nection to the agent is forwarded over SSH remote logins, and the user | ||
| 47 | can thus use the privileges given by the identities anywhere in the netM-- | ||
| 48 | work in a secure way. | ||
| 49 | |||
| 50 | There are two main ways to get an agent setup: Either you let the agent | ||
| 51 | start a new subcommand into which some environment variables are exportM-- | ||
| 52 | ed, or you let the agent print the needed shell commands (either sh(1) or | ||
| 53 | csh(1) syntax can be generated) which can be evalled in the calling | ||
| 54 | shell. Later ssh(1) looks at these variables and uses them to establish | ||
| 55 | a connection to the agent. | ||
| 56 | |||
| 57 | A unix-domain socket is created (/tmp/ssh-XXXXXXXX/agent.<pid>), and the | ||
| 58 | name of this socket is stored in the SSH_AUTH_SOCK environment variable. | ||
| 59 | The socket is made accessible only to the current user. This method is | ||
| 60 | easily abused by root or another instance of the same user. | ||
| 61 | |||
| 62 | The SSH_AGENT_PID environment variable holds the agent's PID. | ||
| 63 | |||
| 64 | The agent exits automatically when the command given on the command line | ||
| 65 | terminates. | ||
| 66 | |||
| 67 | FILES | ||
| 68 | $HOME/.ssh/identity | ||
| 69 | Contains the protocol version 1 RSA authentication identity of | ||
| 70 | the user. This file should not be readable by anyone but the usM-- | ||
| 71 | er. It is possible to specify a passphrase when generating the | ||
| 72 | key; that passphrase will be used to encrypt the private part of | ||
| 73 | this file. This file is not used by ssh-agent but is normally | ||
| 74 | added to the agent using ssh-add(1) at login time. | ||
| 75 | |||
| 76 | $HOME/.ssh/id_dsa | ||
| 77 | Contains the protocol version 2 DSA authentication identity of | ||
| 78 | the user. | ||
| 79 | |||
| 80 | $HOME/.ssh/id_rsa | ||
| 81 | Contains the protocol version 2 RSA authentication identity of | ||
| 82 | the user. | ||
| 83 | |||
| 84 | /tmp/ssh-XXXXXXXX/agent.<pid> | ||
| 85 | Unix-domain sockets used to contain the connection to the authenM-- | ||
| 86 | tication agent. These sockets should only be readable by the | ||
| 87 | owner. The sockets should get automatically removed when the | ||
| 88 | agent exits. | ||
| 89 | |||
| 90 | AUTHORS | ||
| 91 | OpenSSH is a derivative of the original and free ssh 1.2.12 release by | ||
| 92 | Tatu Ylonen. Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo | ||
| 93 | de Raadt and Dug Song removed many bugs, re-added newer features and creM-- | ||
| 94 | ated OpenSSH. Markus Friedl contributed the support for SSH protocol | ||
| 95 | versions 1.5 and 2.0. | ||
| 96 | |||
| 97 | SEE ALSO | ||
| 98 | ssh(1), ssh-add(1), ssh-keygen(1), sshd(8) | ||
| 99 | |||
| 100 | BSD Experimental September 25, 1999 2 | ||
