diff options
Diffstat (limited to 'other/openssh-reverse/contrib/ssh-copy-id.1')
| -rw-r--r-- | other/openssh-reverse/contrib/ssh-copy-id.1 | 67 |
1 files changed, 67 insertions, 0 deletions
diff --git a/other/openssh-reverse/contrib/ssh-copy-id.1 b/other/openssh-reverse/contrib/ssh-copy-id.1 new file mode 100644 index 0000000..df4f88d --- /dev/null +++ b/other/openssh-reverse/contrib/ssh-copy-id.1 | |||
| @@ -0,0 +1,67 @@ | |||
| 1 | .ig \" -*- nroff -*- | ||
| 2 | Copyright (c) 1999 Philip Hands Computing <http://www.hands.com/> | ||
| 3 | |||
| 4 | Permission is granted to make and distribute verbatim copies of | ||
| 5 | this manual provided the copyright notice and this permission notice | ||
| 6 | are preserved on all copies. | ||
| 7 | |||
| 8 | Permission is granted to copy and distribute modified versions of this | ||
| 9 | manual under the conditions for verbatim copying, provided that the | ||
| 10 | entire resulting derived work is distributed under the terms of a | ||
| 11 | permission notice identical to this one. | ||
| 12 | |||
| 13 | Permission is granted to copy and distribute translations of this | ||
| 14 | manual into another language, under the above conditions for modified | ||
| 15 | versions, except that this permission notice may be included in | ||
| 16 | translations approved by the Free Software Foundation instead of in | ||
| 17 | the original English. | ||
| 18 | .. | ||
| 19 | .TH SSH-COPY-ID 1 "14 November 1999" "OpenSSH" | ||
| 20 | .SH NAME | ||
| 21 | ssh-copy-id \- install your identity.pub in a remote machine's authorized_keys | ||
| 22 | .SH SYNOPSIS | ||
| 23 | .B ssh-copy-id [-i [identity_file]] | ||
| 24 | .I "[user@]machine" | ||
| 25 | .br | ||
| 26 | .SH DESCRIPTION | ||
| 27 | .BR ssh-copy-id | ||
| 28 | is a script that uses ssh to log into a remote machine (presumably | ||
| 29 | using a login password, so password authentication should be enabled, | ||
| 30 | unless you've done some clever use of multiple identities) | ||
| 31 | .PP | ||
| 32 | It also changes the permissions of the remote user's home, | ||
| 33 | .BR ~/.ssh , | ||
| 34 | and | ||
| 35 | .B ~/.ssh/authorized_keys | ||
| 36 | to remove group writability (which would otherwise prevent you from logging in, if the remote | ||
| 37 | .B sshd | ||
| 38 | has | ||
| 39 | .B StrictModes | ||
| 40 | set in its configuration). | ||
| 41 | .PP | ||
| 42 | If the | ||
| 43 | .B -i | ||
| 44 | option is given then the identity file (defaults to | ||
| 45 | .BR ~/.ssh/identity.pub ) | ||
| 46 | is used, regardless of whether there are any keys in your | ||
| 47 | .BR ssh-agent . | ||
| 48 | Otherwise, if this: | ||
| 49 | .PP | ||
| 50 | .B " ssh-add -L" | ||
| 51 | .PP | ||
| 52 | provides any output, it uses that in preference to the identity file. | ||
| 53 | .PP | ||
| 54 | If the | ||
| 55 | .B -i | ||
| 56 | option is used, or the | ||
| 57 | .B ssh-add | ||
| 58 | produced no output, then it uses the contents of the identity | ||
| 59 | file. Once it has one or more fingerprints (by whatever means) it | ||
| 60 | uses ssh to append them to | ||
| 61 | .B ~/.ssh/authorised_keys | ||
| 62 | on the remote machine (creating the file, and directory, if necessary) | ||
| 63 | |||
| 64 | .SH "SEE ALSO" | ||
| 65 | .BR ssh (1), | ||
| 66 | .BR ssh-agent (1), | ||
| 67 | .BR sshd (8) | ||
