]> andersk Git - openssh.git/blame - ssh-keygen.1
- niklas@cvs.openbsd.org 2001/01/2001
[openssh.git] / ssh-keygen.1
CommitLineData
23c2a7a5 1.\" $OpenBSD: ssh-keygen.1,v 1.29 2001/01/29 01:58:18 niklas Exp $
2.\"
bf740959 3.\" -*- nroff -*-
4.\"
bf740959 5.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
bf740959 6.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
7.\" All rights reserved
8.\"
bcbf86ec 9.\" As far as I am concerned, the code I have written for this software
10.\" can be used freely for any purpose. Any derived versions of this
11.\" software must be clearly marked as such, and if the derived work is
12.\" incompatible with the protocol description in the RFC file, it must be
13.\" called by a name other than "ssh" or "Secure Shell".
14.\"
15.\"
16.\" Copyright (c) 1999,2000 Markus Friedl. All rights reserved.
17.\" Copyright (c) 1999 Aaron Campbell. All rights reserved.
18.\" Copyright (c) 1999 Theo de Raadt. All rights reserved.
19.\"
20.\" Redistribution and use in source and binary forms, with or without
21.\" modification, are permitted provided that the following conditions
22.\" are met:
23.\" 1. Redistributions of source code must retain the above copyright
24.\" notice, this list of conditions and the following disclaimer.
25.\" 2. Redistributions in binary form must reproduce the above copyright
26.\" notice, this list of conditions and the following disclaimer in the
27.\" documentation and/or other materials provided with the distribution.
bf740959 28.\"
bcbf86ec 29.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
30.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
31.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
32.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
33.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
34.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
35.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
36.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
37.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
38.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
bf740959 39.\"
40.Dd September 25, 1999
41.Dt SSH-KEYGEN 1
42.Os
43.Sh NAME
44.Nm ssh-keygen
45.Nd authentication key generation
46.Sh SYNOPSIS
47.Nm ssh-keygen
fa08c86b 48.Op Fl q
bf740959 49.Op Fl b Ar bits
fa08c86b 50.Op Fl t Ar type
bf740959 51.Op Fl N Ar new_passphrase
52.Op Fl C Ar comment
7cd3766c 53.Op Fl f Ar output_keyfile
bf740959 54.Nm ssh-keygen
55.Fl p
56.Op Fl P Ar old_passphrase
57.Op Fl N Ar new_passphrase
f095fcc7 58.Op Fl f Ar keyfile
bf740959 59.Nm ssh-keygen
1d1ffb87 60.Fl x
7cd3766c 61.Op Fl f Ar input_keyfile
1d1ffb87 62.Nm ssh-keygen
63.Fl X
7cd3766c 64.Op Fl f Ar input_keyfile
1d1ffb87 65.Nm ssh-keygen
66.Fl y
7cd3766c 67.Op Fl f Ar input_keyfile
1d1ffb87 68.Nm ssh-keygen
bf740959 69.Fl c
70.Op Fl P Ar passphrase
71.Op Fl C Ar comment
f095fcc7 72.Op Fl f Ar keyfile
73.Nm ssh-keygen
74.Fl l
7cd3766c 75.Op Fl f Ar input_keyfile
f54651ce 76.Sh DESCRIPTION
bf740959 77.Nm
f54651ce 78generates and manages authentication keys for
bf740959 79.Xr ssh 1 .
1d1ffb87 80.Nm
81defaults to generating an RSA key for use by protocols 1.3 and 1.5;
82specifying the
fa08c86b 83.Fl t
b5c334cc 84option allows you to create a key for use by protocol 2.0.
1d1ffb87 85.Pp
bf740959 86Normally each user wishing to use SSH
1d1ffb87 87with RSA or DSA authentication runs this once to create the authentication
bf740959 88key in
1d1ffb87 89.Pa $HOME/.ssh/identity
90or
91.Pa $HOME/.ssh/id_dsa .
92Additionally, the system administrator may use this to generate host keys,
93as seen in
94.Pa /etc/rc .
bf740959 95.Pp
96Normally this program generates the key and asks for a file in which
4fe2af09 97to store the private key.
98The public key is stored in a file with the same name but
bf740959 99.Dq .pub
4fe2af09 100appended.
101The program also asks for a passphrase.
102The passphrase may be empty to indicate no passphrase
b5c334cc 103(host keys must have an empty passphrase), or it may be a string of
4fe2af09 104arbitrary length.
105Good passphrases are 10-30 characters long and are
bf740959 106not simple sentences or otherwise easily guessable (English
107prose has only 1-2 bits of entropy per word, and provides very bad
4fe2af09 108passphrases).
109The passphrase can be changed later by using the
bf740959 110.Fl p
111option.
112.Pp
4fe2af09 113There is no way to recover a lost passphrase.
114If the passphrase is
bf740959 115lost or forgotten, you will have to generate a new key and copy the
116corresponding public key to other machines.
117.Pp
1d1ffb87 118For RSA, there is also a comment field in the key file that is only for
4fe2af09 119convenience to the user to help identify the key.
120The comment can tell what the key is for, or whatever is useful.
121The comment is initialized to
bf740959 122.Dq user@host
123when the key is created, but can be changed using the
124.Fl c
125option.
126.Pp
1d1ffb87 127After a key is generated, instructions below detail where the keys
128should be placed to be activated.
129.Pp
bf740959 130The options are as follows:
131.Bl -tag -width Ds
132.It Fl b Ar bits
4fe2af09 133Specifies the number of bits in the key to create.
134Minimum is 512 bits.
135Generally 1024 bits is considered sufficient, and key sizes
136above that no longer improve security but make things slower.
137The default is 1024 bits.
bf740959 138.It Fl c
139Requests changing the comment in the private and public key files.
140The program will prompt for the file containing the private keys, for
141passphrase if the key has one, and for the new comment.
f095fcc7 142.It Fl f
143Specifies the filename of the key file.
144.It Fl l
145Show fingerprint of specified private or public key file.
bf740959 146.It Fl p
147Requests changing the passphrase of a private key file instead of
4fe2af09 148creating a new private key.
149The program will prompt for the file
bf740959 150containing the private key, for the old passphrase, and twice for the
151new passphrase.
152.It Fl q
153Silence
154.Nm ssh-keygen .
155Used by
156.Pa /etc/rc
157when creating a new key.
fa08c86b 158.It Fl t Ar type
159Specifies the type of the key to create.
160The possible values are
161.Dq rsa1
162for protocol version 1 and
163.Dq rsa
164or
165.Dq dsa
166for protocol version 2.
167The default is
168.Dq rsa .
bf740959 169.It Fl C Ar comment
170Provides the new comment.
171.It Fl N Ar new_passphrase
172Provides the new passphrase.
173.It Fl P Ar passphrase
174Provides the (old) passphrase.
1d1ffb87 175.It Fl x
176This option will read a private
d0c832f3 177OpenSSH DSA format file and print a SSH2-compatible public key to stdout.
1d1ffb87 178.It Fl X
94ec8c6b 179This option will read a unencrypted
180SSH2-compatible private (or public) key file and
181print an OpenSSH compatible private (or public) key to stdout.
1d1ffb87 182.It Fl y
183This option will read a private
fa08c86b 184OpenSSH format file and print an OpenSSH public key to stdout.
bf740959 185.El
186.Sh FILES
187.Bl -tag -width Ds
bf740959 188.It Pa $HOME/.ssh/identity
4fe2af09 189Contains the RSA authentication identity of the user.
190This file should not be readable by anyone but the user.
191It is possible to
bf740959 192specify a passphrase when generating the key; that passphrase will be
4fe2af09 193used to encrypt the private part of this file using 3DES.
194This file is not automatically accessed by
bf740959 195.Nm
196but it is offered as the default file for the private key.
1d1ffb87 197.Xr sshd 8
198will read this file when a login attempt is made.
bf740959 199.It Pa $HOME/.ssh/identity.pub
4fe2af09 200Contains the public key for authentication.
201The contents of this file should be added to
bf740959 202.Pa $HOME/.ssh/authorized_keys
203on all machines
4fe2af09 204where you wish to log in using RSA authentication.
205There is no need to keep the contents of this file secret.
1d1ffb87 206.It Pa $HOME/.ssh/id_dsa
207Contains the DSA authentication identity of the user.
208This file should not be readable by anyone but the user.
209It is possible to
210specify a passphrase when generating the key; that passphrase will be
211used to encrypt the private part of this file using 3DES.
212This file is not automatically accessed by
213.Nm
214but it is offered as the default file for the private key.
215.Xr sshd 8
216will read this file when a login attempt is made.
217.It Pa $HOME/.ssh/id_dsa.pub
218Contains the public key for authentication.
219The contents of this file should be added to
220.Pa $HOME/.ssh/authorized_keys2
221on all machines
fa08c86b 222where you wish to log in using public key authentication.
1d1ffb87 223There is no need to keep the contents of this file secret.
089fbbd2 224.El
fa08c86b 225.Sh AUTHORS
bf740959 226Tatu Ylonen <ylo@cs.hut.fi>
227.Pp
228OpenSSH
229is a derivative of the original (free) ssh 1.2.12 release, but with bugs
4fe2af09 230removed and newer features re-added.
231Rapidly after the 1.2.12 release,
232newer versions bore successively more restrictive licenses.
233This version of OpenSSH
bf740959 234.Bl -bullet
235.It
bcbf86ec 236has all components of a restrictive nature (i.e., patents, see
237.Xr crypto 3 )
bf740959 238directly removed from the source code; any licensed or patented components
239are chosen from
240external libraries.
241.It
242has been updated to support ssh protocol 1.5.
243.It
f54651ce 244contains added support for
bf740959 245.Xr kerberos 8
246authentication and ticket passing.
247.It
248supports one-time password authentication with
249.Xr skey 1 .
250.El
bf740959 251.Sh SEE ALSO
252.Xr ssh 1 ,
253.Xr ssh-add 1 ,
0c372277 254.Xr ssh-agent 1 ,
bf740959 255.Xr sshd 8 ,
bcbf86ec 256.Xr crypto 3
This page took 0.121508 seconds and 5 git commands to generate.