]> andersk Git - openssh.git/blame - ssh-keygen.1
- (djm) Big OpenBSD sync:
[openssh.git] / ssh-keygen.1
CommitLineData
bf740959 1.\" -*- nroff -*-
2.\"
bf740959 3.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
bf740959 4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5.\" All rights reserved
6.\"
bcbf86ec 7.\" As far as I am concerned, the code I have written for this software
8.\" can be used freely for any purpose. Any derived versions of this
9.\" software must be clearly marked as such, and if the derived work is
10.\" incompatible with the protocol description in the RFC file, it must be
11.\" called by a name other than "ssh" or "Secure Shell".
12.\"
13.\"
14.\" Copyright (c) 1999,2000 Markus Friedl. All rights reserved.
15.\" Copyright (c) 1999 Aaron Campbell. All rights reserved.
16.\" Copyright (c) 1999 Theo de Raadt. All rights reserved.
17.\"
18.\" Redistribution and use in source and binary forms, with or without
19.\" modification, are permitted provided that the following conditions
20.\" are met:
21.\" 1. Redistributions of source code must retain the above copyright
22.\" notice, this list of conditions and the following disclaimer.
23.\" 2. Redistributions in binary form must reproduce the above copyright
24.\" notice, this list of conditions and the following disclaimer in the
25.\" documentation and/or other materials provided with the distribution.
bf740959 26.\"
bcbf86ec 27.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
28.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
29.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
30.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
31.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
32.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
33.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
34.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
35.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
36.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
bf740959 37.\"
38.Dd September 25, 1999
39.Dt SSH-KEYGEN 1
40.Os
41.Sh NAME
42.Nm ssh-keygen
43.Nd authentication key generation
44.Sh SYNOPSIS
45.Nm ssh-keygen
1d1ffb87 46.Op Fl dq
bf740959 47.Op Fl b Ar bits
48.Op Fl N Ar new_passphrase
49.Op Fl C Ar comment
7cd3766c 50.Op Fl f Ar output_keyfile
bf740959 51.Nm ssh-keygen
52.Fl p
53.Op Fl P Ar old_passphrase
54.Op Fl N Ar new_passphrase
f095fcc7 55.Op Fl f Ar keyfile
bf740959 56.Nm ssh-keygen
1d1ffb87 57.Fl x
7cd3766c 58.Op Fl f Ar input_keyfile
1d1ffb87 59.Nm ssh-keygen
60.Fl X
7cd3766c 61.Op Fl f Ar input_keyfile
1d1ffb87 62.Nm ssh-keygen
63.Fl y
7cd3766c 64.Op Fl f Ar input_keyfile
1d1ffb87 65.Nm ssh-keygen
bf740959 66.Fl c
67.Op Fl P Ar passphrase
68.Op Fl C Ar comment
f095fcc7 69.Op Fl f Ar keyfile
70.Nm ssh-keygen
71.Fl l
7cd3766c 72.Op Fl f Ar input_keyfile
a306f2dd 73.Nm ssh-keygen
74.Fl R
f54651ce 75.Sh DESCRIPTION
bf740959 76.Nm
f54651ce 77generates and manages authentication keys for
bf740959 78.Xr ssh 1 .
1d1ffb87 79.Nm
80defaults to generating an RSA key for use by protocols 1.3 and 1.5;
81specifying the
82.Fl d
83flag will create a DSA key instead for use by protocol 2.0.
84.Pp
bf740959 85Normally each user wishing to use SSH
1d1ffb87 86with RSA or DSA authentication runs this once to create the authentication
bf740959 87key in
1d1ffb87 88.Pa $HOME/.ssh/identity
89or
90.Pa $HOME/.ssh/id_dsa .
91Additionally, the system administrator may use this to generate host keys,
92as seen in
93.Pa /etc/rc .
bf740959 94.Pp
95Normally this program generates the key and asks for a file in which
4fe2af09 96to store the private key.
97The public key is stored in a file with the same name but
bf740959 98.Dq .pub
4fe2af09 99appended.
100The program also asks for a passphrase.
101The passphrase may be empty to indicate no passphrase
bf740959 102(host keys must have empty passphrase), or it may be a string of
4fe2af09 103arbitrary length.
104Good passphrases are 10-30 characters long and are
bf740959 105not simple sentences or otherwise easily guessable (English
106prose has only 1-2 bits of entropy per word, and provides very bad
4fe2af09 107passphrases).
108The passphrase can be changed later by using the
bf740959 109.Fl p
110option.
111.Pp
4fe2af09 112There is no way to recover a lost passphrase.
113If the passphrase is
bf740959 114lost or forgotten, you will have to generate a new key and copy the
115corresponding public key to other machines.
116.Pp
1d1ffb87 117For RSA, there is also a comment field in the key file that is only for
4fe2af09 118convenience to the user to help identify the key.
119The comment can tell what the key is for, or whatever is useful.
120The comment is initialized to
bf740959 121.Dq user@host
122when the key is created, but can be changed using the
123.Fl c
124option.
125.Pp
1d1ffb87 126After a key is generated, instructions below detail where the keys
127should be placed to be activated.
128.Pp
bf740959 129The options are as follows:
130.Bl -tag -width Ds
131.It Fl b Ar bits
4fe2af09 132Specifies the number of bits in the key to create.
133Minimum is 512 bits.
134Generally 1024 bits is considered sufficient, and key sizes
135above that no longer improve security but make things slower.
136The default is 1024 bits.
bf740959 137.It Fl c
138Requests changing the comment in the private and public key files.
139The program will prompt for the file containing the private keys, for
140passphrase if the key has one, and for the new comment.
f095fcc7 141.It Fl f
142Specifies the filename of the key file.
143.It Fl l
144Show fingerprint of specified private or public key file.
bf740959 145.It Fl p
146Requests changing the passphrase of a private key file instead of
4fe2af09 147creating a new private key.
148The program will prompt for the file
bf740959 149containing the private key, for the old passphrase, and twice for the
150new passphrase.
151.It Fl q
152Silence
153.Nm ssh-keygen .
154Used by
155.Pa /etc/rc
156when creating a new key.
157.It Fl C Ar comment
158Provides the new comment.
159.It Fl N Ar new_passphrase
160Provides the new passphrase.
161.It Fl P Ar passphrase
162Provides the (old) passphrase.
a306f2dd 163.It Fl R
164If RSA support is functional, immediately exits with code 0. If RSA
165support is not functional, exits with code 1. This flag will be
166removed once the RSA patent expires.
1d1ffb87 167.It Fl x
168This option will read a private
d0c832f3 169OpenSSH DSA format file and print a SSH2-compatible public key to stdout.
1d1ffb87 170.It Fl X
94ec8c6b 171This option will read a unencrypted
172SSH2-compatible private (or public) key file and
173print an OpenSSH compatible private (or public) key to stdout.
1d1ffb87 174.It Fl y
175This option will read a private
d0c832f3 176OpenSSH DSA format file and print an OpenSSH DSA public key to stdout.
bf740959 177.El
178.Sh FILES
179.Bl -tag -width Ds
bf740959 180.It Pa $HOME/.ssh/identity
4fe2af09 181Contains the RSA authentication identity of the user.
182This file should not be readable by anyone but the user.
183It is possible to
bf740959 184specify a passphrase when generating the key; that passphrase will be
4fe2af09 185used to encrypt the private part of this file using 3DES.
186This file is not automatically accessed by
bf740959 187.Nm
188but it is offered as the default file for the private key.
1d1ffb87 189.Xr sshd 8
190will read this file when a login attempt is made.
bf740959 191.It Pa $HOME/.ssh/identity.pub
4fe2af09 192Contains the public key for authentication.
193The contents of this file should be added to
bf740959 194.Pa $HOME/.ssh/authorized_keys
195on all machines
4fe2af09 196where you wish to log in using RSA authentication.
197There is no need to keep the contents of this file secret.
1d1ffb87 198.It Pa $HOME/.ssh/id_dsa
199Contains the DSA authentication identity of the user.
200This file should not be readable by anyone but the user.
201It is possible to
202specify a passphrase when generating the key; that passphrase will be
203used to encrypt the private part of this file using 3DES.
204This file is not automatically accessed by
205.Nm
206but it is offered as the default file for the private key.
207.Xr sshd 8
208will read this file when a login attempt is made.
209.It Pa $HOME/.ssh/id_dsa.pub
210Contains the public key for authentication.
211The contents of this file should be added to
212.Pa $HOME/.ssh/authorized_keys2
213on all machines
214where you wish to log in using DSA authentication.
215There is no need to keep the contents of this file secret.
089fbbd2 216.El
bf740959 217.Sh AUTHOR
218Tatu Ylonen <ylo@cs.hut.fi>
219.Pp
220OpenSSH
221is a derivative of the original (free) ssh 1.2.12 release, but with bugs
4fe2af09 222removed and newer features re-added.
223Rapidly after the 1.2.12 release,
224newer versions bore successively more restrictive licenses.
225This version of OpenSSH
bf740959 226.Bl -bullet
227.It
bcbf86ec 228has all components of a restrictive nature (i.e., patents, see
229.Xr crypto 3 )
bf740959 230directly removed from the source code; any licensed or patented components
231are chosen from
232external libraries.
233.It
234has been updated to support ssh protocol 1.5.
235.It
f54651ce 236contains added support for
bf740959 237.Xr kerberos 8
238authentication and ticket passing.
239.It
240supports one-time password authentication with
241.Xr skey 1 .
242.El
bf740959 243.Sh SEE ALSO
244.Xr ssh 1 ,
245.Xr ssh-add 1 ,
0c372277 246.Xr ssh-agent 1 ,
bf740959 247.Xr sshd 8 ,
bcbf86ec 248.Xr crypto 3
This page took 0.165343 seconds and 5 git commands to generate.