]> andersk Git - openssh.git/blame_incremental - ssh-keygen.1
- (djm) CVS OpenBSD sync:
[openssh.git] / ssh-keygen.1
... / ...
CommitLineData
1.\" -*- nroff -*-
2.\"
3.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5.\" All rights reserved
6.\"
7.\" As far as I am concerned, the code I have written for this software
8.\" can be used freely for any purpose. Any derived versions of this
9.\" software must be clearly marked as such, and if the derived work is
10.\" incompatible with the protocol description in the RFC file, it must be
11.\" called by a name other than "ssh" or "Secure Shell".
12.\"
13.\"
14.\" Copyright (c) 1999,2000 Markus Friedl. All rights reserved.
15.\" Copyright (c) 1999 Aaron Campbell. All rights reserved.
16.\" Copyright (c) 1999 Theo de Raadt. All rights reserved.
17.\"
18.\" Redistribution and use in source and binary forms, with or without
19.\" modification, are permitted provided that the following conditions
20.\" are met:
21.\" 1. Redistributions of source code must retain the above copyright
22.\" notice, this list of conditions and the following disclaimer.
23.\" 2. Redistributions in binary form must reproduce the above copyright
24.\" notice, this list of conditions and the following disclaimer in the
25.\" documentation and/or other materials provided with the distribution.
26.\"
27.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
28.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
29.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
30.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
31.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
32.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
33.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
34.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
35.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
36.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
37.\"
38.Dd September 25, 1999
39.Dt SSH-KEYGEN 1
40.Os
41.Sh NAME
42.Nm ssh-keygen
43.Nd authentication key generation
44.Sh SYNOPSIS
45.Nm ssh-keygen
46.Op Fl dq
47.Op Fl b Ar bits
48.Op Fl N Ar new_passphrase
49.Op Fl C Ar comment
50.Op Fl f Ar output_keyfile
51.Nm ssh-keygen
52.Fl p
53.Op Fl P Ar old_passphrase
54.Op Fl N Ar new_passphrase
55.Op Fl f Ar keyfile
56.Nm ssh-keygen
57.Fl x
58.Op Fl f Ar input_keyfile
59.Nm ssh-keygen
60.Fl X
61.Op Fl f Ar input_keyfile
62.Nm ssh-keygen
63.Fl y
64.Op Fl f Ar input_keyfile
65.Nm ssh-keygen
66.Fl c
67.Op Fl P Ar passphrase
68.Op Fl C Ar comment
69.Op Fl f Ar keyfile
70.Nm ssh-keygen
71.Fl l
72.Op Fl f Ar input_keyfile
73.Nm ssh-keygen
74.Fl R
75.Sh DESCRIPTION
76.Nm
77generates and manages authentication keys for
78.Xr ssh 1 .
79.Nm
80defaults to generating an RSA key for use by protocols 1.3 and 1.5;
81specifying the
82.Fl d
83flag will create a DSA key instead for use by protocol 2.0.
84.Pp
85Normally each user wishing to use SSH
86with RSA or DSA authentication runs this once to create the authentication
87key in
88.Pa $HOME/.ssh/identity
89or
90.Pa $HOME/.ssh/id_dsa .
91Additionally, the system administrator may use this to generate host keys,
92as seen in
93.Pa /etc/rc .
94.Pp
95Normally this program generates the key and asks for a file in which
96to store the private key.
97The public key is stored in a file with the same name but
98.Dq .pub
99appended.
100The program also asks for a passphrase.
101The passphrase may be empty to indicate no passphrase
102(host keys must have empty passphrase), or it may be a string of
103arbitrary length.
104Good passphrases are 10-30 characters long and are
105not simple sentences or otherwise easily guessable (English
106prose has only 1-2 bits of entropy per word, and provides very bad
107passphrases).
108The passphrase can be changed later by using the
109.Fl p
110option.
111.Pp
112There is no way to recover a lost passphrase.
113If the passphrase is
114lost or forgotten, you will have to generate a new key and copy the
115corresponding public key to other machines.
116.Pp
117For RSA, there is also a comment field in the key file that is only for
118convenience to the user to help identify the key.
119The comment can tell what the key is for, or whatever is useful.
120The comment is initialized to
121.Dq user@host
122when the key is created, but can be changed using the
123.Fl c
124option.
125.Pp
126After a key is generated, instructions below detail where the keys
127should be placed to be activated.
128.Pp
129The options are as follows:
130.Bl -tag -width Ds
131.It Fl b Ar bits
132Specifies the number of bits in the key to create.
133Minimum is 512 bits.
134Generally 1024 bits is considered sufficient, and key sizes
135above that no longer improve security but make things slower.
136The default is 1024 bits.
137.It Fl c
138Requests changing the comment in the private and public key files.
139The program will prompt for the file containing the private keys, for
140passphrase if the key has one, and for the new comment.
141.It Fl f
142Specifies the filename of the key file.
143.It Fl l
144Show fingerprint of specified private or public key file.
145.It Fl p
146Requests changing the passphrase of a private key file instead of
147creating a new private key.
148The program will prompt for the file
149containing the private key, for the old passphrase, and twice for the
150new passphrase.
151.It Fl q
152Silence
153.Nm ssh-keygen .
154Used by
155.Pa /etc/rc
156when creating a new key.
157.It Fl C Ar comment
158Provides the new comment.
159.It Fl N Ar new_passphrase
160Provides the new passphrase.
161.It Fl P Ar passphrase
162Provides the (old) passphrase.
163.It Fl R
164If RSA support is functional, immediately exits with code 0. If RSA
165support is not functional, exits with code 1. This flag will be
166removed once the RSA patent expires.
167.It Fl x
168This option will read a private
169OpenSSH DSA format file and print a SSH2-compatible public key to stdout.
170.It Fl X
171This option will read a
172SSH2-compatible public key file and print an OpenSSH DSA compatible public key to stdout.
173.It Fl y
174This option will read a private
175OpenSSH DSA format file and print an OpenSSH DSA public key to stdout.
176.El
177.Sh FILES
178.Bl -tag -width Ds
179.It Pa $HOME/.ssh/identity
180Contains the RSA authentication identity of the user.
181This file should not be readable by anyone but the user.
182It is possible to
183specify a passphrase when generating the key; that passphrase will be
184used to encrypt the private part of this file using 3DES.
185This file is not automatically accessed by
186.Nm
187but it is offered as the default file for the private key.
188.Xr sshd 8
189will read this file when a login attempt is made.
190.It Pa $HOME/.ssh/identity.pub
191Contains the public key for authentication.
192The contents of this file should be added to
193.Pa $HOME/.ssh/authorized_keys
194on all machines
195where you wish to log in using RSA authentication.
196There is no need to keep the contents of this file secret.
197.It Pa $HOME/.ssh/id_dsa
198Contains the DSA authentication identity of the user.
199This file should not be readable by anyone but the user.
200It is possible to
201specify a passphrase when generating the key; that passphrase will be
202used to encrypt the private part of this file using 3DES.
203This file is not automatically accessed by
204.Nm
205but it is offered as the default file for the private key.
206.Xr sshd 8
207will read this file when a login attempt is made.
208.It Pa $HOME/.ssh/id_dsa.pub
209Contains the public key for authentication.
210The contents of this file should be added to
211.Pa $HOME/.ssh/authorized_keys2
212on all machines
213where you wish to log in using DSA authentication.
214There is no need to keep the contents of this file secret.
215.El
216.Sh AUTHOR
217Tatu Ylonen <ylo@cs.hut.fi>
218.Pp
219OpenSSH
220is a derivative of the original (free) ssh 1.2.12 release, but with bugs
221removed and newer features re-added.
222Rapidly after the 1.2.12 release,
223newer versions bore successively more restrictive licenses.
224This version of OpenSSH
225.Bl -bullet
226.It
227has all components of a restrictive nature (i.e., patents, see
228.Xr crypto 3 )
229directly removed from the source code; any licensed or patented components
230are chosen from
231external libraries.
232.It
233has been updated to support ssh protocol 1.5.
234.It
235contains added support for
236.Xr kerberos 8
237authentication and ticket passing.
238.It
239supports one-time password authentication with
240.Xr skey 1 .
241.El
242.Sh SEE ALSO
243.Xr ssh 1 ,
244.Xr ssh-add 1 ,
245.Xr ssh-agent 1 ,
246.Xr sshd 8 ,
247.Xr crypto 3
This page took 0.030595 seconds and 5 git commands to generate.