xref: /freebsd/crypto/openssh/ssh-add.1 (revision 1670a1c2a47d10ecccd001970b859caf93cd3b6e)
1.\"	$OpenBSD: ssh-add.1,v 1.52 2010/03/05 10:28:21 djm Exp $
2.\"
3.\"  -*- nroff -*-
4.\"
5.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
6.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
7.\"                    All rights reserved
8.\"
9.\" As far as I am concerned, the code I have written for this software
10.\" can be used freely for any purpose.  Any derived versions of this
11.\" software must be clearly marked as such, and if the derived work is
12.\" incompatible with the protocol description in the RFC file, it must be
13.\" called by a name other than "ssh" or "Secure Shell".
14.\"
15.\"
16.\" Copyright (c) 1999,2000 Markus Friedl.  All rights reserved.
17.\" Copyright (c) 1999 Aaron Campbell.  All rights reserved.
18.\" Copyright (c) 1999 Theo de Raadt.  All rights reserved.
19.\"
20.\" Redistribution and use in source and binary forms, with or without
21.\" modification, are permitted provided that the following conditions
22.\" are met:
23.\" 1. Redistributions of source code must retain the above copyright
24.\"    notice, this list of conditions and the following disclaimer.
25.\" 2. Redistributions in binary form must reproduce the above copyright
26.\"    notice, this list of conditions and the following disclaimer in the
27.\"    documentation and/or other materials provided with the distribution.
28.\"
29.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
30.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
31.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
32.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
33.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
34.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
35.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
36.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
37.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
38.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
39.\"
40.Dd March 5, 2010
41.Dt SSH-ADD 1
42.Os
43.Sh NAME
44.Nm ssh-add
45.Nd adds RSA or DSA identities to the authentication agent
46.Sh SYNOPSIS
47.Nm ssh-add
48.Op Fl cDdLlXx
49.Op Fl t Ar life
50.Op Ar
51.Nm ssh-add
52.Fl s Ar pkcs11
53.Nm ssh-add
54.Fl e Ar pkcs11
55.Sh DESCRIPTION
56.Nm
57adds RSA or DSA identities to the authentication agent,
58.Xr ssh-agent 1 .
59When run without arguments, it adds the files
60.Pa ~/.ssh/id_rsa ,
61.Pa ~/.ssh/id_dsa
62and
63.Pa ~/.ssh/identity .
64After loading a private key,
65.Nm
66will try to load corresponding certificate information from the
67filename obtained by appending
68.Pa -cert.pub
69to the name of the private key file.
70Alternative file names can be given on the command line.
71.Pp
72If any file requires a passphrase,
73.Nm
74asks for the passphrase from the user.
75The passphrase is read from the user's tty.
76.Nm
77retries the last passphrase if multiple identity files are given.
78.Pp
79The authentication agent must be running and the
80.Ev SSH_AUTH_SOCK
81environment variable must contain the name of its socket for
82.Nm
83to work.
84.Pp
85The options are as follows:
86.Bl -tag -width Ds
87.It Fl c
88Indicates that added identities should be subject to confirmation before
89being used for authentication.
90Confirmation is performed by the
91.Ev SSH_ASKPASS
92program mentioned below.
93Successful confirmation is signaled by a zero exit status from the
94.Ev SSH_ASKPASS
95program, rather than text entered into the requester.
96.It Fl D
97Deletes all identities from the agent.
98.It Fl d
99Instead of adding identities, removes identities from the agent.
100If
101.Nm
102has been run without arguments, the keys for the default identities will
103be removed.
104Otherwise, the argument list will be interpreted as a list of paths to
105public key files and matching keys will be removed from the agent.
106If no public key is found at a given path,
107.Nm
108will append
109.Pa .pub
110and retry.
111.It Fl e Ar pkcs11
112Remove keys provided by the PKCS#11 shared library
113.Ar pkcs11 .
114.It Fl L
115Lists public key parameters of all identities currently represented
116by the agent.
117.It Fl l
118Lists fingerprints of all identities currently represented by the agent.
119.It Fl s Ar pkcs11
120Add keys provided by the PKCS#11 shared library
121.Ar pkcs11 .
122.It Fl t Ar life
123Set a maximum lifetime when adding identities to an agent.
124The lifetime may be specified in seconds or in a time format
125specified in
126.Xr sshd_config 5 .
127.It Fl X
128Unlock the agent.
129.It Fl x
130Lock the agent with a password.
131.El
132.Sh ENVIRONMENT
133.Bl -tag -width Ds
134.It Ev "DISPLAY" and "SSH_ASKPASS"
135If
136.Nm
137needs a passphrase, it will read the passphrase from the current
138terminal if it was run from a terminal.
139If
140.Nm
141does not have a terminal associated with it but
142.Ev DISPLAY
143and
144.Ev SSH_ASKPASS
145are set, it will execute the program specified by
146.Ev SSH_ASKPASS
147and open an X11 window to read the passphrase.
148This is particularly useful when calling
149.Nm
150from a
151.Pa .xsession
152or related script.
153(Note that on some machines it
154may be necessary to redirect the input from
155.Pa /dev/null
156to make this work.)
157.It Ev SSH_AUTH_SOCK
158Identifies the path of a
159.Ux Ns -domain
160socket used to communicate with the agent.
161.El
162.Sh FILES
163.Bl -tag -width Ds
164.It Pa ~/.ssh/identity
165Contains the protocol version 1 RSA authentication identity of the user.
166.It Pa ~/.ssh/id_dsa
167Contains the protocol version 2 DSA authentication identity of the user.
168.It Pa ~/.ssh/id_rsa
169Contains the protocol version 2 RSA authentication identity of the user.
170.El
171.Pp
172Identity files should not be readable by anyone but the user.
173Note that
174.Nm
175ignores identity files if they are accessible by others.
176.Sh DIAGNOSTICS
177Exit status is 0 on success, 1 if the specified command fails,
178and 2 if
179.Nm
180is unable to contact the authentication agent.
181.Sh SEE ALSO
182.Xr ssh 1 ,
183.Xr ssh-agent 1 ,
184.Xr ssh-keygen 1 ,
185.Xr sshd 8
186.Sh AUTHORS
187OpenSSH is a derivative of the original and free
188ssh 1.2.12 release by Tatu Ylonen.
189Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos,
190Theo de Raadt and Dug Song
191removed many bugs, re-added newer features and
192created OpenSSH.
193Markus Friedl contributed the support for SSH
194protocol versions 1.5 and 2.0.
195