1d74d50a8SDag-Erling Smørgrav.\" $OpenBSD: ssh-keygen.1,v 1.63 2004/08/13 00:01:43 jmc Exp $ 21e8db6e2SBrian Feldman.\" 3511b41d2SMark Murray.\" -*- nroff -*- 4511b41d2SMark Murray.\" 5511b41d2SMark Murray.\" Author: Tatu Ylonen <ylo@cs.hut.fi> 6511b41d2SMark Murray.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 7511b41d2SMark Murray.\" All rights reserved 8511b41d2SMark Murray.\" 9b66f2d16SKris Kennaway.\" As far as I am concerned, the code I have written for this software 10b66f2d16SKris Kennaway.\" can be used freely for any purpose. Any derived versions of this 11b66f2d16SKris Kennaway.\" software must be clearly marked as such, and if the derived work is 12b66f2d16SKris Kennaway.\" incompatible with the protocol description in the RFC file, it must be 13b66f2d16SKris Kennaway.\" called by a name other than "ssh" or "Secure Shell". 14511b41d2SMark Murray.\" 15b66f2d16SKris Kennaway.\" 16b66f2d16SKris Kennaway.\" Copyright (c) 1999,2000 Markus Friedl. All rights reserved. 17b66f2d16SKris Kennaway.\" Copyright (c) 1999 Aaron Campbell. All rights reserved. 18b66f2d16SKris Kennaway.\" Copyright (c) 1999 Theo de Raadt. All rights reserved. 19b66f2d16SKris Kennaway.\" 20b66f2d16SKris Kennaway.\" Redistribution and use in source and binary forms, with or without 21b66f2d16SKris Kennaway.\" modification, are permitted provided that the following conditions 22b66f2d16SKris Kennaway.\" are met: 23b66f2d16SKris Kennaway.\" 1. Redistributions of source code must retain the above copyright 24b66f2d16SKris Kennaway.\" notice, this list of conditions and the following disclaimer. 25b66f2d16SKris Kennaway.\" 2. Redistributions in binary form must reproduce the above copyright 26b66f2d16SKris Kennaway.\" notice, this list of conditions and the following disclaimer in the 27b66f2d16SKris Kennaway.\" documentation and/or other materials provided with the distribution. 28b66f2d16SKris Kennaway.\" 29b66f2d16SKris Kennaway.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 30b66f2d16SKris Kennaway.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 31b66f2d16SKris Kennaway.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 32b66f2d16SKris Kennaway.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 33b66f2d16SKris Kennaway.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 34b66f2d16SKris Kennaway.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 35b66f2d16SKris Kennaway.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 36b66f2d16SKris Kennaway.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 37b66f2d16SKris Kennaway.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 38b66f2d16SKris Kennaway.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 39511b41d2SMark Murray.\" 40511b41d2SMark Murray.Dd September 25, 1999 41511b41d2SMark Murray.Dt SSH-KEYGEN 1 42511b41d2SMark Murray.Os 43511b41d2SMark Murray.Sh NAME 44511b41d2SMark Murray.Nm ssh-keygen 451e8db6e2SBrian Feldman.Nd authentication key generation, management and conversion 46511b41d2SMark Murray.Sh SYNOPSIS 47511b41d2SMark Murray.Nm ssh-keygen 48d0c8c0bcSDag-Erling Smørgrav.Bk -words 491e8db6e2SBrian Feldman.Op Fl q 50511b41d2SMark Murray.Op Fl b Ar bits 51ae1f160dSDag-Erling Smørgrav.Fl t Ar type 52511b41d2SMark Murray.Op Fl N Ar new_passphrase 53511b41d2SMark Murray.Op Fl C Ar comment 54b66f2d16SKris Kennaway.Op Fl f Ar output_keyfile 55d0c8c0bcSDag-Erling Smørgrav.Ek 56511b41d2SMark Murray.Nm ssh-keygen 57511b41d2SMark Murray.Fl p 58511b41d2SMark Murray.Op Fl P Ar old_passphrase 59511b41d2SMark Murray.Op Fl N Ar new_passphrase 60511b41d2SMark Murray.Op Fl f Ar keyfile 61511b41d2SMark Murray.Nm ssh-keygen 621e8db6e2SBrian Feldman.Fl i 63b66f2d16SKris Kennaway.Op Fl f Ar input_keyfile 64a04a10f8SKris Kennaway.Nm ssh-keygen 651e8db6e2SBrian Feldman.Fl e 66b66f2d16SKris Kennaway.Op Fl f Ar input_keyfile 67a04a10f8SKris Kennaway.Nm ssh-keygen 68a04a10f8SKris Kennaway.Fl y 69b66f2d16SKris Kennaway.Op Fl f Ar input_keyfile 70a04a10f8SKris Kennaway.Nm ssh-keygen 71511b41d2SMark Murray.Fl c 72511b41d2SMark Murray.Op Fl P Ar passphrase 73511b41d2SMark Murray.Op Fl C Ar comment 74511b41d2SMark Murray.Op Fl f Ar keyfile 75511b41d2SMark Murray.Nm ssh-keygen 76511b41d2SMark Murray.Fl l 77b66f2d16SKris Kennaway.Op Fl f Ar input_keyfile 78a04a10f8SKris Kennaway.Nm ssh-keygen 791e8db6e2SBrian Feldman.Fl B 801e8db6e2SBrian Feldman.Op Fl f Ar input_keyfile 81ae1f160dSDag-Erling Smørgrav.Nm ssh-keygen 82ae1f160dSDag-Erling Smørgrav.Fl D Ar reader 83ae1f160dSDag-Erling Smørgrav.Nm ssh-keygen 84ae1f160dSDag-Erling Smørgrav.Fl U Ar reader 85ae1f160dSDag-Erling Smørgrav.Op Fl f Ar input_keyfile 86d95e11bfSDag-Erling Smørgrav.Nm ssh-keygen 87d95e11bfSDag-Erling Smørgrav.Fl r Ar hostname 88d95e11bfSDag-Erling Smørgrav.Op Fl f Ar input_keyfile 89d95e11bfSDag-Erling Smørgrav.Op Fl g 90d95e11bfSDag-Erling Smørgrav.Nm ssh-keygen 91d95e11bfSDag-Erling Smørgrav.Fl G Ar output_file 92efcad6b7SDag-Erling Smørgrav.Op Fl v 93d95e11bfSDag-Erling Smørgrav.Op Fl b Ar bits 94d95e11bfSDag-Erling Smørgrav.Op Fl M Ar memory 95d95e11bfSDag-Erling Smørgrav.Op Fl S Ar start_point 96d95e11bfSDag-Erling Smørgrav.Nm ssh-keygen 97d95e11bfSDag-Erling Smørgrav.Fl T Ar output_file 98d95e11bfSDag-Erling Smørgrav.Fl f Ar input_file 99efcad6b7SDag-Erling Smørgrav.Op Fl v 100d95e11bfSDag-Erling Smørgrav.Op Fl a Ar num_trials 101d95e11bfSDag-Erling Smørgrav.Op Fl W Ar generator 102511b41d2SMark Murray.Sh DESCRIPTION 103511b41d2SMark Murray.Nm 1041e8db6e2SBrian Feldmangenerates, manages and converts authentication keys for 105511b41d2SMark Murray.Xr ssh 1 . 106a04a10f8SKris Kennaway.Nm 107ae1f160dSDag-Erling Smørgravcan create RSA keys for use by SSH protocol version 1 and RSA or DSA 108d95e11bfSDag-Erling Smørgravkeys for use by SSH protocol version 2. 109d95e11bfSDag-Erling SmørgravThe type of key to be generated is specified with the 1101e8db6e2SBrian Feldman.Fl t 111ae1f160dSDag-Erling Smørgravoption. 112a04a10f8SKris Kennaway.Pp 113d95e11bfSDag-Erling Smørgrav.Nm 114d95e11bfSDag-Erling Smørgravis also used to generate groups for use in Diffie-Hellman group 115d95e11bfSDag-Erling Smørgravexchange (DH-GEX). 116d95e11bfSDag-Erling SmørgravSee the 117d95e11bfSDag-Erling Smørgrav.Sx MODULI GENERATION 118d95e11bfSDag-Erling Smørgravsection for details. 119d95e11bfSDag-Erling Smørgrav.Pp 120511b41d2SMark MurrayNormally each user wishing to use SSH 121a04a10f8SKris Kennawaywith RSA or DSA authentication runs this once to create the authentication 122511b41d2SMark Murraykey in 1231e8db6e2SBrian Feldman.Pa $HOME/.ssh/identity , 1241e8db6e2SBrian Feldman.Pa $HOME/.ssh/id_dsa 125a04a10f8SKris Kennawayor 1261e8db6e2SBrian Feldman.Pa $HOME/.ssh/id_rsa . 127a04a10f8SKris KennawayAdditionally, the system administrator may use this to generate host keys, 128a04a10f8SKris Kennawayas seen in 129a04a10f8SKris Kennaway.Pa /etc/rc . 130511b41d2SMark Murray.Pp 131511b41d2SMark MurrayNormally this program generates the key and asks for a file in which 132a8f6863aSKris Kennawayto store the private key. 133a8f6863aSKris KennawayThe public key is stored in a file with the same name but 134511b41d2SMark Murray.Dq .pub 135a8f6863aSKris Kennawayappended. 136a8f6863aSKris KennawayThe program also asks for a passphrase. 137a8f6863aSKris KennawayThe passphrase may be empty to indicate no passphrase 1381e8db6e2SBrian Feldman(host keys must have an empty passphrase), or it may be a string of 139a8f6863aSKris Kennawayarbitrary length. 140ae1f160dSDag-Erling SmørgravA passphrase is similar to a password, except it can be a phrase with a 141ae1f160dSDag-Erling Smørgravseries of words, punctuation, numbers, whitespace, or any string of 142ae1f160dSDag-Erling Smørgravcharacters you want. 143ae1f160dSDag-Erling SmørgravGood passphrases are 10-30 characters long, are 144511b41d2SMark Murraynot simple sentences or otherwise easily guessable (English 145ae1f160dSDag-Erling Smørgravprose has only 1-2 bits of entropy per character, and provides very bad 146ae1f160dSDag-Erling Smørgravpassphrases), and contain a mix of upper and lowercase letters, 147ae1f160dSDag-Erling Smørgravnumbers, and non-alphanumeric characters. 148a8f6863aSKris KennawayThe passphrase can be changed later by using the 149511b41d2SMark Murray.Fl p 150511b41d2SMark Murrayoption. 151511b41d2SMark Murray.Pp 152a8f6863aSKris KennawayThere is no way to recover a lost passphrase. 153a8f6863aSKris KennawayIf the passphrase is 154ae1f160dSDag-Erling Smørgravlost or forgotten, a new key must be generated and copied to the 155511b41d2SMark Murraycorresponding public key to other machines. 156511b41d2SMark Murray.Pp 1571e8db6e2SBrian FeldmanFor RSA1 keys, 1581e8db6e2SBrian Feldmanthere is also a comment field in the key file that is only for 159a8f6863aSKris Kennawayconvenience to the user to help identify the key. 160a8f6863aSKris KennawayThe comment can tell what the key is for, or whatever is useful. 161a8f6863aSKris KennawayThe comment is initialized to 162511b41d2SMark Murray.Dq user@host 163511b41d2SMark Murraywhen the key is created, but can be changed using the 164511b41d2SMark Murray.Fl c 165511b41d2SMark Murrayoption. 166511b41d2SMark Murray.Pp 167a04a10f8SKris KennawayAfter a key is generated, instructions below detail where the keys 168a04a10f8SKris Kennawayshould be placed to be activated. 169a04a10f8SKris Kennaway.Pp 170511b41d2SMark MurrayThe options are as follows: 171511b41d2SMark Murray.Bl -tag -width Ds 172d95e11bfSDag-Erling Smørgrav.It Fl a Ar trials 173d95e11bfSDag-Erling SmørgravSpecifies the number of primality tests to perform when screening DH-GEX 174d95e11bfSDag-Erling Smørgravcandidates using the 175d95e11bfSDag-Erling Smørgrav.Fl T 176d95e11bfSDag-Erling Smørgravcommand. 177511b41d2SMark Murray.It Fl b Ar bits 178a8f6863aSKris KennawaySpecifies the number of bits in the key to create. 179a8f6863aSKris KennawayMinimum is 512 bits. 180d0c8c0bcSDag-Erling SmørgravGenerally, 1024 bits is considered sufficient. 181a8f6863aSKris KennawayThe default is 1024 bits. 182511b41d2SMark Murray.It Fl c 183511b41d2SMark MurrayRequests changing the comment in the private and public key files. 184ae1f160dSDag-Erling SmørgravThis operation is only supported for RSA1 keys. 185511b41d2SMark MurrayThe program will prompt for the file containing the private keys, for 186ae1f160dSDag-Erling Smørgravthe passphrase if the key has one, and for the new comment. 1871e8db6e2SBrian Feldman.It Fl e 1881e8db6e2SBrian FeldmanThis option will read a private or public OpenSSH key file and 1891e8db6e2SBrian Feldmanprint the key in a 1901e8db6e2SBrian Feldman.Sq SECSH Public Key File Format 1911e8db6e2SBrian Feldmanto stdout. 1921e8db6e2SBrian FeldmanThis option allows exporting keys for use by several commercial 1931e8db6e2SBrian FeldmanSSH implementations. 194d95e11bfSDag-Erling Smørgrav.It Fl g 195d74d50a8SDag-Erling SmørgravUse generic DNS format when printing fingerprint resource records using the 196d74d50a8SDag-Erling Smørgrav.Fl r 197d74d50a8SDag-Erling Smørgravcommand. 198ae1f160dSDag-Erling Smørgrav.It Fl f Ar filename 199511b41d2SMark MurraySpecifies the filename of the key file. 2001e8db6e2SBrian Feldman.It Fl i 2011e8db6e2SBrian FeldmanThis option will read an unencrypted private (or public) key file 2021e8db6e2SBrian Feldmanin SSH2-compatible format and print an OpenSSH compatible private 2031e8db6e2SBrian Feldman(or public) key to stdout. 2041e8db6e2SBrian Feldman.Nm 2051e8db6e2SBrian Feldmanalso reads the 2061e8db6e2SBrian Feldman.Sq SECSH Public Key File Format . 2071e8db6e2SBrian FeldmanThis option allows importing keys from several commercial 2081e8db6e2SBrian FeldmanSSH implementations. 209511b41d2SMark Murray.It Fl l 210ae1f160dSDag-Erling SmørgravShow fingerprint of specified public key file. 211ae1f160dSDag-Erling SmørgravPrivate RSA1 keys are also supported. 212ae1f160dSDag-Erling SmørgravFor RSA and DSA keys 213ae1f160dSDag-Erling Smørgrav.Nm 214ae1f160dSDag-Erling Smørgravtries to find the matching public key file and prints its fingerprint. 215511b41d2SMark Murray.It Fl p 216511b41d2SMark MurrayRequests changing the passphrase of a private key file instead of 217a8f6863aSKris Kennawaycreating a new private key. 218a8f6863aSKris KennawayThe program will prompt for the file 219511b41d2SMark Murraycontaining the private key, for the old passphrase, and twice for the 220511b41d2SMark Murraynew passphrase. 221511b41d2SMark Murray.It Fl q 222511b41d2SMark MurraySilence 223511b41d2SMark Murray.Nm ssh-keygen . 224511b41d2SMark MurrayUsed by 225511b41d2SMark Murray.Pa /etc/rc 226511b41d2SMark Murraywhen creating a new key. 2271e8db6e2SBrian Feldman.It Fl y 2281e8db6e2SBrian FeldmanThis option will read a private 2291e8db6e2SBrian FeldmanOpenSSH format file and print an OpenSSH public key to stdout. 2301e8db6e2SBrian Feldman.It Fl t Ar type 2311e8db6e2SBrian FeldmanSpecifies the type of the key to create. 2321e8db6e2SBrian FeldmanThe possible values are 2331e8db6e2SBrian Feldman.Dq rsa1 2341e8db6e2SBrian Feldmanfor protocol version 1 and 2351e8db6e2SBrian Feldman.Dq rsa 2361e8db6e2SBrian Feldmanor 2371e8db6e2SBrian Feldman.Dq dsa 2381e8db6e2SBrian Feldmanfor protocol version 2. 2391e8db6e2SBrian Feldman.It Fl B 2401e8db6e2SBrian FeldmanShow the bubblebabble digest of specified private or public key file. 241511b41d2SMark Murray.It Fl C Ar comment 242511b41d2SMark MurrayProvides the new comment. 243ae1f160dSDag-Erling Smørgrav.It Fl D Ar reader 244ae1f160dSDag-Erling SmørgravDownload the RSA public key stored in the smartcard in 245ae1f160dSDag-Erling Smørgrav.Ar reader . 246d95e11bfSDag-Erling Smørgrav.It Fl G Ar output_file 247d95e11bfSDag-Erling SmørgravGenerate candidate primes for DH-GEX. 248d95e11bfSDag-Erling SmørgravThese primes must be screened for 249d95e11bfSDag-Erling Smørgravsafety (using the 250d95e11bfSDag-Erling Smørgrav.Fl T 251d95e11bfSDag-Erling Smørgravoption) before use. 252d95e11bfSDag-Erling Smørgrav.It Fl M Ar memory 253d95e11bfSDag-Erling SmørgravSpecify the amount of memory to use (in megabytes) when generating 254d95e11bfSDag-Erling Smørgravcandidate moduli for DH-GEX. 255511b41d2SMark Murray.It Fl N Ar new_passphrase 256511b41d2SMark MurrayProvides the new passphrase. 257511b41d2SMark Murray.It Fl P Ar passphrase 258511b41d2SMark MurrayProvides the (old) passphrase. 259d95e11bfSDag-Erling Smørgrav.It Fl S Ar start 260d95e11bfSDag-Erling SmørgravSpecify start point (in hex) when generating candidate moduli for DH-GEX. 261d95e11bfSDag-Erling Smørgrav.It Fl T Ar output_file 262d95e11bfSDag-Erling SmørgravTest DH group exchange candidate primes (generated using the 263d95e11bfSDag-Erling Smørgrav.Fl G 264d95e11bfSDag-Erling Smørgravoption) for safety. 265d95e11bfSDag-Erling Smørgrav.It Fl W Ar generator 266d95e11bfSDag-Erling SmørgravSpecify desired generator when testing candidate moduli for DH-GEX. 267ae1f160dSDag-Erling Smørgrav.It Fl U Ar reader 268ae1f160dSDag-Erling SmørgravUpload an existing RSA private key into the smartcard in 269ae1f160dSDag-Erling Smørgrav.Ar reader . 270efcad6b7SDag-Erling Smørgrav.It Fl v 271efcad6b7SDag-Erling SmørgravVerbose mode. 272efcad6b7SDag-Erling SmørgravCauses 273efcad6b7SDag-Erling Smørgrav.Nm 274efcad6b7SDag-Erling Smørgravto print debugging messages about its progress. 275efcad6b7SDag-Erling SmørgravThis is helpful for debugging moduli generation. 276efcad6b7SDag-Erling SmørgravMultiple 277efcad6b7SDag-Erling Smørgrav.Fl v 278efcad6b7SDag-Erling Smørgravoptions increase the verbosity. 279efcad6b7SDag-Erling SmørgravThe maximum is 3. 280d95e11bfSDag-Erling Smørgrav.It Fl r Ar hostname 281d74d50a8SDag-Erling SmørgravPrint the SSHFP fingerprint resource record named 282d74d50a8SDag-Erling Smørgrav.Ar hostname 283d74d50a8SDag-Erling Smørgravfor the specified public key file. 284511b41d2SMark Murray.El 285d95e11bfSDag-Erling Smørgrav.Sh MODULI GENERATION 286d95e11bfSDag-Erling Smørgrav.Nm 287d95e11bfSDag-Erling Smørgravmay be used to generate groups for the Diffie-Hellman Group Exchange 288d95e11bfSDag-Erling Smørgrav(DH-GEX) protocol. 289d95e11bfSDag-Erling SmørgravGenerating these groups is a two-step process: first, candidate 290d95e11bfSDag-Erling Smørgravprimes are generated using a fast, but memory intensive process. 291d95e11bfSDag-Erling SmørgravThese candidate primes are then tested for suitability (a CPU-intensive 292d95e11bfSDag-Erling Smørgravprocess). 293d95e11bfSDag-Erling Smørgrav.Pp 294d95e11bfSDag-Erling SmørgravGeneration of primes is performed using the 295d95e11bfSDag-Erling Smørgrav.Fl G 296d95e11bfSDag-Erling Smørgravoption. 297d95e11bfSDag-Erling SmørgravThe desired length of the primes may be specified by the 298d95e11bfSDag-Erling Smørgrav.Fl b 299d95e11bfSDag-Erling Smørgravoption. 300d95e11bfSDag-Erling SmørgravFor example: 301d95e11bfSDag-Erling Smørgrav.Pp 302d95e11bfSDag-Erling Smørgrav.Dl ssh-keygen -G moduli-2048.candidates -b 2048 303d95e11bfSDag-Erling Smørgrav.Pp 304d95e11bfSDag-Erling SmørgravBy default, the search for primes begins at a random point in the 305d95e11bfSDag-Erling Smørgravdesired length range. 306d95e11bfSDag-Erling SmørgravThis may be overridden using the 307d95e11bfSDag-Erling Smørgrav.Fl S 308d95e11bfSDag-Erling Smørgravoption, which specifies a different start point (in hex). 309d95e11bfSDag-Erling Smørgrav.Pp 310d95e11bfSDag-Erling SmørgravOnce a set of candidates have been generated, they must be tested for 311d95e11bfSDag-Erling Smørgravsuitability. 312d95e11bfSDag-Erling SmørgravThis may be performed using the 313d95e11bfSDag-Erling Smørgrav.Fl T 314d95e11bfSDag-Erling Smørgravoption. 315d95e11bfSDag-Erling SmørgravIn this mode 316d95e11bfSDag-Erling Smørgrav.Nm 317d95e11bfSDag-Erling Smørgravwill read candidates from standard input (or a file specified using the 318d95e11bfSDag-Erling Smørgrav.Fl f 319d95e11bfSDag-Erling Smørgravoption). 320d95e11bfSDag-Erling SmørgravFor example: 321d95e11bfSDag-Erling Smørgrav.Pp 322d95e11bfSDag-Erling Smørgrav.Dl ssh-keygen -T moduli-2048 -f moduli-2048.candidates 323d95e11bfSDag-Erling Smørgrav.Pp 324d95e11bfSDag-Erling SmørgravBy default, each candidate will be subjected to 100 primality tests. 325d95e11bfSDag-Erling SmørgravThis may be overridden using the 326d95e11bfSDag-Erling Smørgrav.Fl a 327d95e11bfSDag-Erling Smørgravoption. 328d95e11bfSDag-Erling SmørgravThe DH generator value will be chosen automatically for the 329d95e11bfSDag-Erling Smørgravprime under consideration. 330d95e11bfSDag-Erling SmørgravIf a specific generator is desired, it may be requested using the 331d95e11bfSDag-Erling Smørgrav.Fl W 332d95e11bfSDag-Erling Smørgravoption. 333d95e11bfSDag-Erling SmørgravValid generator values are 2, 3 and 5. 334d95e11bfSDag-Erling Smørgrav.Pp 335d95e11bfSDag-Erling SmørgravScreened DH groups may be installed in 336d95e11bfSDag-Erling Smørgrav.Pa /etc/moduli . 337d95e11bfSDag-Erling SmørgravIt is important that this file contains moduli of a range of bit lengths and 338d95e11bfSDag-Erling Smørgravthat both ends of a connection share common moduli. 339511b41d2SMark Murray.Sh FILES 340511b41d2SMark Murray.Bl -tag -width Ds 341511b41d2SMark Murray.It Pa $HOME/.ssh/identity 3421e8db6e2SBrian FeldmanContains the protocol version 1 RSA authentication identity of the user. 343a8f6863aSKris KennawayThis file should not be readable by anyone but the user. 344a8f6863aSKris KennawayIt is possible to 345511b41d2SMark Murrayspecify a passphrase when generating the key; that passphrase will be 346a8f6863aSKris Kennawayused to encrypt the private part of this file using 3DES. 347a8f6863aSKris KennawayThis file is not automatically accessed by 348511b41d2SMark Murray.Nm 349511b41d2SMark Murraybut it is offered as the default file for the private key. 350ae1f160dSDag-Erling Smørgrav.Xr ssh 1 351a04a10f8SKris Kennawaywill read this file when a login attempt is made. 352511b41d2SMark Murray.It Pa $HOME/.ssh/identity.pub 3531e8db6e2SBrian FeldmanContains the protocol version 1 RSA public key for authentication. 354a8f6863aSKris KennawayThe contents of this file should be added to 355511b41d2SMark Murray.Pa $HOME/.ssh/authorized_keys 356511b41d2SMark Murrayon all machines 357ae1f160dSDag-Erling Smørgravwhere the user wishes to log in using RSA authentication. 358a8f6863aSKris KennawayThere is no need to keep the contents of this file secret. 359a04a10f8SKris Kennaway.It Pa $HOME/.ssh/id_dsa 3601e8db6e2SBrian FeldmanContains the protocol version 2 DSA authentication identity of the user. 361a04a10f8SKris KennawayThis file should not be readable by anyone but the user. 362a04a10f8SKris KennawayIt is possible to 363a04a10f8SKris Kennawayspecify a passphrase when generating the key; that passphrase will be 364a04a10f8SKris Kennawayused to encrypt the private part of this file using 3DES. 365a04a10f8SKris KennawayThis file is not automatically accessed by 366a04a10f8SKris Kennaway.Nm 367a04a10f8SKris Kennawaybut it is offered as the default file for the private key. 368ae1f160dSDag-Erling Smørgrav.Xr ssh 1 369a04a10f8SKris Kennawaywill read this file when a login attempt is made. 370a04a10f8SKris Kennaway.It Pa $HOME/.ssh/id_dsa.pub 3711e8db6e2SBrian FeldmanContains the protocol version 2 DSA public key for authentication. 372a04a10f8SKris KennawayThe contents of this file should be added to 373ae1f160dSDag-Erling Smørgrav.Pa $HOME/.ssh/authorized_keys 374a04a10f8SKris Kennawayon all machines 375ae1f160dSDag-Erling Smørgravwhere the user wishes to log in using public key authentication. 3761e8db6e2SBrian FeldmanThere is no need to keep the contents of this file secret. 3771e8db6e2SBrian Feldman.It Pa $HOME/.ssh/id_rsa 3781e8db6e2SBrian FeldmanContains the protocol version 2 RSA authentication identity of the user. 3791e8db6e2SBrian FeldmanThis file should not be readable by anyone but the user. 3801e8db6e2SBrian FeldmanIt is possible to 3811e8db6e2SBrian Feldmanspecify a passphrase when generating the key; that passphrase will be 3821e8db6e2SBrian Feldmanused to encrypt the private part of this file using 3DES. 3831e8db6e2SBrian FeldmanThis file is not automatically accessed by 3841e8db6e2SBrian Feldman.Nm 3851e8db6e2SBrian Feldmanbut it is offered as the default file for the private key. 386ae1f160dSDag-Erling Smørgrav.Xr ssh 1 3871e8db6e2SBrian Feldmanwill read this file when a login attempt is made. 3881e8db6e2SBrian Feldman.It Pa $HOME/.ssh/id_rsa.pub 3891e8db6e2SBrian FeldmanContains the protocol version 2 RSA public key for authentication. 3901e8db6e2SBrian FeldmanThe contents of this file should be added to 391ae1f160dSDag-Erling Smørgrav.Pa $HOME/.ssh/authorized_keys 3921e8db6e2SBrian Feldmanon all machines 393ae1f160dSDag-Erling Smørgravwhere the user wishes to log in using public key authentication. 394a04a10f8SKris KennawayThere is no need to keep the contents of this file secret. 395d95e11bfSDag-Erling Smørgrav.It Pa /etc/moduli 396d95e11bfSDag-Erling SmørgravContains Diffie-Hellman groups used for DH-GEX. 397d95e11bfSDag-Erling SmørgravThe file format is described in 398d95e11bfSDag-Erling Smørgrav.Xr moduli 5 . 399b66f2d16SKris Kennaway.El 400511b41d2SMark Murray.Sh SEE ALSO 401511b41d2SMark Murray.Xr ssh 1 , 402511b41d2SMark Murray.Xr ssh-add 1 , 403511b41d2SMark Murray.Xr ssh-agent 1 , 404d95e11bfSDag-Erling Smørgrav.Xr moduli 5 , 4051e8db6e2SBrian Feldman.Xr sshd 8 4061e8db6e2SBrian Feldman.Rs 4071e8db6e2SBrian Feldman.%A J. Galbraith 4081e8db6e2SBrian Feldman.%A R. Thayer 4091e8db6e2SBrian Feldman.%T "SECSH Public Key File Format" 4101e8db6e2SBrian Feldman.%N draft-ietf-secsh-publickeyfile-01.txt 4111e8db6e2SBrian Feldman.%D March 2001 4121e8db6e2SBrian Feldman.%O work in progress material 4131e8db6e2SBrian Feldman.Re 414d95e11bfSDag-Erling Smørgrav.Sh AUTHORS 415d95e11bfSDag-Erling SmørgravOpenSSH is a derivative of the original and free 416d95e11bfSDag-Erling Smørgravssh 1.2.12 release by Tatu Ylonen. 417d95e11bfSDag-Erling SmørgravAaron Campbell, Bob Beck, Markus Friedl, Niels Provos, 418d95e11bfSDag-Erling SmørgravTheo de Raadt and Dug Song 419d95e11bfSDag-Erling Smørgravremoved many bugs, re-added newer features and 420d95e11bfSDag-Erling Smørgravcreated OpenSSH. 421d95e11bfSDag-Erling SmørgravMarkus Friedl contributed the support for SSH 422d95e11bfSDag-Erling Smørgravprotocol versions 1.5 and 2.0. 423