xref: /freebsd/crypto/openssh/ssh-keygen.1 (revision d95e11bf7e5a59b5c3f81bd8dfc2918ee7d3bada)
1d95e11bfSDag-Erling Smørgrav.\"	$OpenBSD: ssh-keygen.1,v 1.60 2003/07/28 09:49:56 djm Exp $
21e8db6e2SBrian Feldman.\"
3511b41d2SMark Murray.\"  -*- nroff -*-
4511b41d2SMark Murray.\"
5511b41d2SMark Murray.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
6511b41d2SMark Murray.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
7511b41d2SMark Murray.\"                    All rights reserved
8511b41d2SMark Murray.\"
9b66f2d16SKris Kennaway.\" As far as I am concerned, the code I have written for this software
10b66f2d16SKris Kennaway.\" can be used freely for any purpose.  Any derived versions of this
11b66f2d16SKris Kennaway.\" software must be clearly marked as such, and if the derived work is
12b66f2d16SKris Kennaway.\" incompatible with the protocol description in the RFC file, it must be
13b66f2d16SKris Kennaway.\" called by a name other than "ssh" or "Secure Shell".
14511b41d2SMark Murray.\"
15b66f2d16SKris Kennaway.\"
16b66f2d16SKris Kennaway.\" Copyright (c) 1999,2000 Markus Friedl.  All rights reserved.
17b66f2d16SKris Kennaway.\" Copyright (c) 1999 Aaron Campbell.  All rights reserved.
18b66f2d16SKris Kennaway.\" Copyright (c) 1999 Theo de Raadt.  All rights reserved.
19b66f2d16SKris Kennaway.\"
20b66f2d16SKris Kennaway.\" Redistribution and use in source and binary forms, with or without
21b66f2d16SKris Kennaway.\" modification, are permitted provided that the following conditions
22b66f2d16SKris Kennaway.\" are met:
23b66f2d16SKris Kennaway.\" 1. Redistributions of source code must retain the above copyright
24b66f2d16SKris Kennaway.\"    notice, this list of conditions and the following disclaimer.
25b66f2d16SKris Kennaway.\" 2. Redistributions in binary form must reproduce the above copyright
26b66f2d16SKris Kennaway.\"    notice, this list of conditions and the following disclaimer in the
27b66f2d16SKris Kennaway.\"    documentation and/or other materials provided with the distribution.
28b66f2d16SKris Kennaway.\"
29b66f2d16SKris Kennaway.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
30b66f2d16SKris Kennaway.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
31b66f2d16SKris Kennaway.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
32b66f2d16SKris Kennaway.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
33b66f2d16SKris Kennaway.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
34b66f2d16SKris Kennaway.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
35b66f2d16SKris Kennaway.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
36b66f2d16SKris Kennaway.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
37b66f2d16SKris Kennaway.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
38b66f2d16SKris Kennaway.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
39511b41d2SMark Murray.\"
40511b41d2SMark Murray.Dd September 25, 1999
41511b41d2SMark Murray.Dt SSH-KEYGEN 1
42511b41d2SMark Murray.Os
43511b41d2SMark Murray.Sh NAME
44511b41d2SMark Murray.Nm ssh-keygen
451e8db6e2SBrian Feldman.Nd authentication key generation, management and conversion
46511b41d2SMark Murray.Sh SYNOPSIS
47511b41d2SMark Murray.Nm ssh-keygen
48d0c8c0bcSDag-Erling Smørgrav.Bk -words
491e8db6e2SBrian Feldman.Op Fl q
50511b41d2SMark Murray.Op Fl b Ar bits
51ae1f160dSDag-Erling Smørgrav.Fl t Ar type
52511b41d2SMark Murray.Op Fl N Ar new_passphrase
53511b41d2SMark Murray.Op Fl C Ar comment
54b66f2d16SKris Kennaway.Op Fl f Ar output_keyfile
55d0c8c0bcSDag-Erling Smørgrav.Ek
56511b41d2SMark Murray.Nm ssh-keygen
57511b41d2SMark Murray.Fl p
58511b41d2SMark Murray.Op Fl P Ar old_passphrase
59511b41d2SMark Murray.Op Fl N Ar new_passphrase
60511b41d2SMark Murray.Op Fl f Ar keyfile
61511b41d2SMark Murray.Nm ssh-keygen
621e8db6e2SBrian Feldman.Fl i
63b66f2d16SKris Kennaway.Op Fl f Ar input_keyfile
64a04a10f8SKris Kennaway.Nm ssh-keygen
651e8db6e2SBrian Feldman.Fl e
66b66f2d16SKris Kennaway.Op Fl f Ar input_keyfile
67a04a10f8SKris Kennaway.Nm ssh-keygen
68a04a10f8SKris Kennaway.Fl y
69b66f2d16SKris Kennaway.Op Fl f Ar input_keyfile
70a04a10f8SKris Kennaway.Nm ssh-keygen
71511b41d2SMark Murray.Fl c
72511b41d2SMark Murray.Op Fl P Ar passphrase
73511b41d2SMark Murray.Op Fl C Ar comment
74511b41d2SMark Murray.Op Fl f Ar keyfile
75511b41d2SMark Murray.Nm ssh-keygen
76511b41d2SMark Murray.Fl l
77b66f2d16SKris Kennaway.Op Fl f Ar input_keyfile
78a04a10f8SKris Kennaway.Nm ssh-keygen
791e8db6e2SBrian Feldman.Fl B
801e8db6e2SBrian Feldman.Op Fl f Ar input_keyfile
81ae1f160dSDag-Erling Smørgrav.Nm ssh-keygen
82ae1f160dSDag-Erling Smørgrav.Fl D Ar reader
83ae1f160dSDag-Erling Smørgrav.Nm ssh-keygen
84ae1f160dSDag-Erling Smørgrav.Fl U Ar reader
85ae1f160dSDag-Erling Smørgrav.Op Fl f Ar input_keyfile
86d95e11bfSDag-Erling Smørgrav.Nm ssh-keygen
87d95e11bfSDag-Erling Smørgrav.Fl r Ar hostname
88d95e11bfSDag-Erling Smørgrav.Op Fl f Ar input_keyfile
89d95e11bfSDag-Erling Smørgrav.Op Fl g
90d95e11bfSDag-Erling Smørgrav.Nm ssh-keygen
91d95e11bfSDag-Erling Smørgrav.Fl G Ar output_file
92d95e11bfSDag-Erling Smørgrav.Op Fl b Ar bits
93d95e11bfSDag-Erling Smørgrav.Op Fl M Ar memory
94d95e11bfSDag-Erling Smørgrav.Op Fl S Ar start_point
95d95e11bfSDag-Erling Smørgrav.Nm ssh-keygen
96d95e11bfSDag-Erling Smørgrav.Fl T Ar output_file
97d95e11bfSDag-Erling Smørgrav.Fl f Ar input_file
98d95e11bfSDag-Erling Smørgrav.Op Fl a Ar num_trials
99d95e11bfSDag-Erling Smørgrav.Op Fl W Ar generator
100511b41d2SMark Murray.Sh DESCRIPTION
101511b41d2SMark Murray.Nm
1021e8db6e2SBrian Feldmangenerates, manages and converts authentication keys for
103511b41d2SMark Murray.Xr ssh 1 .
104a04a10f8SKris Kennaway.Nm
105ae1f160dSDag-Erling Smørgravcan create RSA keys for use by SSH protocol version 1 and RSA or DSA
106d95e11bfSDag-Erling Smørgravkeys for use by SSH protocol version 2.
107d95e11bfSDag-Erling SmørgravThe type of key to be generated is specified with the
1081e8db6e2SBrian Feldman.Fl t
109ae1f160dSDag-Erling Smørgravoption.
110a04a10f8SKris Kennaway.Pp
111d95e11bfSDag-Erling Smørgrav.Nm
112d95e11bfSDag-Erling Smørgravis also used to generate groups for use in Diffie-Hellman group
113d95e11bfSDag-Erling Smørgravexchange (DH-GEX).
114d95e11bfSDag-Erling SmørgravSee the
115d95e11bfSDag-Erling Smørgrav.Sx MODULI GENERATION
116d95e11bfSDag-Erling Smørgravsection for details.
117d95e11bfSDag-Erling Smørgrav.Pp
118511b41d2SMark MurrayNormally each user wishing to use SSH
119a04a10f8SKris Kennawaywith RSA or DSA authentication runs this once to create the authentication
120511b41d2SMark Murraykey in
1211e8db6e2SBrian Feldman.Pa $HOME/.ssh/identity ,
1221e8db6e2SBrian Feldman.Pa $HOME/.ssh/id_dsa
123a04a10f8SKris Kennawayor
1241e8db6e2SBrian Feldman.Pa $HOME/.ssh/id_rsa .
125a04a10f8SKris KennawayAdditionally, the system administrator may use this to generate host keys,
126a04a10f8SKris Kennawayas seen in
127a04a10f8SKris Kennaway.Pa /etc/rc .
128511b41d2SMark Murray.Pp
129511b41d2SMark MurrayNormally this program generates the key and asks for a file in which
130a8f6863aSKris Kennawayto store the private key.
131a8f6863aSKris KennawayThe public key is stored in a file with the same name but
132511b41d2SMark Murray.Dq .pub
133a8f6863aSKris Kennawayappended.
134a8f6863aSKris KennawayThe program also asks for a passphrase.
135a8f6863aSKris KennawayThe passphrase may be empty to indicate no passphrase
1361e8db6e2SBrian Feldman(host keys must have an empty passphrase), or it may be a string of
137a8f6863aSKris Kennawayarbitrary length.
138ae1f160dSDag-Erling SmørgravA passphrase is similar to a password, except it can be a phrase with a
139ae1f160dSDag-Erling Smørgravseries of words, punctuation, numbers, whitespace, or any string of
140ae1f160dSDag-Erling Smørgravcharacters you want.
141ae1f160dSDag-Erling SmørgravGood passphrases are 10-30 characters long, are
142511b41d2SMark Murraynot simple sentences or otherwise easily guessable (English
143ae1f160dSDag-Erling Smørgravprose has only 1-2 bits of entropy per character, and provides very bad
144ae1f160dSDag-Erling Smørgravpassphrases), and contain a mix of upper and lowercase letters,
145ae1f160dSDag-Erling Smørgravnumbers, and non-alphanumeric characters.
146a8f6863aSKris KennawayThe passphrase can be changed later by using the
147511b41d2SMark Murray.Fl p
148511b41d2SMark Murrayoption.
149511b41d2SMark Murray.Pp
150a8f6863aSKris KennawayThere is no way to recover a lost passphrase.
151a8f6863aSKris KennawayIf the passphrase is
152ae1f160dSDag-Erling Smørgravlost or forgotten, a new key must be generated and copied to the
153511b41d2SMark Murraycorresponding public key to other machines.
154511b41d2SMark Murray.Pp
1551e8db6e2SBrian FeldmanFor RSA1 keys,
1561e8db6e2SBrian Feldmanthere is also a comment field in the key file that is only for
157a8f6863aSKris Kennawayconvenience to the user to help identify the key.
158a8f6863aSKris KennawayThe comment can tell what the key is for, or whatever is useful.
159a8f6863aSKris KennawayThe comment is initialized to
160511b41d2SMark Murray.Dq user@host
161511b41d2SMark Murraywhen the key is created, but can be changed using the
162511b41d2SMark Murray.Fl c
163511b41d2SMark Murrayoption.
164511b41d2SMark Murray.Pp
165a04a10f8SKris KennawayAfter a key is generated, instructions below detail where the keys
166a04a10f8SKris Kennawayshould be placed to be activated.
167a04a10f8SKris Kennaway.Pp
168511b41d2SMark MurrayThe options are as follows:
169511b41d2SMark Murray.Bl -tag -width Ds
170d95e11bfSDag-Erling Smørgrav.It Fl a Ar trials
171d95e11bfSDag-Erling SmørgravSpecifies the number of primality tests to perform when screening DH-GEX
172d95e11bfSDag-Erling Smørgravcandidates using the
173d95e11bfSDag-Erling Smørgrav.Fl T
174d95e11bfSDag-Erling Smørgravcommand.
175511b41d2SMark Murray.It Fl b Ar bits
176a8f6863aSKris KennawaySpecifies the number of bits in the key to create.
177a8f6863aSKris KennawayMinimum is 512 bits.
178d0c8c0bcSDag-Erling SmørgravGenerally, 1024 bits is considered sufficient.
179a8f6863aSKris KennawayThe default is 1024 bits.
180511b41d2SMark Murray.It Fl c
181511b41d2SMark MurrayRequests changing the comment in the private and public key files.
182ae1f160dSDag-Erling SmørgravThis operation is only supported for RSA1 keys.
183511b41d2SMark MurrayThe program will prompt for the file containing the private keys, for
184ae1f160dSDag-Erling Smørgravthe passphrase if the key has one, and for the new comment.
1851e8db6e2SBrian Feldman.It Fl e
1861e8db6e2SBrian FeldmanThis option will read a private or public OpenSSH key file and
1871e8db6e2SBrian Feldmanprint the key in a
1881e8db6e2SBrian Feldman.Sq SECSH Public Key File Format
1891e8db6e2SBrian Feldmanto stdout.
1901e8db6e2SBrian FeldmanThis option allows exporting keys for use by several commercial
1911e8db6e2SBrian FeldmanSSH implementations.
192d95e11bfSDag-Erling Smørgrav.It Fl g
193d95e11bfSDag-Erling SmørgravUse generic DNS resource record format.
194ae1f160dSDag-Erling Smørgrav.It Fl f Ar filename
195511b41d2SMark MurraySpecifies the filename of the key file.
1961e8db6e2SBrian Feldman.It Fl i
1971e8db6e2SBrian FeldmanThis option will read an unencrypted private (or public) key file
1981e8db6e2SBrian Feldmanin SSH2-compatible format and print an OpenSSH compatible private
1991e8db6e2SBrian Feldman(or public) key to stdout.
2001e8db6e2SBrian Feldman.Nm
2011e8db6e2SBrian Feldmanalso reads the
2021e8db6e2SBrian Feldman.Sq SECSH Public Key File Format .
2031e8db6e2SBrian FeldmanThis option allows importing keys from several commercial
2041e8db6e2SBrian FeldmanSSH implementations.
205511b41d2SMark Murray.It Fl l
206ae1f160dSDag-Erling SmørgravShow fingerprint of specified public key file.
207ae1f160dSDag-Erling SmørgravPrivate RSA1 keys are also supported.
208ae1f160dSDag-Erling SmørgravFor RSA and DSA keys
209ae1f160dSDag-Erling Smørgrav.Nm
210ae1f160dSDag-Erling Smørgravtries to find the matching public key file and prints its fingerprint.
211511b41d2SMark Murray.It Fl p
212511b41d2SMark MurrayRequests changing the passphrase of a private key file instead of
213a8f6863aSKris Kennawaycreating a new private key.
214a8f6863aSKris KennawayThe program will prompt for the file
215511b41d2SMark Murraycontaining the private key, for the old passphrase, and twice for the
216511b41d2SMark Murraynew passphrase.
217511b41d2SMark Murray.It Fl q
218511b41d2SMark MurraySilence
219511b41d2SMark Murray.Nm ssh-keygen .
220511b41d2SMark MurrayUsed by
221511b41d2SMark Murray.Pa /etc/rc
222511b41d2SMark Murraywhen creating a new key.
2231e8db6e2SBrian Feldman.It Fl y
2241e8db6e2SBrian FeldmanThis option will read a private
2251e8db6e2SBrian FeldmanOpenSSH format file and print an OpenSSH public key to stdout.
2261e8db6e2SBrian Feldman.It Fl t Ar type
2271e8db6e2SBrian FeldmanSpecifies the type of the key to create.
2281e8db6e2SBrian FeldmanThe possible values are
2291e8db6e2SBrian Feldman.Dq rsa1
2301e8db6e2SBrian Feldmanfor protocol version 1 and
2311e8db6e2SBrian Feldman.Dq rsa
2321e8db6e2SBrian Feldmanor
2331e8db6e2SBrian Feldman.Dq dsa
2341e8db6e2SBrian Feldmanfor protocol version 2.
2351e8db6e2SBrian Feldman.It Fl B
2361e8db6e2SBrian FeldmanShow the bubblebabble digest of specified private or public key file.
237511b41d2SMark Murray.It Fl C Ar comment
238511b41d2SMark MurrayProvides the new comment.
239ae1f160dSDag-Erling Smørgrav.It Fl D Ar reader
240ae1f160dSDag-Erling SmørgravDownload the RSA public key stored in the smartcard in
241ae1f160dSDag-Erling Smørgrav.Ar reader .
242d95e11bfSDag-Erling Smørgrav.It Fl G Ar output_file
243d95e11bfSDag-Erling SmørgravGenerate candidate primes for DH-GEX.
244d95e11bfSDag-Erling SmørgravThese primes must be screened for
245d95e11bfSDag-Erling Smørgravsafety (using the
246d95e11bfSDag-Erling Smørgrav.Fl T
247d95e11bfSDag-Erling Smørgravoption) before use.
248d95e11bfSDag-Erling Smørgrav.It Fl M Ar memory
249d95e11bfSDag-Erling SmørgravSpecify the amount of memory to use (in megabytes) when generating
250d95e11bfSDag-Erling Smørgravcandidate moduli for DH-GEX.
251511b41d2SMark Murray.It Fl N Ar new_passphrase
252511b41d2SMark MurrayProvides the new passphrase.
253511b41d2SMark Murray.It Fl P Ar passphrase
254511b41d2SMark MurrayProvides the (old) passphrase.
255d95e11bfSDag-Erling Smørgrav.It Fl S Ar start
256d95e11bfSDag-Erling SmørgravSpecify start point (in hex) when generating candidate moduli for DH-GEX.
257d95e11bfSDag-Erling Smørgrav.It Fl T Ar output_file
258d95e11bfSDag-Erling SmørgravTest DH group exchange candidate primes (generated using the
259d95e11bfSDag-Erling Smørgrav.Fl G
260d95e11bfSDag-Erling Smørgravoption) for safety.
261d95e11bfSDag-Erling Smørgrav.It Fl W Ar generator
262d95e11bfSDag-Erling SmørgravSpecify desired generator when testing candidate moduli for DH-GEX.
263ae1f160dSDag-Erling Smørgrav.It Fl U Ar reader
264ae1f160dSDag-Erling SmørgravUpload an existing RSA private key into the smartcard in
265ae1f160dSDag-Erling Smørgrav.Ar reader .
266d95e11bfSDag-Erling Smørgrav.It Fl r Ar hostname
267d95e11bfSDag-Erling SmørgravPrint DNS resource record with the specified
268d95e11bfSDag-Erling Smørgrav.Ar hostname .
269511b41d2SMark Murray.El
270d95e11bfSDag-Erling Smørgrav.Sh MODULI GENERATION
271d95e11bfSDag-Erling Smørgrav.Nm
272d95e11bfSDag-Erling Smørgravmay be used to generate groups for the Diffie-Hellman Group Exchange
273d95e11bfSDag-Erling Smørgrav(DH-GEX) protocol.
274d95e11bfSDag-Erling SmørgravGenerating these groups is a two-step process: first, candidate
275d95e11bfSDag-Erling Smørgravprimes are generated using a fast, but memory intensive process.
276d95e11bfSDag-Erling SmørgravThese candidate primes are then tested for suitability (a CPU-intensive
277d95e11bfSDag-Erling Smørgravprocess).
278d95e11bfSDag-Erling Smørgrav.Pp
279d95e11bfSDag-Erling SmørgravGeneration of primes is performed using the
280d95e11bfSDag-Erling Smørgrav.Fl G
281d95e11bfSDag-Erling Smørgravoption.
282d95e11bfSDag-Erling SmørgravThe desired length of the primes may be specified by the
283d95e11bfSDag-Erling Smørgrav.Fl b
284d95e11bfSDag-Erling Smørgravoption.
285d95e11bfSDag-Erling SmørgravFor example:
286d95e11bfSDag-Erling Smørgrav.Pp
287d95e11bfSDag-Erling Smørgrav.Dl ssh-keygen -G moduli-2048.candidates -b 2048
288d95e11bfSDag-Erling Smørgrav.Pp
289d95e11bfSDag-Erling SmørgravBy default, the search for primes begins at a random point in the
290d95e11bfSDag-Erling Smørgravdesired length range.
291d95e11bfSDag-Erling SmørgravThis may be overridden using the
292d95e11bfSDag-Erling Smørgrav.Fl S
293d95e11bfSDag-Erling Smørgravoption, which specifies a different start point (in hex).
294d95e11bfSDag-Erling Smørgrav.Pp
295d95e11bfSDag-Erling SmørgravOnce a set of candidates have been generated, they must be tested for
296d95e11bfSDag-Erling Smørgravsuitability.
297d95e11bfSDag-Erling SmørgravThis may be performed using the
298d95e11bfSDag-Erling Smørgrav.Fl T
299d95e11bfSDag-Erling Smørgravoption.
300d95e11bfSDag-Erling SmørgravIn this mode
301d95e11bfSDag-Erling Smørgrav.Nm
302d95e11bfSDag-Erling Smørgravwill read candidates from standard input (or a file specified using the
303d95e11bfSDag-Erling Smørgrav.Fl f
304d95e11bfSDag-Erling Smørgravoption).
305d95e11bfSDag-Erling SmørgravFor example:
306d95e11bfSDag-Erling Smørgrav.Pp
307d95e11bfSDag-Erling Smørgrav.Dl ssh-keygen -T moduli-2048 -f moduli-2048.candidates
308d95e11bfSDag-Erling Smørgrav.Pp
309d95e11bfSDag-Erling SmørgravBy default, each candidate will be subjected to 100 primality tests.
310d95e11bfSDag-Erling SmørgravThis may be overridden using the
311d95e11bfSDag-Erling Smørgrav.Fl a
312d95e11bfSDag-Erling Smørgravoption.
313d95e11bfSDag-Erling SmørgravThe DH generator value will be chosen automatically for the
314d95e11bfSDag-Erling Smørgravprime under consideration.
315d95e11bfSDag-Erling SmørgravIf a specific generator is desired, it may be requested using the
316d95e11bfSDag-Erling Smørgrav.Fl W
317d95e11bfSDag-Erling Smørgravoption.
318d95e11bfSDag-Erling SmørgravValid generator values are 2, 3 and 5.
319d95e11bfSDag-Erling Smørgrav.Pp
320d95e11bfSDag-Erling SmørgravScreened DH groups may be installed in
321d95e11bfSDag-Erling Smørgrav.Pa /etc/moduli .
322d95e11bfSDag-Erling SmørgravIt is important that this file contains moduli of a range of bit lengths and
323d95e11bfSDag-Erling Smørgravthat both ends of a connection share common moduli.
324511b41d2SMark Murray.Sh FILES
325511b41d2SMark Murray.Bl -tag -width Ds
326511b41d2SMark Murray.It Pa $HOME/.ssh/identity
3271e8db6e2SBrian FeldmanContains the protocol version 1 RSA authentication identity of the user.
328a8f6863aSKris KennawayThis file should not be readable by anyone but the user.
329a8f6863aSKris KennawayIt is possible to
330511b41d2SMark Murrayspecify a passphrase when generating the key; that passphrase will be
331a8f6863aSKris Kennawayused to encrypt the private part of this file using 3DES.
332a8f6863aSKris KennawayThis file is not automatically accessed by
333511b41d2SMark Murray.Nm
334511b41d2SMark Murraybut it is offered as the default file for the private key.
335ae1f160dSDag-Erling Smørgrav.Xr ssh 1
336a04a10f8SKris Kennawaywill read this file when a login attempt is made.
337511b41d2SMark Murray.It Pa $HOME/.ssh/identity.pub
3381e8db6e2SBrian FeldmanContains the protocol version 1 RSA public key for authentication.
339a8f6863aSKris KennawayThe contents of this file should be added to
340511b41d2SMark Murray.Pa $HOME/.ssh/authorized_keys
341511b41d2SMark Murrayon all machines
342ae1f160dSDag-Erling Smørgravwhere the user wishes to log in using RSA authentication.
343a8f6863aSKris KennawayThere is no need to keep the contents of this file secret.
344a04a10f8SKris Kennaway.It Pa $HOME/.ssh/id_dsa
3451e8db6e2SBrian FeldmanContains the protocol version 2 DSA authentication identity of the user.
346a04a10f8SKris KennawayThis file should not be readable by anyone but the user.
347a04a10f8SKris KennawayIt is possible to
348a04a10f8SKris Kennawayspecify a passphrase when generating the key; that passphrase will be
349a04a10f8SKris Kennawayused to encrypt the private part of this file using 3DES.
350a04a10f8SKris KennawayThis file is not automatically accessed by
351a04a10f8SKris Kennaway.Nm
352a04a10f8SKris Kennawaybut it is offered as the default file for the private key.
353ae1f160dSDag-Erling Smørgrav.Xr ssh 1
354a04a10f8SKris Kennawaywill read this file when a login attempt is made.
355a04a10f8SKris Kennaway.It Pa $HOME/.ssh/id_dsa.pub
3561e8db6e2SBrian FeldmanContains the protocol version 2 DSA public key for authentication.
357a04a10f8SKris KennawayThe contents of this file should be added to
358ae1f160dSDag-Erling Smørgrav.Pa $HOME/.ssh/authorized_keys
359a04a10f8SKris Kennawayon all machines
360ae1f160dSDag-Erling Smørgravwhere the user wishes to log in using public key authentication.
3611e8db6e2SBrian FeldmanThere is no need to keep the contents of this file secret.
3621e8db6e2SBrian Feldman.It Pa $HOME/.ssh/id_rsa
3631e8db6e2SBrian FeldmanContains the protocol version 2 RSA authentication identity of the user.
3641e8db6e2SBrian FeldmanThis file should not be readable by anyone but the user.
3651e8db6e2SBrian FeldmanIt is possible to
3661e8db6e2SBrian Feldmanspecify a passphrase when generating the key; that passphrase will be
3671e8db6e2SBrian Feldmanused to encrypt the private part of this file using 3DES.
3681e8db6e2SBrian FeldmanThis file is not automatically accessed by
3691e8db6e2SBrian Feldman.Nm
3701e8db6e2SBrian Feldmanbut it is offered as the default file for the private key.
371ae1f160dSDag-Erling Smørgrav.Xr ssh 1
3721e8db6e2SBrian Feldmanwill read this file when a login attempt is made.
3731e8db6e2SBrian Feldman.It Pa $HOME/.ssh/id_rsa.pub
3741e8db6e2SBrian FeldmanContains the protocol version 2 RSA public key for authentication.
3751e8db6e2SBrian FeldmanThe contents of this file should be added to
376ae1f160dSDag-Erling Smørgrav.Pa $HOME/.ssh/authorized_keys
3771e8db6e2SBrian Feldmanon all machines
378ae1f160dSDag-Erling Smørgravwhere the user wishes to log in using public key authentication.
379a04a10f8SKris KennawayThere is no need to keep the contents of this file secret.
380d95e11bfSDag-Erling Smørgrav.It Pa /etc/moduli
381d95e11bfSDag-Erling SmørgravContains Diffie-Hellman groups used for DH-GEX.
382d95e11bfSDag-Erling SmørgravThe file format is described in
383d95e11bfSDag-Erling Smørgrav.Xr moduli 5 .
384b66f2d16SKris Kennaway.El
385511b41d2SMark Murray.Sh SEE ALSO
386511b41d2SMark Murray.Xr ssh 1 ,
387511b41d2SMark Murray.Xr ssh-add 1 ,
388511b41d2SMark Murray.Xr ssh-agent 1 ,
389d95e11bfSDag-Erling Smørgrav.Xr moduli 5 ,
3901e8db6e2SBrian Feldman.Xr sshd 8
3911e8db6e2SBrian Feldman.Rs
3921e8db6e2SBrian Feldman.%A J. Galbraith
3931e8db6e2SBrian Feldman.%A R. Thayer
3941e8db6e2SBrian Feldman.%T "SECSH Public Key File Format"
3951e8db6e2SBrian Feldman.%N draft-ietf-secsh-publickeyfile-01.txt
3961e8db6e2SBrian Feldman.%D March 2001
3971e8db6e2SBrian Feldman.%O work in progress material
3981e8db6e2SBrian Feldman.Re
399d95e11bfSDag-Erling Smørgrav.Sh AUTHORS
400d95e11bfSDag-Erling SmørgravOpenSSH is a derivative of the original and free
401d95e11bfSDag-Erling Smørgravssh 1.2.12 release by Tatu Ylonen.
402d95e11bfSDag-Erling SmørgravAaron Campbell, Bob Beck, Markus Friedl, Niels Provos,
403d95e11bfSDag-Erling SmørgravTheo de Raadt and Dug Song
404d95e11bfSDag-Erling Smørgravremoved many bugs, re-added newer features and
405d95e11bfSDag-Erling Smørgravcreated OpenSSH.
406d95e11bfSDag-Erling SmørgravMarkus Friedl contributed the support for SSH
407d95e11bfSDag-Erling Smørgravprotocol versions 1.5 and 2.0.
408