![]()
|
SYNOPSIS ssh-keygen [-q] [-b bits] [-t type] [-N new_passphrase] [-C comment] [-f output_keyfile] ssh-keygen -p [-P old_passphrase] [-N new_passphrase] [-f keyfile] ssh-keygen -i [-f input_keyfile] ssh-keygen -e [-f input_keyfile] ssh-keygen -y [-f input_keyfile] ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile] ssh-keygen -l [-f input_keyfile] ssh-keygen -B [-f input_keyfile] ssh-keygen -D reader ssh-keygen -U reader [-f input_keyfile] DESCRIPTION ssh-keygen generates, manages and converts authentication keys for ssh(1). ssh-keygen defaults to generating a RSA1 key for use by SSH proM-- tocol version 1. Specifying the -t option instead creates a key for use by SSH protocol version 2. Normally each user wishing to use SSH with RSA or DSA au- thentication runs this once to create the authentication key in $HOME/.ssh/identity, $HOME/.ssh/id_dsa or $HOME/.ssh/id_rsa. Additionally, the system adminM-- istrator may use this to generate host keys, as seen in /etc/rc. Normally this program generates the key and asks for a file in which to store the private key. The public key is stored in a file with the same name but ``.pub'' appended. The program also asks for a passphrase. The passphrase may be empty to indicate no passphrase (host keys must have an empty passphrase), or it may be a string of arbitrary length. Good passphrases are 10-30 characters long and are not simple sentences or otherwise easily guessable (English prose has only 1-2 bits of entropy per character, and provides very bad passphrases). The passphrase can be changed later by using the -p option. There is no way to recover a lost passphrase. If the After a key is generated, instructions below detail where the keys should be placed to be activated. The options are as follows: -b bits Specifies the number of bits in the key to create. Minimum is 512 bits. Generally 1024 bits is considered suffi- cient, and key sizes above that no longer improve security but make things slower. The default is 1024 bits. -c Requests changing the comment in the private and public key files. This operation is only supported for RSA1 keys. The proM-- gram will prompt for the file containing the private keys, for the passphrase if the key has one, and for the new comment. -e This option will read a private or public OpenSSH key file and print the key in a `SECSH Public Key File Format' to stdout. This option allows exporting keys for use by several commercial SSH implementations. -f filename Specifies the filename of the key file. -i This option will read an unencrypted private (or public) key file in SSH2-compatible format and print an OpenSSH com- patible private (or public) key to stdout. ssh-keygen also reads the `SECSH Public Key File Format'. This option allows import- ing keys from several commercial SSH implementations. -l Show fingerprint of specified public key file. Pri- vate RSA1 keys are also supported. For RSA and DSA keys ssh-keygen tries to find the matching public key file and prints its fingerprint. OpenSSH public key to stdout. -t type Specifies the type of the key to create. The possi- ble values are ``rsa1'' for protocol version 1 and ``rsa'' or ``dsa'' for protoM-- col version 2. The default is ``rsa1''. -B Show the bubblebabble digest of specified private or public key file. -C comment Provides the new comment. -D reader Download the RSA public key stored in the smartcard in reader. -N new_passphrase Provides the new passphrase. -P passphrase Provides the (old) passphrase. -U reader Upload an existing RSA private key into the smart- card in reader. FILES $HOME/.ssh/identity Contains the protocol version 1 RSA authentication identity of the user. This file should not be readable by any- one but the user. It is possible to specify a passphrase when generating the key; that passphrase will be used to encrypt the private part of this file using 3DES. This file is not automatical- ly accessed by ssh-keygen but it is offered as the default file for the private key. ssh(1) will read this file when a login at- tempt is made. $HOME/.ssh/identity.pub Contains the protocol version 1 RSA public key for authenticaM-- tion. The contents of this file should be added to $HOME/.ssh/authorized_keys on all machines where the this file using 3DES. This file is not automatical- ly accessed by ssh-keygen but it is offered as the default file for the private key. ssh(1) will read this file when a login at- tempt is made. $HOME/.ssh/id_dsa.pub Contains the protocol version 2 DSA public key for authenticaM-- tion. The contents of this file should be added to $HOME/.ssh/authorized_keys on all machines where the user wishes to log in using public key authentication. There is no need to keep the contents of this file secret. $HOME/.ssh/id_rsa Contains the protocol version 2 RSA authentication identity of the user. This file should not be readable by any- one but the user. It is possible to specify a passphrase when generating the key; that passphrase will be used to encrypt the private part of this file using 3DES. This file is not automatical- ly accessed by ssh-keygen but it is offered as the default file for the private key. ssh(1) will read this file when a login at- tempt is made. $HOME/.ssh/id_rsa.pub Contains the protocol version 2 RSA public key for authenticaM-- tion. The contents of this file should be added to $HOME/.ssh/authorized_keys on all machines where the user wishes to log in using public key authentication. There is no need to keep the contents of this file secret. AUTHORS OpenSSH is a derivative of the original and free ssh 1.2.12 release by Tatu Ylonen. Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo de Raadt and Dug Song removed many bugs, re-added newer fea- tures and creM-- ated OpenSSH. Markus Friedl contributed the support for SSH protocol Man(1) output converted with man2html |