|
SYNOPSIS ssh-keygen [-q] [-b bits] [-t type] [-N new_passphrase] [-C comment] [-f output_keyfile] ssh-keygen -p [-P old_passphrase] [-N new_passphrase] [-f keyfile] ssh-keygen -i [-f input_keyfile] ssh-keygen -e [-f input_keyfile] ssh-keygen -y [-f input_keyfile] ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile] ssh-keygen -l [-f input_keyfile] ssh-keygen -B [-f input_keyfile] DESCRIPTION ssh-keygen generates, manages and converts authentication keys for ssh(1). ssh-keygen defaults to generating a RSA1 key for use by SSH proM-- tocol version 1. specifying the -t option allows you to create a key for use by SSH protocol version 2. Normally each user wishing to use SSH with RSA or DSA au- thentication runs this once to create the authentication key in $HOME/.ssh/identity, $HOME/.ssh/id_dsa or $HOME/.ssh/id_rsa. Additionally, the system adminisM-- trator may use this to generate host keys, as seen in /etc/rc. Normally this program generates the key and asks for a file in which to store the private key. The public key is stored in a file with the same name but ``.pub'' appended. The program also asks for a passphrase. The passphrase may be empty to indicate no passphrase (host keys must have an empty passphrase), or it may be a string of arbitrary length. Good passphrases are 10-30 characters long and are not simple sentences or otherwise easily guessable (English prose has only 1-2 bits of entropy per word, and provides very bad passphrases). The passphrase can be changed later by using the -p option. There is no way to recover a lost passphrase. If the passphrase is lost After a key is generated, instructions below detail where the keys should be placed to be activated. The options are as follows: -b bits Specifies the number of bits in the key to create. Minimum is 512 bits. Generally 1024 bits is considered suffi- cient, and key sizes above that no longer improve security but make things slowM-- er. The default is 1024 bits. -c Requests changing the comment in the private and public key files. The program will prompt for the file con- taining the priM-- vate keys, for passphrase if the key has one, and for the new comment. -e This option will read a private or public OpenSSH key file and print the key in a `SECSH Public Key File Format' to stdout. This option allows exporting keys for use by several commercial SSH implementations. -f Specifies the filename of the key file. -i This option will read an unencrypted private (or public) key file in SSH2-compatible format and print an OpenSSH com- patible private (or public) key to stdout. ssh-keygen also reads the `SECSH Public Key File Format'. This option allows import- ing keys from several commercial SSH implementations. -l Show fingerprint of specified private or public key file. -p Requests changing the passphrase of a private key file instead of creating a new private key. The program will prompt for the file containing the private key, for the old passphrase, and twice for col version 2. The default is ``rsa1''. -B Show the bubblebabble digest of specified private or public key file. -C comment Provides the new comment. -N new_passphrase Provides the new passphrase. -P passphrase Provides the (old) passphrase. FILES $HOME/.ssh/identity Contains the protocol version 1 RSA authentication identity of the user. This file should not be readable by any- one but the usM-- er. It is possible to specify a passphrase when generating the key; that passphrase will be used to encrypt the private part of this file using 3DES. This file is not automatical- ly accessed by ssh-keygen but it is offered as the default file for the private key. sshd(8) will read this file when a login at- tempt is made. $HOME/.ssh/identity.pub Contains the protocol version 1 RSA public key for authenticaM-- tion. The contents of this file should be added to $HOME/.ssh/authorized_keys on all machines where you wish to log in using RSA authentication. There is no need to keep the conM-- tents of this file secret. $HOME/.ssh/id_dsa Contains the protocol version 2 DSA authentication identity of the user. This file should not be readable by any- one but the usM-- er. It is possible to specify a passphrase when generating the key; that passphrase will be used to encrypt the private part of this file using 3DES. This file is not automatical- need to keep the contents of this file secret. $HOME/.ssh/id_rsa Contains the protocol version 2 RSA authentication identity of the user. This file should not be readable by any- one but the usM-- er. It is possible to specify a passphrase when generating the key; that passphrase will be used to encrypt the private part of this file using 3DES. This file is not automatical- ly accessed by ssh-keygen but it is offered as the default file for the private key. sshd(8) will read this file when a login at- tempt is made. $HOME/.ssh/id_rsa.pub Contains the protocol version 2 RSA public key for authenticaM-- tion. The contents of this file should be added to $HOME/.ssh/authorized_keys2 on all machines where you wish to log in using public key authentication. There is no need to keep the contents of this file secret. AUTHORS OpenSSH is a derivative of the original and free ssh 1.2.12 release by Tatu Ylonen. Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo de Raadt and Dug Song removed many bugs, re-added newer fea- tures and creM-- ated OpenSSH. Markus Friedl contributed the support for SSH protocol versions 1.5 and 2.0. SEE ALSO ssh(1), ssh-add(1), ssh-agent(1), sshd(8) J. Galbraith, and R. Thayer, SECSH Public Key File Format, draft-ietf- secsh-publickeyfile-01.txt, March 2001, work in progress ma- terial. BSD Experimental September 25, 1999 3 Man(1) output converted with man2html |