mirror of
git://anongit.mindrot.org/openssh.git
synced 2024-12-25 19:32:09 +00:00
- djm@cvs.openbsd.org 2013/12/07 08:08:26
[ssh-keygen.1] document -a and -o wrt new key format
This commit is contained in:
parent
6d6fcd14e2
commit
4f752cf71c
@ -1,3 +1,9 @@
|
||||
20131218
|
||||
- (djm) OpenBSD CVS Sync
|
||||
- djm@cvs.openbsd.org 2013/12/07 08:08:26
|
||||
[ssh-keygen.1]
|
||||
document -a and -o wrt new key format
|
||||
|
||||
20131208
|
||||
- (djm) [openbsd-compat/bsd-setres_id.c] Missing header; from Corinna
|
||||
Vinschen
|
||||
|
31
ssh-keygen.1
31
ssh-keygen.1
@ -1,4 +1,4 @@
|
||||
.\" $OpenBSD: ssh-keygen.1,v 1.116 2013/06/27 14:05:37 jmc Exp $
|
||||
.\" $OpenBSD: ssh-keygen.1,v 1.117 2013/12/07 08:08:26 djm Exp $
|
||||
.\"
|
||||
.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
|
||||
.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
||||
@ -35,7 +35,7 @@
|
||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.Dd $Mdocdate: June 27 2013 $
|
||||
.Dd $Mdocdate: December 7 2013 $
|
||||
.Dt SSH-KEYGEN 1
|
||||
.Os
|
||||
.Sh NAME
|
||||
@ -103,7 +103,7 @@
|
||||
.Fl T Ar output_file
|
||||
.Fl f Ar input_file
|
||||
.Op Fl v
|
||||
.Op Fl a Ar num_trials
|
||||
.Op Fl a Ar rounds
|
||||
.Op Fl J Ar num_lines
|
||||
.Op Fl j Ar start_line
|
||||
.Op Fl K Ar checkpt
|
||||
@ -222,11 +222,20 @@ an empty passphrase, default bits for the key type, and default comment.
|
||||
This is used by
|
||||
.Pa /etc/rc
|
||||
to generate new host keys.
|
||||
.It Fl a Ar trials
|
||||
Specifies the number of primality tests to perform when screening DH-GEX
|
||||
candidates using the
|
||||
.It Fl a Ar rounds
|
||||
When saving a new-format private key (i.e. an ed25519 key or any SSH protocol
|
||||
2 key when the
|
||||
.Fl o
|
||||
flag is set), this option specifies the number of KDF (key derivation function)
|
||||
rounds used.
|
||||
Higher numbers result in slower passphrase verification and increased
|
||||
resistance to brute-force password cracking (should the keys be stolen).
|
||||
.Pp
|
||||
When screening DH-GEX candidates (
|
||||
using the
|
||||
.Fl T
|
||||
command.
|
||||
command).
|
||||
This option specifies the number of primality tests to perform.
|
||||
.It Fl B
|
||||
Show the bubblebabble digest of specified private or public key file.
|
||||
.It Fl b Ar bits
|
||||
@ -447,6 +456,14 @@ format.
|
||||
.El
|
||||
.Pp
|
||||
At present, no options are valid for host keys.
|
||||
.It Fl o
|
||||
Causes
|
||||
.Nm
|
||||
to save SSH protocol 2 private keys using the new OpenSSH format rather than
|
||||
the more compatible PEM format.
|
||||
The new format has increased resistance to brute-force password cracking
|
||||
but is not supported by versions of OpenSSH prior to 6.5.
|
||||
Ed25519 keys always use the new private key format.
|
||||
.It Fl P Ar passphrase
|
||||
Provides the (old) passphrase.
|
||||
.It Fl p
|
||||
|
Loading…
Reference in New Issue
Block a user