Annotation of src/usr.bin/ssh/ssh-add.1, Revision 1.76
1.76 ! jmc 1: .\" $OpenBSD: ssh-add.1,v 1.75 2019/11/18 23:16:49 naddy Exp $
1.1 deraadt 2: .\"
3: .\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4: .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5: .\" All rights reserved
6: .\"
1.17 deraadt 7: .\" As far as I am concerned, the code I have written for this software
8: .\" can be used freely for any purpose. Any derived versions of this
9: .\" software must be clearly marked as such, and if the derived work is
10: .\" incompatible with the protocol description in the RFC file, it must be
11: .\" called by a name other than "ssh" or "Secure Shell".
12: .\"
13: .\"
1.22 deraadt 14: .\" Copyright (c) 1999,2000 Markus Friedl. All rights reserved.
15: .\" Copyright (c) 1999 Aaron Campbell. All rights reserved.
16: .\" Copyright (c) 1999 Theo de Raadt. All rights reserved.
1.17 deraadt 17: .\"
18: .\" Redistribution and use in source and binary forms, with or without
19: .\" modification, are permitted provided that the following conditions
20: .\" are met:
21: .\" 1. Redistributions of source code must retain the above copyright
22: .\" notice, this list of conditions and the following disclaimer.
23: .\" 2. Redistributions in binary form must reproduce the above copyright
24: .\" notice, this list of conditions and the following disclaimer in the
25: .\" documentation and/or other materials provided with the distribution.
1.1 deraadt 26: .\"
1.17 deraadt 27: .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
28: .\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
29: .\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
30: .\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
31: .\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
32: .\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
33: .\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
34: .\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
35: .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
36: .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1.1 deraadt 37: .\"
1.76 ! jmc 38: .Dd $Mdocdate: November 18 2019 $
1.2 deraadt 39: .Dt SSH-ADD 1
40: .Os
41: .Sh NAME
42: .Nm ssh-add
1.76 ! jmc 43: .Nd adds private key identities to the OpenSSH authentication agent
1.2 deraadt 44: .Sh SYNOPSIS
45: .Nm ssh-add
1.69 djm 46: .Op Fl cDdkLlqvXx
1.61 djm 47: .Op Fl E Ar fingerprint_hash
1.71 jmc 48: .Op Fl S Ar provider
1.33 markus 49: .Op Fl t Ar life
1.2 deraadt 50: .Op Ar
1.26 jakob 51: .Nm ssh-add
1.50 jmc 52: .Fl s Ar pkcs11
1.26 jakob 53: .Nm ssh-add
1.50 jmc 54: .Fl e Ar pkcs11
1.67 djm 55: .Nm ssh-add
56: .Fl T
1.68 jmc 57: .Ar pubkey ...
1.12 aaron 58: .Sh DESCRIPTION
1.2 deraadt 59: .Nm
1.53 djm 60: adds private key identities to the authentication agent,
1.2 deraadt 61: .Xr ssh-agent 1 .
1.28 djm 62: When run without arguments, it adds the files
1.43 djm 63: .Pa ~/.ssh/id_rsa ,
1.53 djm 64: .Pa ~/.ssh/id_dsa ,
1.59 naddy 65: .Pa ~/.ssh/id_ecdsa ,
1.72 naddy 66: .Pa ~/.ssh/id_ecdsa_sk ,
1.75 naddy 67: .Pa ~/.ssh/id_ed25519 ,
1.28 djm 68: and
1.75 naddy 69: .Pa ~/.ssh/id_ed25519_sk .
1.52 djm 70: After loading a private key,
71: .Nm
72: will try to load corresponding certificate information from the
73: filename obtained by appending
74: .Pa -cert.pub
75: to the name of the private key file.
1.11 aaron 76: Alternative file names can be given on the command line.
1.52 djm 77: .Pp
1.11 aaron 78: If any file requires a passphrase,
1.2 deraadt 79: .Nm
1.12 aaron 80: asks for the passphrase from the user.
1.25 stevesk 81: The passphrase is read from the user's tty.
1.23 markus 82: .Nm
83: retries the last passphrase if multiple identity files are given.
1.2 deraadt 84: .Pp
1.40 matthieu 85: The authentication agent must be running and the
86: .Ev SSH_AUTH_SOCK
87: environment variable must contain the name of its socket for
1.2 deraadt 88: .Nm
1.1 deraadt 89: to work.
1.2 deraadt 90: .Pp
91: The options are as follows:
92: .Bl -tag -width Ds
1.36 markus 93: .It Fl c
94: Indicates that added identities should be subject to confirmation before
1.38 jmc 95: being used for authentication.
1.62 jmc 96: Confirmation is performed by
97: .Xr ssh-askpass 1 .
98: Successful confirmation is signaled by a zero exit status from
99: .Xr ssh-askpass 1 ,
100: rather than text entered into the requester.
1.42 jmc 101: .It Fl D
102: Deletes all identities from the agent.
103: .It Fl d
1.46 jmc 104: Instead of adding identities, removes identities from the agent.
1.45 djm 105: If
106: .Nm
1.57 djm 107: has been run without arguments, the keys for the default identities and
1.58 jmc 108: their corresponding certificates will be removed.
1.45 djm 109: Otherwise, the argument list will be interpreted as a list of paths to
1.57 djm 110: public key files to specify keys and certificates to be removed from the agent.
1.45 djm 111: If no public key is found at a given path,
112: .Nm
113: will append
114: .Pa .pub
115: and retry.
1.61 djm 116: .It Fl E Ar fingerprint_hash
117: Specifies the hash algorithm used when displaying key fingerprints.
118: Valid options are:
119: .Dq md5
120: and
121: .Dq sha256 .
122: The default is
123: .Dq sha256 .
1.49 markus 124: .It Fl e Ar pkcs11
1.51 markus 125: Remove keys provided by the PKCS#11 shared library
1.49 markus 126: .Ar pkcs11 .
1.56 djm 127: .It Fl k
1.57 djm 128: When loading keys into or deleting keys from the agent, process plain private
129: keys only and skip certificates.
1.42 jmc 130: .It Fl L
131: Lists public key parameters of all identities currently represented
132: by the agent.
133: .It Fl l
134: Lists fingerprints of all identities currently represented by the agent.
1.66 jmc 135: .It Fl q
136: Be quiet after a successful operation.
1.70 djm 137: .It Fl S Ar provider
138: Specifies a path to a security key provider library that will be used when
139: adding any security key-hosted keys, overriding the default of using the
1.74 jmc 140: internal USB HID support.
1.71 jmc 141: .It Fl s Ar pkcs11
142: Add keys provided by the PKCS#11 shared library
143: .Ar pkcs11 .
1.68 jmc 144: .It Fl T Ar pubkey ...
1.67 djm 145: Tests whether the private keys that correspond to the specified
146: .Ar pubkey
147: files are usable by performing sign and verify operations on each.
1.42 jmc 148: .It Fl t Ar life
149: Set a maximum lifetime when adding identities to an agent.
150: The lifetime may be specified in seconds or in a time format
151: specified in
152: .Xr sshd_config 5 .
1.69 djm 153: .It Fl v
154: Verbose mode.
155: Causes
156: .Nm
157: to print debugging messages about its progress.
158: This is helpful in debugging problems.
159: Multiple
160: .Fl v
161: options increase the verbosity.
162: The maximum is 3.
1.42 jmc 163: .It Fl X
164: Unlock the agent.
165: .It Fl x
166: Lock the agent with a password.
1.2 deraadt 167: .El
1.9 markus 168: .Sh ENVIRONMENT
169: .Bl -tag -width Ds
170: .It Ev "DISPLAY" and "SSH_ASKPASS"
1.1 deraadt 171: If
1.2 deraadt 172: .Nm
1.1 deraadt 173: needs a passphrase, it will read the passphrase from the current
1.11 aaron 174: terminal if it was run from a terminal.
175: If
1.2 deraadt 176: .Nm
1.1 deraadt 177: does not have a terminal associated with it but
1.2 deraadt 178: .Ev DISPLAY
1.8 markus 179: and
180: .Ev SSH_ASKPASS
181: are set, it will execute the program specified by
182: .Ev SSH_ASKPASS
1.62 jmc 183: (by default
184: .Dq ssh-askpass )
1.11 aaron 185: and open an X11 window to read the passphrase.
186: This is particularly useful when calling
1.2 deraadt 187: .Nm
188: from a
1.41 jmc 189: .Pa .xsession
1.11 aaron 190: or related script.
191: (Note that on some machines it
1.2 deraadt 192: may be necessary to redirect the input from
193: .Pa /dev/null
194: to make this work.)
1.31 markus 195: .It Ev SSH_AUTH_SOCK
1.47 sobrado 196: Identifies the path of a
1.48 sobrado 197: .Ux Ns -domain
198: socket used to communicate with the agent.
1.70 djm 199: .It Ev SSH_SK_PROVIDER
200: Specifies the path to a security key provider library used to interact with
201: hardware security keys.
1.16 itojun 202: .El
1.39 jmc 203: .Sh FILES
204: .Bl -tag -width Ds
1.43 djm 205: .It Pa ~/.ssh/id_dsa
1.64 naddy 206: Contains the DSA authentication identity of the user.
1.53 djm 207: .It Pa ~/.ssh/id_ecdsa
1.64 naddy 208: Contains the ECDSA authentication identity of the user.
1.72 naddy 209: .It Pa ~/.ssh/id_ecdsa_sk
210: Contains the security key-hosted ECDSA authentication identity of the user.
1.59 naddy 211: .It Pa ~/.ssh/id_ed25519
1.64 naddy 212: Contains the Ed25519 authentication identity of the user.
1.75 naddy 213: .It Pa ~/.ssh/id_ed25519_sk
214: Contains the security key-hosted Ed25519 authentication identity of the user.
1.43 djm 215: .It Pa ~/.ssh/id_rsa
1.64 naddy 216: Contains the RSA authentication identity of the user.
1.39 jmc 217: .El
218: .Pp
219: Identity files should not be readable by anyone but the user.
220: Note that
221: .Nm
222: ignores identity files if they are accessible by others.
1.54 jmc 223: .Sh EXIT STATUS
1.29 markus 224: Exit status is 0 on success, 1 if the specified command fails,
225: and 2 if
226: .Nm
227: is unable to contact the authentication agent.
1.39 jmc 228: .Sh SEE ALSO
229: .Xr ssh 1 ,
230: .Xr ssh-agent 1 ,
1.62 jmc 231: .Xr ssh-askpass 1 ,
1.39 jmc 232: .Xr ssh-keygen 1 ,
233: .Xr sshd 8
1.18 aaron 234: .Sh AUTHORS
1.19 markus 235: OpenSSH is a derivative of the original and free
236: ssh 1.2.12 release by Tatu Ylonen.
237: Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos,
238: Theo de Raadt and Dug Song
239: removed many bugs, re-added newer features and
240: created OpenSSH.
241: Markus Friedl contributed the support for SSH
242: protocol versions 1.5 and 2.0.