Annotation of src/usr.bin/ssh/ssh-add.1, Revision 1.80
1.80 ! djm 1: .\" $OpenBSD: ssh-add.1,v 1.79 2020/02/07 03:57:31 djm Exp $
1.1 deraadt 2: .\"
3: .\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4: .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5: .\" All rights reserved
6: .\"
1.17 deraadt 7: .\" As far as I am concerned, the code I have written for this software
8: .\" can be used freely for any purpose. Any derived versions of this
9: .\" software must be clearly marked as such, and if the derived work is
10: .\" incompatible with the protocol description in the RFC file, it must be
11: .\" called by a name other than "ssh" or "Secure Shell".
12: .\"
13: .\"
1.22 deraadt 14: .\" Copyright (c) 1999,2000 Markus Friedl. All rights reserved.
15: .\" Copyright (c) 1999 Aaron Campbell. All rights reserved.
16: .\" Copyright (c) 1999 Theo de Raadt. All rights reserved.
1.17 deraadt 17: .\"
18: .\" Redistribution and use in source and binary forms, with or without
19: .\" modification, are permitted provided that the following conditions
20: .\" are met:
21: .\" 1. Redistributions of source code must retain the above copyright
22: .\" notice, this list of conditions and the following disclaimer.
23: .\" 2. Redistributions in binary form must reproduce the above copyright
24: .\" notice, this list of conditions and the following disclaimer in the
25: .\" documentation and/or other materials provided with the distribution.
1.1 deraadt 26: .\"
1.17 deraadt 27: .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
28: .\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
29: .\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
30: .\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
31: .\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
32: .\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
33: .\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
34: .\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
35: .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
36: .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1.1 deraadt 37: .\"
1.80 ! djm 38: .Dd $Mdocdate: February 7 2020 $
1.2 deraadt 39: .Dt SSH-ADD 1
40: .Os
41: .Sh NAME
42: .Nm ssh-add
1.76 jmc 43: .Nd adds private key identities to the OpenSSH authentication agent
1.2 deraadt 44: .Sh SYNOPSIS
45: .Nm ssh-add
1.78 naddy 46: .Op Fl cDdKkLlqvXx
1.61 djm 47: .Op Fl E Ar fingerprint_hash
1.71 jmc 48: .Op Fl S Ar provider
1.33 markus 49: .Op Fl t Ar life
1.2 deraadt 50: .Op Ar
1.26 jakob 51: .Nm ssh-add
1.50 jmc 52: .Fl s Ar pkcs11
1.26 jakob 53: .Nm ssh-add
1.50 jmc 54: .Fl e Ar pkcs11
1.67 djm 55: .Nm ssh-add
56: .Fl T
1.68 jmc 57: .Ar pubkey ...
1.12 aaron 58: .Sh DESCRIPTION
1.2 deraadt 59: .Nm
1.53 djm 60: adds private key identities to the authentication agent,
1.2 deraadt 61: .Xr ssh-agent 1 .
1.28 djm 62: When run without arguments, it adds the files
1.43 djm 63: .Pa ~/.ssh/id_rsa ,
1.53 djm 64: .Pa ~/.ssh/id_dsa ,
1.59 naddy 65: .Pa ~/.ssh/id_ecdsa ,
1.72 naddy 66: .Pa ~/.ssh/id_ecdsa_sk ,
1.75 naddy 67: .Pa ~/.ssh/id_ed25519 ,
1.28 djm 68: and
1.75 naddy 69: .Pa ~/.ssh/id_ed25519_sk .
1.52 djm 70: After loading a private key,
71: .Nm
72: will try to load corresponding certificate information from the
73: filename obtained by appending
74: .Pa -cert.pub
75: to the name of the private key file.
1.11 aaron 76: Alternative file names can be given on the command line.
1.52 djm 77: .Pp
1.11 aaron 78: If any file requires a passphrase,
1.2 deraadt 79: .Nm
1.12 aaron 80: asks for the passphrase from the user.
1.25 stevesk 81: The passphrase is read from the user's tty.
1.23 markus 82: .Nm
83: retries the last passphrase if multiple identity files are given.
1.2 deraadt 84: .Pp
1.40 matthieu 85: The authentication agent must be running and the
86: .Ev SSH_AUTH_SOCK
87: environment variable must contain the name of its socket for
1.2 deraadt 88: .Nm
1.1 deraadt 89: to work.
1.2 deraadt 90: .Pp
91: The options are as follows:
92: .Bl -tag -width Ds
1.36 markus 93: .It Fl c
94: Indicates that added identities should be subject to confirmation before
1.38 jmc 95: being used for authentication.
1.62 jmc 96: Confirmation is performed by
97: .Xr ssh-askpass 1 .
98: Successful confirmation is signaled by a zero exit status from
99: .Xr ssh-askpass 1 ,
100: rather than text entered into the requester.
1.42 jmc 101: .It Fl D
102: Deletes all identities from the agent.
103: .It Fl d
1.46 jmc 104: Instead of adding identities, removes identities from the agent.
1.45 djm 105: If
106: .Nm
1.57 djm 107: has been run without arguments, the keys for the default identities and
1.58 jmc 108: their corresponding certificates will be removed.
1.45 djm 109: Otherwise, the argument list will be interpreted as a list of paths to
1.57 djm 110: public key files to specify keys and certificates to be removed from the agent.
1.45 djm 111: If no public key is found at a given path,
112: .Nm
113: will append
114: .Pa .pub
115: and retry.
1.80 ! djm 116: If the argument list consists of
! 117: .Dq -
! 118: then
! 119: .Nm
! 120: will read public keys to be removed from standard input.
1.61 djm 121: .It Fl E Ar fingerprint_hash
122: Specifies the hash algorithm used when displaying key fingerprints.
123: Valid options are:
124: .Dq md5
125: and
126: .Dq sha256 .
127: The default is
128: .Dq sha256 .
1.49 markus 129: .It Fl e Ar pkcs11
1.51 markus 130: Remove keys provided by the PKCS#11 shared library
1.49 markus 131: .Ar pkcs11 .
1.78 naddy 132: .It Fl K
133: Load resident keys from a FIDO authenticator.
1.56 djm 134: .It Fl k
1.57 djm 135: When loading keys into or deleting keys from the agent, process plain private
136: keys only and skip certificates.
1.42 jmc 137: .It Fl L
138: Lists public key parameters of all identities currently represented
139: by the agent.
140: .It Fl l
141: Lists fingerprints of all identities currently represented by the agent.
1.66 jmc 142: .It Fl q
143: Be quiet after a successful operation.
1.70 djm 144: .It Fl S Ar provider
1.77 naddy 145: Specifies a path to a library that will be used when adding
146: FIDO authenticator-hosted keys, overriding the default of using the
1.74 jmc 147: internal USB HID support.
1.71 jmc 148: .It Fl s Ar pkcs11
149: Add keys provided by the PKCS#11 shared library
150: .Ar pkcs11 .
1.68 jmc 151: .It Fl T Ar pubkey ...
1.67 djm 152: Tests whether the private keys that correspond to the specified
153: .Ar pubkey
154: files are usable by performing sign and verify operations on each.
1.42 jmc 155: .It Fl t Ar life
156: Set a maximum lifetime when adding identities to an agent.
157: The lifetime may be specified in seconds or in a time format
158: specified in
159: .Xr sshd_config 5 .
1.69 djm 160: .It Fl v
161: Verbose mode.
162: Causes
163: .Nm
164: to print debugging messages about its progress.
165: This is helpful in debugging problems.
166: Multiple
167: .Fl v
168: options increase the verbosity.
169: The maximum is 3.
1.42 jmc 170: .It Fl X
171: Unlock the agent.
172: .It Fl x
173: Lock the agent with a password.
1.2 deraadt 174: .El
1.9 markus 175: .Sh ENVIRONMENT
176: .Bl -tag -width Ds
177: .It Ev "DISPLAY" and "SSH_ASKPASS"
1.1 deraadt 178: If
1.2 deraadt 179: .Nm
1.1 deraadt 180: needs a passphrase, it will read the passphrase from the current
1.11 aaron 181: terminal if it was run from a terminal.
182: If
1.2 deraadt 183: .Nm
1.1 deraadt 184: does not have a terminal associated with it but
1.2 deraadt 185: .Ev DISPLAY
1.8 markus 186: and
187: .Ev SSH_ASKPASS
188: are set, it will execute the program specified by
189: .Ev SSH_ASKPASS
1.62 jmc 190: (by default
191: .Dq ssh-askpass )
1.11 aaron 192: and open an X11 window to read the passphrase.
193: This is particularly useful when calling
1.2 deraadt 194: .Nm
195: from a
1.41 jmc 196: .Pa .xsession
1.11 aaron 197: or related script.
198: (Note that on some machines it
1.2 deraadt 199: may be necessary to redirect the input from
200: .Pa /dev/null
201: to make this work.)
1.31 markus 202: .It Ev SSH_AUTH_SOCK
1.47 sobrado 203: Identifies the path of a
1.48 sobrado 204: .Ux Ns -domain
205: socket used to communicate with the agent.
1.70 djm 206: .It Ev SSH_SK_PROVIDER
1.79 djm 207: Specifies a path to a library that will be used when loading any
208: FIDO authenticator-hosted keys, overriding the default of using
209: the built-in USB HID support.
1.16 itojun 210: .El
1.39 jmc 211: .Sh FILES
1.77 naddy 212: .Bl -tag -width Ds -compact
1.43 djm 213: .It Pa ~/.ssh/id_dsa
1.53 djm 214: .It Pa ~/.ssh/id_ecdsa
1.72 naddy 215: .It Pa ~/.ssh/id_ecdsa_sk
1.59 naddy 216: .It Pa ~/.ssh/id_ed25519
1.75 naddy 217: .It Pa ~/.ssh/id_ed25519_sk
1.43 djm 218: .It Pa ~/.ssh/id_rsa
1.77 naddy 219: Contains the DSA, ECDSA, authenticator-hosted ECDSA, Ed25519,
220: authenticator-hosted Ed25519 or RSA authentication identity of the user.
1.39 jmc 221: .El
222: .Pp
223: Identity files should not be readable by anyone but the user.
224: Note that
225: .Nm
226: ignores identity files if they are accessible by others.
1.54 jmc 227: .Sh EXIT STATUS
1.29 markus 228: Exit status is 0 on success, 1 if the specified command fails,
229: and 2 if
230: .Nm
231: is unable to contact the authentication agent.
1.39 jmc 232: .Sh SEE ALSO
233: .Xr ssh 1 ,
234: .Xr ssh-agent 1 ,
1.62 jmc 235: .Xr ssh-askpass 1 ,
1.39 jmc 236: .Xr ssh-keygen 1 ,
237: .Xr sshd 8
1.18 aaron 238: .Sh AUTHORS
1.19 markus 239: OpenSSH is a derivative of the original and free
240: ssh 1.2.12 release by Tatu Ylonen.
241: Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos,
242: Theo de Raadt and Dug Song
243: removed many bugs, re-added newer features and
244: created OpenSSH.
245: Markus Friedl contributed the support for SSH
246: protocol versions 1.5 and 2.0.