[BACK]Return to ssh-keyscan.1 CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Diff for /src/usr.bin/ssh/ssh-keyscan.1 between version 1.3.2.4 and 1.3.2.5

version 1.3.2.4, 2001/05/07 21:09:36 version 1.3.2.5, 2001/09/27 00:15:42
Line 4 
Line 4 
 .\"  .\"
 .\" Modification and redistribution in source and binary forms is  .\" Modification and redistribution in source and binary forms is
 .\" permitted provided that due credit is given to the author and the  .\" permitted provided that due credit is given to the author and the
 .\" OpenBSD project (for instance by leaving this copyright notice  .\" OpenBSD project by leaving this copyright notice intact.
 .\" intact).  
 .\"  .\"
 .Dd January 1, 1996  .Dd January 1, 1996
 .Dt SSH-KEYSCAN 1  .Dt SSH-KEYSCAN 1
Line 15 
Line 14 
 .Nd gather ssh public keys  .Nd gather ssh public keys
 .Sh SYNOPSIS  .Sh SYNOPSIS
 .Nm ssh-keyscan  .Nm ssh-keyscan
 .Op Fl t Ar timeout  .Op Fl v46
 .Op Ar -- | host | addrlist namelist  .Op Fl p Ar port
 .Op Fl f Ar files ...  .Op Fl T Ar timeout
   .Op Fl t Ar type
   .Op Fl f Ar file
   .Op Ar host | addrlist namelist
   .Op Ar ...
 .Sh DESCRIPTION  .Sh DESCRIPTION
 .Nm  .Nm
 is a utility for gathering the public ssh host keys of a number of  is a utility for gathering the public ssh host keys of a number of
Line 32 
Line 35 
 uses non-blocking socket I/O to contact as many hosts as possible in  uses non-blocking socket I/O to contact as many hosts as possible in
 parallel, so it is very efficient.  The keys from a domain of 1,000  parallel, so it is very efficient.  The keys from a domain of 1,000
 hosts can be collected in tens of seconds, even when some of those  hosts can be collected in tens of seconds, even when some of those
 hosts are down or do not run ssh.  You do not need login access to the  hosts are down or do not run ssh.  For scanning, one does not need
 machines you are scanning, nor does the scanning process involve  login access to the machines that are being scanned, nor does the
 any encryption.  scanning process involve any encryption.
 .Sh SECURITY  .Pp
 If you make an ssh_known_hosts file using  The options are as follows:
 .Nm  
 without verifying the keys, you will be vulnerable to  
 .I man in the middle  
 attacks.  
 On the other hand, if your security model allows such a risk,  
 .Nm  
 can help you detect tampered keyfiles or man in the middle attacks which  
 have begun after you created your ssh_known_hosts file.  
 .Sh OPTIONS  
 .Bl -tag -width Ds  .Bl -tag -width Ds
 .It Fl t  .It Fl p Ar port
 Set the timeout for connection attempts.  If  Port to connect to on the remote host.
   .It Fl T Ar timeout
   Set the timeout for connection attempts.  If
 .Pa timeout  .Pa timeout
 seconds have elapsed since a connection was initiated to a host or since the  seconds have elapsed since a connection was initiated to a host or since the
 last time anything was read from that host, then the connection is  last time anything was read from that host, then the connection is
 closed and the host in question considered unavailable.  Default is 5  closed and the host in question considered unavailable.  Default is 5
 seconds.  seconds.
 .It Fl f  .It Fl t Ar type
 Read hosts or  Specifies the type of the key to fetch from the scanned hosts.
   The possible values are
   .Dq rsa1
   for protocol version 1 and
   .Dq rsa
   or
   .Dq dsa
   for protocol version 2.
   Multiple values may be specified by separating them with commas.
   The default is
   .Dq rsa1 .
   .It Fl f Ar filename
   Read hosts or
 .Pa addrlist namelist  .Pa addrlist namelist
 pairs from this file, one per line.  pairs from this file, one per line.
 If  If
 .Pa -  .Pa -
 is supplied instead of a filename,  is supplied instead of a filename,
 .Nm  .Nm
 will read hosts or  will read hosts or
 .Pa addrlist namelist  .Pa addrlist namelist
 pairs from the standard input.  pairs from the standard input.
   .It Fl v
   Verbose mode.
   Causes
   .Nm
   to print debugging messages about its progress.
   .It Fl 4
   Forces
   .Nm
   to use IPv4 addresses only.
   .It Fl 6
   Forces
   .Nm
   to use IPv6 addresses only.
 .El  .El
   .Sh SECURITY
   If a ssh_known_hosts file is constructed using
   .Nm
   without verifying the keys, users will be vulnerable to
   .I man in the middle
   attacks.
   On the other hand, if the security model allows such a risk,
   .Nm
   can help in the detection of tampered keyfiles or man in the middle
   attacks which have begun after the ssh_known_hosts file was created.
 .Sh EXAMPLES  .Sh EXAMPLES
 .Pp  .Pp
 Print the host key for machine  Print the
   .Pa rsa1
   host key for machine
 .Pa hostname :  .Pa hostname :
 .Bd -literal  .Bd -literal
 ssh-keyscan hostname  ssh-keyscan hostname
Line 79 
Line 112 
 which have new or different keys from those in the sorted file  which have new or different keys from those in the sorted file
 .Pa ssh_known_hosts :  .Pa ssh_known_hosts :
 .Bd -literal  .Bd -literal
 $ ssh-keyscan -f ssh_hosts | sort -u - ssh_known_hosts | \e\  ssh-keyscan -t rsa,dsa -f ssh_hosts | \e\
         diff ssh_known_hosts -          sort -u - ssh_known_hosts | diff ssh_known_hosts -
 .Ed  .Ed
 .Pp  
 .Sh FILES  .Sh FILES
 .Pp  
 .Pa Input format:  .Pa Input format:
   .Bd -literal
 1.2.3.4,1.2.4.4 name.my.domain,name,n.my.domain,n,1.2.3.4,1.2.4.4  1.2.3.4,1.2.4.4 name.my.domain,name,n.my.domain,n,1.2.3.4,1.2.4.4
   .Ed
 .Pp  .Pp
 .Pa Output format:  .Pa Output format for rsa1 keys:
   .Bd -literal
 host-or-namelist bits exponent modulus  host-or-namelist bits exponent modulus
   .Ed
 .Pp  .Pp
   .Pa Output format for rsa and dsa keys:
   .Bd -literal
   host-or-namelist keytype base64-encoded-key
   .Ed
   .Pp
   Where
   .Pa keytype
   is either
   .Dq ssh-rsa
   or
   .Dq ssh-dsa .
   .Pp
 .Pa /etc/ssh_known_hosts  .Pa /etc/ssh_known_hosts
 .Sh BUGS  .Sh BUGS
 It generates "Connection closed by remote host" messages on the consoles  It generates "Connection closed by remote host" messages on the consoles
 of all the machines it scans.  of all the machines it scans if the server is older than version 2.9.
 This is because it opens a connection to the ssh port, reads the public  This is because it opens a connection to the ssh port, reads the public
 key, and drops the connection as soon as it gets the key.  key, and drops the connection as soon as it gets the key.
 .Sh SEE ALSO  .Sh SEE ALSO
 .Xr ssh 1 ,  .Xr ssh 1 ,
 .Xr sshd 8  .Xr sshd 8
 .Sh AUTHOR  .Sh AUTHORS
 David Mazieres <dm@lcs.mit.edu>  David Mazieres <dm@lcs.mit.edu>
   wrote the initial version, and
   Wayne Davison <wayned@users.sourceforge.net>
   added support for protocol version 2.

Legend:
Removed from v.1.3.2.4  
changed lines
  Added in v.1.3.2.5