ssh-keyman.1 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259
  1. .\" Automatically generated by Pod::Man version 1.15
  2. .\" Tue May 7 19:43:46 2002
  3. .\"
  4. .\" Standard preamble:
  5. .\" ======================================================================
  6. .de Sh \" Subsection heading
  7. .br
  8. .if t .Sp
  9. .ne 5
  10. .PP
  11. \fB\\$1\fR
  12. .PP
  13. ..
  14. .de Sp \" Vertical space (when we can't use .PP)
  15. .if t .sp .5v
  16. .if n .sp
  17. ..
  18. .de Ip \" List item
  19. .br
  20. .ie \\n(.$>=3 .ne \\$3
  21. .el .ne 3
  22. .IP "\\$1" \\$2
  23. ..
  24. .de Vb \" Begin verbatim text
  25. .ft CW
  26. .nf
  27. .ne \\$1
  28. ..
  29. .de Ve \" End verbatim text
  30. .ft R
  31. .fi
  32. ..
  33. .\" Set up some character translations and predefined strings. \*(-- will
  34. .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
  35. .\" double quote, and \*(R" will give a right double quote. | will give a
  36. .\" real vertical bar. \*(C+ will give a nicer C++. Capital omega is used
  37. .\" to do unbreakable dashes and therefore won't be available. \*(C` and
  38. .\" \*(C' expand to `' in nroff, nothing in troff, for use with C<>
  39. .tr \(*W-|\(bv\*(Tr
  40. .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
  41. .ie n \{\
  42. . ds -- \(*W-
  43. . ds PI pi
  44. . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
  45. . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
  46. . ds L" ""
  47. . ds R" ""
  48. . ds C` ""
  49. . ds C' ""
  50. 'br\}
  51. .el\{\
  52. . ds -- \|\(em\|
  53. . ds PI \(*p
  54. . ds L" ``
  55. . ds R" ''
  56. 'br\}
  57. .\"
  58. .\" If the F register is turned on, we'll generate index entries on stderr
  59. .\" for titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and
  60. .\" index entries marked with X<> in POD. Of course, you'll have to process
  61. .\" the output yourself in some meaningful fashion.
  62. .if \nF \{\
  63. . de IX
  64. . tm Index:\\$1\t\\n%\t"\\$2"
  65. ..
  66. . nr % 0
  67. . rr F
  68. .\}
  69. .\"
  70. .\" For nroff, turn off justification. Always turn off hyphenation; it
  71. .\" makes way too many mistakes in technical documents.
  72. .hy 0
  73. .if n .na
  74. .\"
  75. .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
  76. .\" Fear. Run. Save yourself. No user-serviceable parts.
  77. .bd B 3
  78. . \" fudge factors for nroff and troff
  79. .if n \{\
  80. . ds #H 0
  81. . ds #V .8m
  82. . ds #F .3m
  83. . ds #[ \f1
  84. . ds #] \fP
  85. .\}
  86. .if t \{\
  87. . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
  88. . ds #V .6m
  89. . ds #F 0
  90. . ds #[ \&
  91. . ds #] \&
  92. .\}
  93. . \" simple accents for nroff and troff
  94. .if n \{\
  95. . ds ' \&
  96. . ds ` \&
  97. . ds ^ \&
  98. . ds , \&
  99. . ds ~ ~
  100. . ds /
  101. .\}
  102. .if t \{\
  103. . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
  104. . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
  105. . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
  106. . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
  107. . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
  108. . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
  109. .\}
  110. . \" troff and (daisy-wheel) nroff accents
  111. .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
  112. .ds 8 \h'\*(#H'\(*b\h'-\*(#H'
  113. .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
  114. .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
  115. .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
  116. .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
  117. .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
  118. .ds ae a\h'-(\w'a'u*4/10)'e
  119. .ds Ae A\h'-(\w'A'u*4/10)'E
  120. . \" corrections for vroff
  121. .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
  122. .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
  123. . \" for low resolution devices (crt and lpr)
  124. .if \n(.H>23 .if \n(.V>19 \
  125. \{\
  126. . ds : e
  127. . ds 8 ss
  128. . ds o a
  129. . ds d- d\h'-1'\(ga
  130. . ds D- D\h'-1'\(hy
  131. . ds th \o'bp'
  132. . ds Th \o'LP'
  133. . ds ae ae
  134. . ds Ae AE
  135. .\}
  136. .rm #[ #] #H #V #F C
  137. .\" ======================================================================
  138. .\"
  139. .IX Title "SSH-KEYMAN 1"
  140. .TH SSH-KEYMAN 1 "perl v5.6.1" "2002-05-07" "User Contributed Perl Documentation"
  141. .UC
  142. .SH "NAME"
  143. \&\fBssh-keyman\fR \- authentication key agent management
  144. .SH "SYNOPSIS"
  145. .IX Header "SYNOPSIS"
  146. \&\fBssh-keyman\fR
  147. [\fB\-q\fR]
  148. [\fB\-c\fR]
  149. [\fB\-k\fR]
  150. [\fB\-s\fR]
  151. [\fB\-e\fR]
  152. [\fB\-d\fR]
  153. [\fB\-a\fR]
  154. [\fB\-l\fR]
  155. [\fIkeyfile\fR ...]
  156. .PP
  157. \&\fBssh-keyman\fR
  158. \&\fB\-h\fR
  159. \&\fB\-v\fR
  160. .SH "DESCRIPTION"
  161. .IX Header "DESCRIPTION"
  162. \&\fBssh-keyman\fR is a frontend to the \fBssh-agent\fR and \fBssh-add\fR commands
  163. for managing a long-running \fBssh-agent\fR process. The idea is that
  164. a single \fBssh-agent\fR process is kept persistently running across
  165. multiple user login sessions in order to prevent the startup of multiple
  166. \&\fBssh-agent\fR processes and to avoid having to enter pass-phrases more
  167. often than really necessary from a security point of view.
  168. .PP
  169. The command line options can be combined and are executed internally in
  170. the given order below.
  171. .Ip "\fB\-q\fR, \fB\*(--quiet\fR" 4
  172. .IX Item "-q, quiet"
  173. Quiet operation. Do not print verbose messages.
  174. .Ip "\fB\-c\fR, \fB\*(--cluster\fR" 4
  175. .IX Item "-c, cluster"
  176. Cluster indicator. This forces the use of
  177. \&\fB$HOME/.ssh/agent-\fR\fIhostname\fR as the agent attachment informations
  178. file instead of the default \fB$HOME/.ssh/agent\fR. Use this if your home
  179. directory is NFS-mounted on a cluster of desktops.
  180. .Ip "\fB\-k\fR, \fB\*(--kill\fR" 4
  181. .IX Item "-k, kill"
  182. Kill agent. This makes sure the \fBssh-agent\fR process
  183. is no longer running.
  184. .Ip "\fB\-s\fR, \fB\*(--start\fR" 4
  185. .IX Item "-s, start"
  186. Start agent. This makes sure the \fBssh-agent\fR process is
  187. running. If not, it automatically spawns a new one.
  188. .Ip "\fB\-e\fR, \fB\*(--env\fR" 4
  189. .IX Item "-e, env"
  190. Environment setup. This outputs to \fIstdout\fR the Bourne-Shell commands
  191. necessary to attach the current shell session to the \fBssh-agent\fR
  192. process. The intended usage is "\f(CW\*(C`eval `\f(CBssh-keyman\f(CW \-q \-e \-s`\*(C'\fR" from
  193. within \fB$HOME/.xsession\fR or \fB$HOME/.bash_login\fR scripts.
  194. .Ip "\fB\-d\fR, \fB\*(--delete\fR" 4
  195. .IX Item "-d, delete"
  196. Delete key. This deletes one or more (or all if not \fIkeyfile\fR arguments
  197. are specified at all) from the \fBssh-agent\fR process.
  198. .Ip "\fB\-a\fR, \fB\*(--add\fR" 4
  199. .IX Item "-a, add"
  200. Add key. This adds one or more keys (in \fIkeyfile\fR) to the \fBssh-agent\fR
  201. process. If a key is already loaded, it is skipped and not reloaded.
  202. Additionally, all specified keys are loaded with a single \fBssh-add\fR
  203. call. This way the pass-phrase dialog is reduced to its possible
  204. minimum.
  205. .Ip "\fB\-l\fR, \fB\*(--list\fR" 4
  206. .IX Item "-l, list"
  207. List keys. This lists the currently available keys in the \fBssh-agent\fR
  208. process.
  209. .Ip "\fB\-h\fR, \fB\*(--help\fR" 4
  210. .IX Item "-h, help"
  211. Help information. Display a usage summary on \fIstdout\fR.
  212. .Ip "\fB\-v\fR, \fB\*(--version\fR" 4
  213. .IX Item "-v, version"
  214. Version information. Display a version summary on \fIstdout\fR.
  215. .SH "EXAMPLE"
  216. .IX Header "EXAMPLE"
  217. \&\fI.xsession\fR:
  218. .PP
  219. .Vb 5
  220. \& eval `ssh-keyman -q -s -e`
  221. \& ssh-keyman -q -a </dev/null \e
  222. \& ~/.ssh/id_rsa_1 \e
  223. \& ~/.ssh/id_rsa_2 \e
  224. \& ~/.ssh/id_rsa_3
  225. .Ve
  226. \&\fI.bash_login\fR:
  227. .PP
  228. .Vb 1
  229. \& eval `ssh-keyman -q -s -e`
  230. .Ve
  231. .SH "FILES"
  232. .IX Header "FILES"
  233. .Ip "\fB$HOME/.ssh/agent\fR" 4
  234. .IX Item "$HOME/.ssh/agent"
  235. The generated shell script for attaching the current shell
  236. session (and all of its sub-processes) to the \fBssh-agent\fR process.
  237. At any time this can be directly sourced from within the shell session
  238. or indirectly through the \fBssh-keyman\fR \fB\-e\fR option.
  239. This file is used if the cluster option \fB\-c\fR is not used.
  240. .Ip "\fB$HOME/.ssh/agent-\fR\fIhostname\fR" 4
  241. .IX Item "$HOME/.ssh/agent-hostname"
  242. The generated shell script for attaching the current shell
  243. session (and all of its sub-processes) to the \fBssh-agent\fR process.
  244. At any time this can be directly sourced from within the shell session
  245. or indirectly through the \fBssh-keyman\fR \fB\-e\fR option.
  246. This file is used if the cluster option \fB\-c\fR is used.
  247. .SH "SEE ALSO"
  248. .IX Header "SEE ALSO"
  249. \&\fBssh-agent\fR(1), \fBssh-add\fR(1).
  250. .SH "HISTORY"
  251. .IX Header "HISTORY"
  252. \&\fBssh-keyman\fR was written in May 2002 by Ralf S. Engelschall
  253. <rse@engelschall.com>. It was inspired by the similar program
  254. \&\fBkeychain\fR from Daniel Robbins <drobbins@gentoo.org>. The main
  255. difference between \fBkeychain\fR and \fBssh-keyman\fR is that \fBssh-keyman\fR
  256. uses a more orthogonal interface which even allows you to combine
  257. multiple actions into a single call.