ssh-keyman.1 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252
  1. .\" Automatically generated by Pod::Man v1.37, Pod::Parser v1.13
  2. .\"
  3. .\" Standard preamble:
  4. .\" ========================================================================
  5. .de Sh \" Subsection heading
  6. .br
  7. .if t .Sp
  8. .ne 5
  9. .PP
  10. \fB\\$1\fR
  11. .PP
  12. ..
  13. .de Sp \" Vertical space (when we can't use .PP)
  14. .if t .sp .5v
  15. .if n .sp
  16. ..
  17. .de Vb \" Begin verbatim text
  18. .ft CW
  19. .nf
  20. .ne \\$1
  21. ..
  22. .de Ve \" End verbatim text
  23. .ft R
  24. .fi
  25. ..
  26. .\" Set up some character translations and predefined strings. \*(-- will
  27. .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
  28. .\" double quote, and \*(R" will give a right double quote. | will give a
  29. .\" real vertical bar. \*(C+ will give a nicer C++. Capital omega is used to
  30. .\" do unbreakable dashes and therefore won't be available. \*(C` and \*(C'
  31. .\" expand to `' in nroff, nothing in troff, for use with C<>.
  32. .tr \(*W-|\(bv\*(Tr
  33. .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
  34. .ie n \{\
  35. . ds -- \(*W-
  36. . ds PI pi
  37. . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
  38. . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
  39. . ds L" ""
  40. . ds R" ""
  41. . ds C` ""
  42. . ds C' ""
  43. 'br\}
  44. .el\{\
  45. . ds -- \|\(em\|
  46. . ds PI \(*p
  47. . ds L" ``
  48. . ds R" ''
  49. 'br\}
  50. .\"
  51. .\" If the F register is turned on, we'll generate index entries on stderr for
  52. .\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index
  53. .\" entries marked with X<> in POD. Of course, you'll have to process the
  54. .\" output yourself in some meaningful fashion.
  55. .if \nF \{\
  56. . de IX
  57. . tm Index:\\$1\t\\n%\t"\\$2"
  58. ..
  59. . nr % 0
  60. . rr F
  61. .\}
  62. .\"
  63. .\" For nroff, turn off justification. Always turn off hyphenation; it makes
  64. .\" way too many mistakes in technical documents.
  65. .hy 0
  66. .if n .na
  67. .\"
  68. .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
  69. .\" Fear. Run. Save yourself. No user-serviceable parts.
  70. . \" fudge factors for nroff and troff
  71. .if n \{\
  72. . ds #H 0
  73. . ds #V .8m
  74. . ds #F .3m
  75. . ds #[ \f1
  76. . ds #] \fP
  77. .\}
  78. .if t \{\
  79. . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
  80. . ds #V .6m
  81. . ds #F 0
  82. . ds #[ \&
  83. . ds #] \&
  84. .\}
  85. . \" simple accents for nroff and troff
  86. .if n \{\
  87. . ds ' \&
  88. . ds ` \&
  89. . ds ^ \&
  90. . ds , \&
  91. . ds ~ ~
  92. . ds /
  93. .\}
  94. .if t \{\
  95. . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
  96. . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
  97. . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
  98. . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
  99. . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
  100. . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
  101. .\}
  102. . \" troff and (daisy-wheel) nroff accents
  103. .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
  104. .ds 8 \h'\*(#H'\(*b\h'-\*(#H'
  105. .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
  106. .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
  107. .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
  108. .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
  109. .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
  110. .ds ae a\h'-(\w'a'u*4/10)'e
  111. .ds Ae A\h'-(\w'A'u*4/10)'E
  112. . \" corrections for vroff
  113. .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
  114. .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
  115. . \" for low resolution devices (crt and lpr)
  116. .if \n(.H>23 .if \n(.V>19 \
  117. \{\
  118. . ds : e
  119. . ds 8 ss
  120. . ds o a
  121. . ds d- d\h'-1'\(ga
  122. . ds D- D\h'-1'\(hy
  123. . ds th \o'bp'
  124. . ds Th \o'LP'
  125. . ds ae ae
  126. . ds Ae AE
  127. .\}
  128. .rm #[ #] #H #V #F C
  129. .\" ========================================================================
  130. .\"
  131. .IX Title "SSH-KEYMAN 1"
  132. .TH SSH-KEYMAN 1 "2004-01-01" "perl v5.8.2" "User Contributed Perl Documentation"
  133. .SH "NAME"
  134. \&\fBssh\-keyman\fR \- authentication key agent management
  135. .SH "SYNOPSIS"
  136. .IX Header "SYNOPSIS"
  137. \&\fBssh-keyman\fR
  138. [\fB\-q\fR]
  139. [\fB\-c\fR]
  140. [\fB\-k\fR]
  141. [\fB\-s\fR]
  142. [\fB\-e\fR]
  143. [\fB\-d\fR]
  144. [\fB\-a\fR]
  145. [\fB\-l\fR]
  146. [\fB\-i\fR]
  147. [\fIkeyfile\fR ...]
  148. .PP
  149. \&\fBssh-keyman\fR
  150. \&\fB\-h\fR
  151. \&\fB\-v\fR
  152. .SH "DESCRIPTION"
  153. .IX Header "DESCRIPTION"
  154. \&\fBssh-keyman\fR is a frontend to the \fBssh-agent\fR and \fBssh-add\fR commands
  155. for managing a long-running \fBssh-agent\fR process. The idea is that
  156. a single \fBssh-agent\fR process is kept persistently running across
  157. multiple user login sessions in order to prevent the startup of multiple
  158. \&\fBssh-agent\fR processes and to avoid having to enter pass-phrases more
  159. often than really necessary from a security point of view.
  160. .PP
  161. The command line options can be combined and are executed internally in
  162. the given order below.
  163. .IP "\fB\-q\fR, \fB\-\-quiet\fR" 4
  164. .IX Item "-q, --quiet"
  165. Quiet operation. Do not print verbose messages.
  166. .IP "\fB\-c\fR, \fB\-\-cluster\fR" 4
  167. .IX Item "-c, --cluster"
  168. Cluster indicator. This forces the use of
  169. \&\fB$HOME/.ssh/agent\-\fR\fIhostname\fR as the agent attachment informations
  170. file instead of the default \fB$HOME/.ssh/agent\fR. Use this if your home
  171. directory is NFS-mounted on a cluster of desktops.
  172. .IP "\fB\-k\fR, \fB\-\-kill\fR" 4
  173. .IX Item "-k, --kill"
  174. Kill agent. This makes sure the \fBssh-agent\fR process
  175. is no longer running.
  176. .IP "\fB\-s\fR, \fB\-\-start\fR" 4
  177. .IX Item "-s, --start"
  178. Start agent. This makes sure the \fBssh-agent\fR process is
  179. running. If not, it automatically spawns a new one.
  180. .IP "\fB\-e\fR, \fB\-\-env\fR" 4
  181. .IX Item "-e, --env"
  182. Environment setup. This outputs to \fIstdout\fR the Bourne-Shell commands
  183. necessary to attach the current shell session to the \fBssh-agent\fR
  184. process. The intended usage is "\f(CW\*(C`eval `\f(CBssh-keyman\f(CW \-q \-e \-s`\*(C'\fR" from
  185. within \fB$HOME/.xsession\fR or \fB$HOME/.bash_login\fR scripts.
  186. .IP "\fB\-d\fR, \fB\-\-delete\fR" 4
  187. .IX Item "-d, --delete"
  188. Delete key. This deletes one or more (or all if not \fIkeyfile\fR arguments
  189. are specified at all) from the \fBssh-agent\fR process.
  190. .IP "\fB\-a\fR, \fB\-\-add\fR" 4
  191. .IX Item "-a, --add"
  192. Add key. This adds one or more keys (in \fIkeyfile\fR) to the \fBssh-agent\fR
  193. process. If a key is already loaded, it is skipped and not reloaded.
  194. Additionally, all specified keys are loaded with a single \fBssh-add\fR
  195. call. This way the pass-phrase dialog is reduced to its possible
  196. minimum.
  197. .IP "\fB\-l\fR, \fB\-\-list\fR" 4
  198. .IX Item "-l, --list"
  199. List keys. This lists the currently available keys in the \fBssh-agent\fR
  200. process.
  201. .IP "\fB\-i\fR, \fB\-\-install\fR" 4
  202. .IX Item "-i, --install"
  203. Install public keys into remote account. This extracts the currently available public keys in the \fBssh-agent\fR
  204. process and installs them into "\f(CW\*(C`~/.ssh/authorized_keys\*(C'\fR" on a specified remote account.
  205. .IP "\fB\-h\fR, \fB\-\-help\fR" 4
  206. .IX Item "-h, --help"
  207. Help information. Display a usage summary on \fIstdout\fR.
  208. .IP "\fB\-v\fR, \fB\-\-version\fR" 4
  209. .IX Item "-v, --version"
  210. Version information. Display a version summary on \fIstdout\fR.
  211. .SH "EXAMPLE"
  212. .IX Header "EXAMPLE"
  213. \&\fI.xsession\fR:
  214. .PP
  215. .Vb 2
  216. \& eval `ssh-keyman -q -s -e`
  217. \& ssh-keyman -q -a </dev/null ~/.ssh/id_rsa ~/.ssh/id_dsa
  218. .Ve
  219. .PP
  220. \&\fI.bash_login\fR:
  221. .PP
  222. .Vb 1
  223. \& eval `ssh-keyman -q -s -e`
  224. .Ve
  225. .SH "FILES"
  226. .IX Header "FILES"
  227. .IP "\fB$HOME/.ssh/agent\fR" 4
  228. .IX Item "$HOME/.ssh/agent"
  229. The generated shell script for attaching the current shell
  230. session (and all of its sub\-processes) to the \fBssh-agent\fR process.
  231. At any time this can be directly sourced from within the shell session
  232. or indirectly through the \fBssh-keyman\fR \fB\-e\fR option.
  233. This file is used if the cluster option \fB\-c\fR is not used.
  234. .IP "\fB$HOME/.ssh/agent\-\fR\fIhostname\fR" 4
  235. .IX Item "$HOME/.ssh/agent-hostname"
  236. The generated shell script for attaching the current shell
  237. session (and all of its sub\-processes) to the \fBssh-agent\fR process.
  238. At any time this can be directly sourced from within the shell session
  239. or indirectly through the \fBssh-keyman\fR \fB\-e\fR option.
  240. This file is used if the cluster option \fB\-c\fR is used.
  241. .SH "SEE ALSO"
  242. .IX Header "SEE ALSO"
  243. \&\fBssh-agent\fR(1), \fBssh-add\fR(1).
  244. .SH "HISTORY"
  245. .IX Header "HISTORY"
  246. \&\fBssh-keyman\fR was written in May 2002 by Ralf S. Engelschall
  247. <rse@engelschall.com>. It was inspired by the similar program
  248. \&\fBkeychain\fR from Daniel Robbins <drobbins@gentoo.org>. The main
  249. difference between \fBkeychain\fR and \fBssh-keyman\fR is that \fBssh-keyman\fR
  250. uses a more orthogonal interface which even allows you to combine
  251. multiple actions into a single call.