Deleted Added
full compact
ssh-copy-id.1 (189006) ssh-copy-id.1 (214979)
1.ig \" -*- nroff -*-
2Copyright (c) 1999 Philip Hands Computing <http://www.hands.com/>
3
4Permission is granted to make and distribute verbatim copies of
5this manual provided the copyright notice and this permission notice
6are preserved on all copies.
7
8Permission is granted to copy and distribute modified versions of this

--- 11 unchanged lines hidden (view full) ---

20.SH NAME
21ssh-copy-id \- install your public key in a remote machine's authorized_keys
22.SH SYNOPSIS
23.B ssh-copy-id [-i [identity_file]]
24.I "[user@]machine"
25.br
26.SH DESCRIPTION
27.BR ssh-copy-id
1.ig \" -*- nroff -*-
2Copyright (c) 1999 Philip Hands Computing <http://www.hands.com/>
3
4Permission is granted to make and distribute verbatim copies of
5this manual provided the copyright notice and this permission notice
6are preserved on all copies.
7
8Permission is granted to copy and distribute modified versions of this

--- 11 unchanged lines hidden (view full) ---

20.SH NAME
21ssh-copy-id \- install your public key in a remote machine's authorized_keys
22.SH SYNOPSIS
23.B ssh-copy-id [-i [identity_file]]
24.I "[user@]machine"
25.br
26.SH DESCRIPTION
27.BR ssh-copy-id
28is a script that uses ssh to log into a remote machine (presumably
29using a login password, so password authentication should be enabled,
30unless you've done some clever use of multiple identities)
31.PP
32It also changes the permissions of the remote user's home,
33.BR ~/.ssh ,
34and
28is a script that uses ssh to log into a remote machine and
29append the indicated identity file to that machine's
35.B ~/.ssh/authorized_keys
30.B ~/.ssh/authorized_keys
36to remove group writability (which would otherwise prevent you from logging in, if the remote
37.B sshd
38has
39.B StrictModes
40set in its configuration).
31file.
41.PP
42If the
43.B -i
44option is given then the identity file (defaults to
45.BR ~/.ssh/id_rsa.pub )
46is used, regardless of whether there are any keys in your
47.BR ssh-agent .
48Otherwise, if this:

--- 5 unchanged lines hidden (view full) ---

54If the
55.B -i
56option is used, or the
57.B ssh-add
58produced no output, then it uses the contents of the identity
59file. Once it has one or more fingerprints (by whatever means) it
60uses ssh to append them to
61.B ~/.ssh/authorized_keys
32.PP
33If the
34.B -i
35option is given then the identity file (defaults to
36.BR ~/.ssh/id_rsa.pub )
37is used, regardless of whether there are any keys in your
38.BR ssh-agent .
39Otherwise, if this:

--- 5 unchanged lines hidden (view full) ---

45If the
46.B -i
47option is used, or the
48.B ssh-add
49produced no output, then it uses the contents of the identity
50file. Once it has one or more fingerprints (by whatever means) it
51uses ssh to append them to
52.B ~/.ssh/authorized_keys
62on the remote machine (creating the file, and directory, if necessary)
53on the remote machine (creating the file, and directory, if necessary.)
63
54
55.SH NOTES
56This program does not modify the permissions of any
57pre-existing files or directories. Therefore, if the remote
58.B sshd
59has
60.B StrictModes
61set in its
62configuration, then the user's home,
63.B ~/.ssh
64folder, and
65.B ~/.ssh/authorized_keys
66file may need to have group writability disabled manually, e.g. via
67
68.B " chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys"
69
70on the remote machine.
71
64.SH "SEE ALSO"
65.BR ssh (1),
66.BR ssh-agent (1),
67.BR sshd (8)
72.SH "SEE ALSO"
73.BR ssh (1),
74.BR ssh-agent (1),
75.BR sshd (8)