ssh-keyscan.0 (225825) | ssh-keyscan.0 (239849) |
---|---|
1SSH-KEYSCAN(1) OpenBSD Reference Manual SSH-KEYSCAN(1) 2 3NAME 4 ssh-keyscan - gather ssh public keys 5 6SYNOPSIS 7 ssh-keyscan [-46Hv] [-f file] [-p port] [-T timeout] [-t type] 8 [host | addrlist namelist] ... --- 36 unchanged lines hidden (view full) --- 45 is closed and the host in question considered unavailable. 46 Default is 5 seconds. 47 48 -t type 49 Specifies the type of the key to fetch from the scanned hosts. 50 The possible values are ``rsa1'' for protocol version 1 and 51 ``dsa'', ``ecdsa'' or ``rsa'' for protocol version 2. Multiple 52 values may be specified by separating them with commas. The | 1SSH-KEYSCAN(1) OpenBSD Reference Manual SSH-KEYSCAN(1) 2 3NAME 4 ssh-keyscan - gather ssh public keys 5 6SYNOPSIS 7 ssh-keyscan [-46Hv] [-f file] [-p port] [-T timeout] [-t type] 8 [host | addrlist namelist] ... --- 36 unchanged lines hidden (view full) --- 45 is closed and the host in question considered unavailable. 46 Default is 5 seconds. 47 48 -t type 49 Specifies the type of the key to fetch from the scanned hosts. 50 The possible values are ``rsa1'' for protocol version 1 and 51 ``dsa'', ``ecdsa'' or ``rsa'' for protocol version 2. Multiple 52 values may be specified by separating them with commas. The |
53 default is ``rsa''. | 53 default is to fetch ``rsa'' and ``ecdsa'' keys. |
54 55 -v Verbose mode. Causes ssh-keyscan to print debugging messages 56 about its progress. 57 58SECURITY 59 If an ssh_known_hosts file is constructed using ssh-keyscan without 60 verifying the keys, users will be vulnerable to man in the middle 61 attacks. On the other hand, if the security model allows such a risk, --- 39 unchanged lines hidden (view full) --- 101 2. 102 103BUGS 104 It generates "Connection closed by remote host" messages on the consoles 105 of all the machines it scans if the server is older than version 2.9. 106 This is because it opens a connection to the ssh port, reads the public 107 key, and drops the connection as soon as it gets the key. 108 | 54 55 -v Verbose mode. Causes ssh-keyscan to print debugging messages 56 about its progress. 57 58SECURITY 59 If an ssh_known_hosts file is constructed using ssh-keyscan without 60 verifying the keys, users will be vulnerable to man in the middle 61 attacks. On the other hand, if the security model allows such a risk, --- 39 unchanged lines hidden (view full) --- 101 2. 102 103BUGS 104 It generates "Connection closed by remote host" messages on the consoles 105 of all the machines it scans if the server is older than version 2.9. 106 This is because it opens a connection to the ssh port, reads the public 107 key, and drops the connection as soon as it gets the key. 108 |
109OpenBSD 5.0 August 31, 2010 OpenBSD 5.0 | 109OpenBSD 5.2 April 11, 2012 OpenBSD 5.2 |