summaryrefslogtreecommitdiffstats
path: root/ssh-keyscan.1 (follow)
Commit message (Collapse)AuthorAgeFilesLines
* upstream: disable the DSA signature algorithm by default; okdjm@openbsd.org2024-06-171-12/+4
| | | | | | | | | markus@ (yes, I know this expands to "the Digitial Signature Algorithm signature algorithm) OpenBSD-Commit-ID: 961ef594e46dd2dcade8dd5721fa565cee79ffed
* upstream: sort -q in the options list;jmc@openbsd.org2024-06-151-4/+4
| | | | OpenBSD-Commit-ID: 6839b38378f38f754de638a5e988c13b4164cc7c
* upstream: ssh-keyscan -q man bitsdjm@openbsd.org2024-06-141-3/+6
| | | | OpenBSD-Commit-ID: ba28d0e1ac609a4c99c453e57e86560c79079db1
* upstream: space between macro and punctuation; sort usage();jmc@openbsd.org2023-02-161-2/+2
| | | | OpenBSD-Commit-ID: 6141610cfca037700730e41f868d1d9124958f8c
* upstream: let ssh-keygen and ssh-keyscan acceptdjm@openbsd.org2023-02-101-2/+17
| | | | | | | -Ohashalg=sha1|sha256 when outputting SSHFP fingerprints to allow algorithm selection. bz3493 ok dtucker@ OpenBSD-Commit-ID: e6e07fe21318a873bd877f333e189eb963a11b3d
* upstream: allow ssh-keyscan(1) to accept CIDR address ranges, e.g.djm@openbsd.org2022-10-281-4/+20
| | | | | | | | | | | ssh-keyscan 192.168.0.0/24 If a CIDR range is passed, then it will be expanded to all possible addresses in the range including the all-0s and all-1s addresses. bz#976 feedback/ok markus@ OpenBSD-Commit-ID: ce6c5211f936ac0053fd4a2ddb415277931e6c4b
* upstream: Add missing *-sk types to ssh-keyscan manpage. Fromdtucker@openbsd.org2022-06-031-3/+7
| | | | | | skazi0 via github PR#294. OpenBSD-Commit-ID: fda2c869cdb871f3c90a89fb3f985370bb5d25c0
* upstream: tweak the Nd lines for a bit of consistency; ok markusjmc@openbsd.org2019-12-111-3/+3
| | | | OpenBSD-Commit-ID: 876651bdde06bc1e72dd4bd7ad599f42a6ce5a16
* upstream: move the input format details to -f; remove the outputjmc@openbsd.org2018-03-121-24/+9
| | | | | | | | format details and point to sshd(8), where it is documented; ok dtucker OpenBSD-Commit-ID: 95f17e47dae02a6ac7329708c8c893d4cad0004a
* upstream: apply a lick of paint; tweaks/ok dtuckerjmc@openbsd.org2018-03-031-56/+46
| | | | OpenBSD-Commit-ID: 518a6736338045e0037f503c21027d958d05e703
* upstream: some cleanup for BindInterface and ssh-keyscan;jmc@openbsd.org2018-02-261-3/+4
| | | | OpenBSD-Commit-ID: 1a719ebeae22a166adf05bea5009add7075acc8c
* upstream: Add ssh-keyscan -D option to make it print its results indjm@openbsd.org2018-02-231-3/+13
| | | | | | SSHFP format bz#2821, ok dtucker@ OpenBSD-Commit-ID: 831446b582e0f298ca15c9d99c415c899e392221
* upstream commitjmc@openbsd.org2017-05-081-6/+3
| | | | | | rsa1 is no longer valid; Upstream-ID: 9953d09ed9841c44b7dcf7019fa874783a709d89
* upstream commitdjm@openbsd.org2017-05-011-7/+2
| | | | | | | | remove KEY_RSA1 ok markus@ Upstream-ID: 7408517b077c892a86b581e19f82a163069bf133
* upstream commitjmc@openbsd.org2015-11-091-2/+2
| | | | | | -c before -H, in SYNOPSIS and usage(); Upstream-ID: 25e8c58a69e1f37fcd54ac2cd1699370acb5e404
* upstream commitdjm@openbsd.org2015-11-091-3/+5
| | | | | | | Add "ssh-keyscan -c ..." flag to allow fetching certificates instead of plain keys; ok markus@ Upstream-ID: 0947e2177dba92339eced9e49d3c5bf7dda69f82
* upstream commitsobrado@openbsd.org2014-10-131-3/+3
| | | | | | | improve capitalization for the Ed25519 public-key signature system. ok djm@
* - naddy@cvs.openbsd.org 2014/03/12 13:06:59Damien Miller2014-04-201-7/+8
| | | | | [ssh-keyscan.1] scan for Ed25519 keys by default too
* - jmc@cvs.openbsd.org 2014/01/28 14:13:39Damien Miller2014-02-041-14/+14
| | | | | | [ssh-keyscan.1] kill some bad Pa; From: Jan Stary
* - naddy@cvs.openbsd.org 2013/12/07 11:58:46Damien Miller2013-12-181-3/+4
| | | | | | [ssh-add.1 ssh-agent.1 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8 ssh.1] [ssh_config.5 sshd.8 sshd_config.5] add missing mentions of ed25519; ok djm@
* - markus@cvs.openbsd.org 2013/12/06 13:39:49Damien Miller2013-12-071-2/+3
| | | | | | | | | | | | [authfd.c authfile.c key.c key.h myproposal.h pathnames.h readconf.c] [servconf.c ssh-agent.c ssh-keygen.c ssh-keyscan.1 ssh-keyscan.c] [ssh-keysign.c ssh.c ssh_config.5 sshd.8 sshd.c verify.c ssh-ed25519.c] [sc25519.h sc25519.c hash.c ge25519_base.data ge25519.h ge25519.c] [fe25519.h fe25519.c ed25519.c crypto_api.h blocks.c] support ed25519 keys (hostkeys and user identities) using the public domain ed25519 reference code from SUPERCOP, see http://ed25519.cr.yp.to/software.html feedback, help & ok djm@
* - schwarze@cvs.openbsd.org 2013/07/16 00:07:52Damien Miller2013-07-181-4/+4
| | | | | [scp.1 sftp-server.8 ssh-keyscan.1 ssh-keysign.8 ssh-pkcs11-helper.8] use .Mt for email addresses; from Jan Stary <hans at stare dot cz>; ok jmc@
* - djm@cvs.openbsd.org 2012/04/11 13:34:17Damien Miller2012-04-221-4/+7
| | | | | | [ssh-keyscan.1 ssh-keyscan.c] now that sshd defaults to offering ECDSA keys, ssh-keyscan should also look for them by default; bz#1971
* - djm@cvs.openbsd.org 2010/08/31 11:54:45Damien Miller2010-08-311-8/+12
| | | | | | | | | | | | | | | | | | | | | | | | | [PROTOCOL PROTOCOL.agent PROTOCOL.certkeys auth2-jpake.c authfd.c] [authfile.c buffer.h dns.c kex.c kex.h key.c key.h monitor.c] [monitor_wrap.c myproposal.h packet.c packet.h pathnames.h readconf.c] [ssh-add.1 ssh-add.c ssh-agent.1 ssh-agent.c ssh-keygen.1 ssh-keygen.c] [ssh-keyscan.1 ssh-keyscan.c ssh-keysign.8 ssh.1 ssh.c ssh2.h] [ssh_config.5 sshconnect.c sshconnect2.c sshd.8 sshd.c sshd_config.5] [uuencode.c uuencode.h bufec.c kexecdh.c kexecdhc.c kexecdhs.c ssh-ecdsa.c] Implement Elliptic Curve Cryptography modes for key exchange (ECDH) and host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer better performance than plain DH and DSA at the same equivalent symmetric key length, as well as much shorter keys. Only the mandatory sections of RFC5656 are implemented, specifically the three REQUIRED curves nistp256, nistp384 and nistp521 and only ECDH and ECDSA. Point compression (optional in RFC5656 is NOT implemented). Certificate host and user keys using the new ECDSA key types are supported. Note that this code has not been tested for interoperability and may be subject to change. feedback and ok markus@
* - dtucker@cvs.openbsd.org 2010/01/09 23:04:13Darren Tucker2010-01-101-5/+2
| | | | | | | | | | | | | | | [channels.c ssh.1 servconf.c sshd_config.5 sshd.c channels.h servconf.h ssh-keyscan.1 ssh-keyscan.c readconf.c sshconnect.c misc.c ssh.c readconf.h scp.1 sftp.1 ssh_config.5 misc.h] Remove RoutingDomain from ssh since it's now not needed. It can be replaced with "route exec" or "nc -V" as a proxycommand. "route exec" also ensures that trafic such as DNS lookups stays withing the specified routingdomain. For example (from reyk): # route -T 2 exec /usr/sbin/sshd or inherited from the parent process $ route -T 2 exec sh $ ssh 10.1.2.3 ok deraadt@ markus@ stevesk@ reyk@
* - reyk@cvs.openbsd.org 2009/10/28 16:38:18Darren Tucker2010-01-081-2/+5
| | | | | | | | [ssh_config.5 sshd.c misc.h ssh-keyscan.1 readconf.h sshconnect.c channels.c channels.h servconf.h servconf.c ssh.1 ssh-keyscan.c scp.1 sftp.1 sshd_config.5 readconf.c ssh.c misc.c] Allow to set the rdomain in ssh/sftp/scp/sshd and ssh-keyscan. ok markus@
* - stevesk@cvs.openbsd.org 2008/12/29 01:12:36Damien Miller2009-01-281-3/+3
| | | | | | [ssh-keyscan.1] fix example, default key type is rsa for 3+ years; from frederic.perrin@resel.fr
* - sobrado@cvs.openbsd.org 2008/11/01 11:14:36Damien Miller2008-11-031-3/+3
| | | | | [ssh-keyscan.1 ssh-keyscan.c] the ellipsis is not an optional argument; while here, improve spacing.
* - djm@cvs.openbsd.org 2008/04/30 10:14:03Damien Miller2008-05-191-3/+3
| | | | | | [ssh-keyscan.1 ssh-keyscan.c] default to rsa (protocol 2) keys, instead of rsa1 keys; spotted by larsnooden AT openoffice.org
* - jmc@cvs.openbsd.org 2007/05/31 19:20:16Darren Tucker2007-06-051-2/+2
| | | | | | | [scp.1 ssh_config.5 sftp-server.8 ssh-agent.1 sshd_config.5 sftp.1 ssh-keygen.1 ssh-keyscan.1 ssh-add.1 sshd.8 ssh.1 ssh-keysign.8] convert to new .Dd format; (We will need to teach mdoc2man.awk to understand this too.)
* - ray@cvs.openbsd.org 2006/09/25 04:55:38Darren Tucker2006-10-171-2/+2
| | | | | | | [ssh-keyscan.1 ssh.1] Change "a SSH" to "an SSH". Hurray, I'm not the only one who pronounces "SSH" as "ess-ess-aich". OK jmc@ and stevesk@.
* - jaredy@cvs.openbsd.org 2005/09/30 20:34:26Darren Tucker2005-10-031-1/+2
| | | | | [ssh-keyscan.1] deploy .An -nosplit; ok jmc
* - jmc@cvs.openbsd.org 2005/03/01 15:47:14Damien Miller2005-03-021-22/+22
| | | | | [ssh-keyscan.1 ssh-keyscan.c] sort options and sync usage();
* - djm@cvs.openbsd.org 2005/03/01 10:41:28Damien Miller2005-03-011-2/+10
| | | | | [ssh-keyscan.1 ssh-keyscan.c] option to hash hostnames output by ssh-keyscan; ok markus@ deraadt@
* - brad@cvs.openbsd.org 2004/07/12 23:34:25Darren Tucker2004-07-171-2/+2
| | | | | | | [ssh-keyscan.1] Fix incorrect macro, .I -> .Em From: Eric S. Raymond <esr at thyrsus dot com> ok jmc@
* - jmc@cvs.openbsd.org 2003/06/10 09:12:11Damien Miller2003-06-111-26/+25
| | | | | | | | | | | [scp.1 sftp-server.8 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5] [sshd.8 sshd_config.5 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8] - section reorder - COMPATIBILITY merge - macro cleanup - kill whitespace at EOL - new sentence, new line ssh pages ok markus@
* - markus@cvs.openbsd.org 2003/05/12 18:35:18Damien Miller2003-05-141-2/+2
| | | | | [ssh-keyscan.1] typo: DSA keys are of type ssh-dss; Brian Poole
* - (djm) OpenBSD CVS SyncDamien Miller2003-04-011-7/+13
| | | | | | | | | | - jmc@cvs.openbsd.org 2003/03/28 10:11:43 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5] [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8] - killed whitespace - new sentence new line - .Bk for arguments ok markus@
* - mpech@cvs.openbsd.org 2002/02/13 08:33:47Damien Miller2002-02-191-3/+3
| | | | | | | [ssh-keyscan.1] When you give command examples and etc., in a manual page prefix them with: $ command or # command
* - (djm) OpenBSD CVS SyncDamien Miller2002-02-101-2/+2
| | | | | | | - deraadt@cvs.openbsd.org 2002/02/09 17:37:34 [pathnames.h session.c ssh.1 sshd.8 sshd_config ssh-keyscan.1] move ssh config files to /etc/ssh - (djm) Adjust portable Makefile.in tnd ssh-rand-helper.c o match
* - deraadt@cvs.openbsd.org 2001/09/05 06:23:07Ben Lindstrom2001-09-121-9/+9
| | | | | [scp.1 sftp.1 ssh.1 ssh-agent.1 sshd.8 ssh-keygen.1 ssh-keyscan.1] avoid first person in manual pages
* - stevesk@cvs.openbsd.org 2001/08/23 18:08:59Ben Lindstrom2001-09-121-3/+3
| | | | | [ssh-add.1 ssh-keyscan.1] minor cleanup
* - markus@cvs.openbsd.org 2001/08/05 23:18:20Ben Lindstrom2001-08-071-11/+64
| | | | | [ssh-keyscan.1 ssh-keyscan.c] ssh 2 support; from wayned@users.sourceforge.net
* - mpech@cvs.openbsd.org 2001/08/02 18:37:35Ben Lindstrom2001-08-071-12/+13
| | | | | | | | | [ssh-keyscan.1] o) .Sh AUTHOR -> .Sh AUTHORS; o) .Sh EXAMPLE -> .Sh EXAMPLES; o) Delete .Sh OPTIONS. Text moved to .Sh DESCRIPTION; millert@ ok
* - itojun@cvs.openbsd.org 2001/06/23 17:48:18Ben Lindstrom2001-06-251-4/+4
| | | | | [sftp.1 ssh.1 sshd.8 ssh-keyscan.1] kill whitespace at EOL.
* - mpech@cvs.openbsd.org 2001/06/22 10:17:51Ben Lindstrom2001-06-251-5/+2
| | | | | | | | | | | [ssh.1 sshd.8 ssh-keyscan.1] o) .Sh AUTHOR -> .Sh AUTHORS; o) remove unnecessary .Pp; o) better -mdoc style; o) typo; o) sort SEE ALSO; aaron@ ok
* - pvalchev@cvs.openbsd.org 2001/06/05 05:05:39Ben Lindstrom2001-06-091-3/+2
| | | | | [ssh-keyscan.1 ssh-keyscan.c] License clarification from David Mazieres, ok deraadt@
* - ian@cvs.openbsd.org 2001/04/18 16:21:05Ben Lindstrom2001-04-191-2/+2
| | | | | [ssh-keyscan.1] Fix typo reported in PR/1779
* - deraadt@cvs.openbsd.org 2001/03/01 03:38:33Ben Lindstrom2001-03-051-4/+11
| | | | | [cli.c cli.h rijndael.h ssh-keyscan.1] copyright notices on all source files
* - niklas@cvs.openbsd.org 2001/01/2001Ben Lindstrom2001-01-291-0/+2
| | | | | | | | | | [atomicio.h canohost.h clientloop.h deattack.h dh.h dispatch.h groupaccess.c groupaccess.h hmac.h hostfile.h includes.h kex.h key.h log.h login.h match.h misc.h myproposal.h nchan.ms pathnames.h radix.h readpass.h rijndael.h serverloop.h session.h sftp.h ssh-add.1 ssh-dss.h ssh-keygen.1 ssh-keyscan.1 ssh-rsa.h ssh1.h ssh_config sshconnect.h sshd_config tildexpand.h uidswap.h uuencode.h] $OpenBSD$