Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame^] | 1 | .\" $OpenBSD: ssh-agent.1,v 1.53 2010/11/21 01:01:13 djm Exp $ |
| 2 | .\" |
| 3 | .\" Author: Tatu Ylonen <ylo@cs.hut.fi> |
| 4 | .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
| 5 | .\" All rights reserved |
| 6 | .\" |
| 7 | .\" As far as I am concerned, the code I have written for this software |
| 8 | .\" can be used freely for any purpose. Any derived versions of this |
| 9 | .\" software must be clearly marked as such, and if the derived work is |
| 10 | .\" incompatible with the protocol description in the RFC file, it must be |
| 11 | .\" called by a name other than "ssh" or "Secure Shell". |
| 12 | .\" |
| 13 | .\" Copyright (c) 1999,2000 Markus Friedl. All rights reserved. |
| 14 | .\" Copyright (c) 1999 Aaron Campbell. All rights reserved. |
| 15 | .\" Copyright (c) 1999 Theo de Raadt. All rights reserved. |
| 16 | .\" |
| 17 | .\" Redistribution and use in source and binary forms, with or without |
| 18 | .\" modification, are permitted provided that the following conditions |
| 19 | .\" are met: |
| 20 | .\" 1. Redistributions of source code must retain the above copyright |
| 21 | .\" notice, this list of conditions and the following disclaimer. |
| 22 | .\" 2. Redistributions in binary form must reproduce the above copyright |
| 23 | .\" notice, this list of conditions and the following disclaimer in the |
| 24 | .\" documentation and/or other materials provided with the distribution. |
| 25 | .\" |
| 26 | .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
| 27 | .\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
| 28 | .\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
| 29 | .\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
| 30 | .\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| 31 | .\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| 32 | .\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| 33 | .\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
| 35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 36 | .\" |
| 37 | .Dd $Mdocdate: November 21 2010 $ |
| 38 | .Dt SSH-AGENT 1 |
| 39 | .Os |
| 40 | .Sh NAME |
| 41 | .Nm ssh-agent |
| 42 | .Nd authentication agent |
| 43 | .Sh SYNOPSIS |
| 44 | .Nm ssh-agent |
| 45 | .Op Fl c | s |
| 46 | .Op Fl d |
| 47 | .Op Fl a Ar bind_address |
| 48 | .Op Fl t Ar life |
| 49 | .Op Ar command Op Ar arg ... |
| 50 | .Nm ssh-agent |
| 51 | .Op Fl c | s |
| 52 | .Fl k |
| 53 | .Sh DESCRIPTION |
| 54 | .Nm |
| 55 | is a program to hold private keys used for public key authentication |
| 56 | (RSA, DSA, ECDSA). |
| 57 | The idea is that |
| 58 | .Nm |
| 59 | is started in the beginning of an X-session or a login session, and |
| 60 | all other windows or programs are started as clients to the ssh-agent |
| 61 | program. |
| 62 | Through use of environment variables the agent can be located |
| 63 | and automatically used for authentication when logging in to other |
| 64 | machines using |
| 65 | .Xr ssh 1 . |
| 66 | .Pp |
| 67 | The options are as follows: |
| 68 | .Bl -tag -width Ds |
| 69 | .It Fl a Ar bind_address |
| 70 | Bind the agent to the |
| 71 | .Ux Ns -domain |
| 72 | socket |
| 73 | .Ar bind_address . |
| 74 | The default is |
| 75 | .Pa $TMPDIR/ssh-XXXXXXXXXX/agent.\*(Ltppid\*(Gt . |
| 76 | .It Fl c |
| 77 | Generate C-shell commands on |
| 78 | .Dv stdout . |
| 79 | This is the default if |
| 80 | .Ev SHELL |
| 81 | looks like it's a csh style of shell. |
| 82 | .It Fl d |
| 83 | Debug mode. |
| 84 | When this option is specified |
| 85 | .Nm |
| 86 | will not fork. |
| 87 | .It Fl k |
| 88 | Kill the current agent (given by the |
| 89 | .Ev SSH_AGENT_PID |
| 90 | environment variable). |
| 91 | .It Fl s |
| 92 | Generate Bourne shell commands on |
| 93 | .Dv stdout . |
| 94 | This is the default if |
| 95 | .Ev SHELL |
| 96 | does not look like it's a csh style of shell. |
| 97 | .It Fl t Ar life |
| 98 | Set a default value for the maximum lifetime of identities added to the agent. |
| 99 | The lifetime may be specified in seconds or in a time format specified in |
| 100 | .Xr sshd_config 5 . |
| 101 | A lifetime specified for an identity with |
| 102 | .Xr ssh-add 1 |
| 103 | overrides this value. |
| 104 | Without this option the default maximum lifetime is forever. |
| 105 | .El |
| 106 | .Pp |
| 107 | If a commandline is given, this is executed as a subprocess of the agent. |
| 108 | When the command dies, so does the agent. |
| 109 | .Pp |
| 110 | The agent initially does not have any private keys. |
| 111 | Keys are added using |
| 112 | .Xr ssh-add 1 . |
| 113 | When executed without arguments, |
| 114 | .Xr ssh-add 1 |
| 115 | adds the files |
| 116 | .Pa ~/.ssh/id_rsa , |
| 117 | .Pa ~/.ssh/id_dsa , |
| 118 | .Pa ~/.ssh/id_ecdsa |
| 119 | and |
| 120 | .Pa ~/.ssh/identity . |
| 121 | If the identity has a passphrase, |
| 122 | .Xr ssh-add 1 |
| 123 | asks for the passphrase on the terminal if it has one or from a small X11 |
| 124 | program if running under X11. |
| 125 | If neither of these is the case then the authentication will fail. |
| 126 | It then sends the identity to the agent. |
| 127 | Several identities can be stored in the |
| 128 | agent; the agent can automatically use any of these identities. |
| 129 | .Ic ssh-add -l |
| 130 | displays the identities currently held by the agent. |
| 131 | .Pp |
| 132 | The idea is that the agent is run in the user's local PC, laptop, or |
| 133 | terminal. |
| 134 | Authentication data need not be stored on any other |
| 135 | machine, and authentication passphrases never go over the network. |
| 136 | However, the connection to the agent is forwarded over SSH |
| 137 | remote logins, and the user can thus use the privileges given by the |
| 138 | identities anywhere in the network in a secure way. |
| 139 | .Pp |
| 140 | There are two main ways to get an agent set up: |
| 141 | The first is that the agent starts a new subcommand into which some environment |
| 142 | variables are exported, eg |
| 143 | .Cm ssh-agent xterm & . |
| 144 | The second is that the agent prints the needed shell commands (either |
| 145 | .Xr sh 1 |
| 146 | or |
| 147 | .Xr csh 1 |
| 148 | syntax can be generated) which can be evaluated in the calling shell, eg |
| 149 | .Cm eval `ssh-agent -s` |
| 150 | for Bourne-type shells such as |
| 151 | .Xr sh 1 |
| 152 | or |
| 153 | .Xr ksh 1 |
| 154 | and |
| 155 | .Cm eval `ssh-agent -c` |
| 156 | for |
| 157 | .Xr csh 1 |
| 158 | and derivatives. |
| 159 | .Pp |
| 160 | Later |
| 161 | .Xr ssh 1 |
| 162 | looks at these variables and uses them to establish a connection to the agent. |
| 163 | .Pp |
| 164 | The agent will never send a private key over its request channel. |
| 165 | Instead, operations that require a private key will be performed |
| 166 | by the agent, and the result will be returned to the requester. |
| 167 | This way, private keys are not exposed to clients using the agent. |
| 168 | .Pp |
| 169 | A |
| 170 | .Ux Ns -domain |
| 171 | socket is created and the name of this socket is stored in the |
| 172 | .Ev SSH_AUTH_SOCK |
| 173 | environment |
| 174 | variable. |
| 175 | The socket is made accessible only to the current user. |
| 176 | This method is easily abused by root or another instance of the same |
| 177 | user. |
| 178 | .Pp |
| 179 | The |
| 180 | .Ev SSH_AGENT_PID |
| 181 | environment variable holds the agent's process ID. |
| 182 | .Pp |
| 183 | The agent exits automatically when the command given on the command |
| 184 | line terminates. |
| 185 | .Sh FILES |
| 186 | .Bl -tag -width Ds |
| 187 | .It Pa ~/.ssh/identity |
| 188 | Contains the protocol version 1 RSA authentication identity of the user. |
| 189 | .It Pa ~/.ssh/id_dsa |
| 190 | Contains the protocol version 2 DSA authentication identity of the user. |
| 191 | .It Pa ~/.ssh/id_ecdsa |
| 192 | Contains the protocol version 2 ECDSA authentication identity of the user. |
| 193 | .It Pa ~/.ssh/id_rsa |
| 194 | Contains the protocol version 2 RSA authentication identity of the user. |
| 195 | .It Pa $TMPDIR/ssh-XXXXXXXXXX/agent.\*(Ltppid\*(Gt |
| 196 | .Ux Ns -domain |
| 197 | sockets used to contain the connection to the authentication agent. |
| 198 | These sockets should only be readable by the owner. |
| 199 | The sockets should get automatically removed when the agent exits. |
| 200 | .El |
| 201 | .Sh SEE ALSO |
| 202 | .Xr ssh 1 , |
| 203 | .Xr ssh-add 1 , |
| 204 | .Xr ssh-keygen 1 , |
| 205 | .Xr sshd 8 |
| 206 | .Sh AUTHORS |
| 207 | OpenSSH is a derivative of the original and free |
| 208 | ssh 1.2.12 release by Tatu Ylonen. |
| 209 | Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, |
| 210 | Theo de Raadt and Dug Song |
| 211 | removed many bugs, re-added newer features and |
| 212 | created OpenSSH. |
| 213 | Markus Friedl contributed the support for SSH |
| 214 | protocol versions 1.5 and 2.0. |