gsissh-keysign (8) - Linux Manuals

gsissh-keysign: ssh helper program for host-based authentication

NAME

ssh-keysign - ssh helper program for host-based authentication

SYNOPSIS

DESCRIPTION

is used by ssh(1) to access the local host keys and generate the digital signature required during host-based authentication with SSH protocol version 2.

is disabled by default and can only be enabled in the global client configuration file /etc/gsissh/ssh_config by setting EnableSSHKeysign to ``yes''

is not intended to be invoked by the user, but from ssh(1). See ssh(1) and sshd(8) for more information about host-based authentication.

FILES

/etc/gsissh/ssh_config
Controls whether is enabled.

/etc/gsissh/ssh_host_dsa_key
/etc/gsissh/ssh_host_ecdsa_key
/etc/gsissh/ssh_host_ed25519_key
/etc/gsissh/ssh_host_rsa_key
These files contain the private parts of the host keys used to generate the digital signature. They should be owned by root, readable only by root, and not accessible to others. Since they are readable only by root, must be set-uid root if host-based authentication is used.

/etc/gsissh/ssh_host_dsa_key-cert.pub
/etc/gsissh/ssh_host_ecdsa_key-cert.pub
/etc/gsissh/ssh_host_ed25519_key-cert.pub
/etc/gsissh/ssh_host_rsa_key-cert.pub
If these files exist they are assumed to contain public certificate information corresponding with the private keys above.

ENVIRONMENT

SSH_USE_STRONG_RNG
The reseeding of the OpenSSL random generator is usually done from /dev/urandom If the SSH_USE_STRONG_RNG environment variable is set to value other than 0 the OpenSSL random generator is reseeded from /dev/random The number of bytes read is defined by the SSH_USE_STRONG_RNG value. Minimum is 14 bytes. This setting is not recommended on the computers without the hardware random generator because insufficient entropy causes the connection to be blocked until enough entropy is available.

HISTORY

first appeared in Ox 3.2 .

AUTHORS

An Markus Friedl Aq Mt markus [at] openbsd.org

SEE ALSO

ssh(1), ssh-keygen1, ssh_config5, sshd(8)