comparison dropbear.8 @ 1146:3c8403f4669d

Fix typo in dropbear(8)'s manpage
author Guilhem Moulin <guilhem@fripost.org>
date Fri, 07 Aug 2015 23:07:16 +0800
parents 17d874ae93a1
children 67d8a904f5a9
comparison
equal deleted inserted replaced
1145:5709b15a1b57 1146:3c8403f4669d
98 .SH FILES 98 .SH FILES
99 99
100 .TP 100 .TP
101 Authorized Keys 101 Authorized Keys
102 102
103 ~/.ssh/authorized_keys can be set up to allow remote login with a RSA or DSS 103 ~/.ssh/authorized_keys can be set up to allow remote login with a RSA,
104 ECDSA, or DSS
104 key. Each line is of the form 105 key. Each line is of the form
105 .TP 106 .TP
106 [restrictions] ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIgAsp... [comment] 107 [restrictions] ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIgAsp... [comment]
107 108
108 and can be extracted from a Dropbear private host key with "dropbearkey -y". This is the same format as used by OpenSSH, though the restrictions are a subset (keys with unknown restrictions are ignored). 109 and can be extracted from a Dropbear private host key with "dropbearkey -y". This is the same format as used by OpenSSH, though the restrictions are a subset (keys with unknown restrictions are ignored).
137 .TP 138 .TP
138 Host Key Files 139 Host Key Files
139 140
140 Host key files are read at startup from a standard location, by default 141 Host key files are read at startup from a standard location, by default
141 /etc/dropbear/dropbear_dss_host_key, /etc/dropbear/dropbear_rsa_host_key, and 142 /etc/dropbear/dropbear_dss_host_key, /etc/dropbear/dropbear_rsa_host_key, and
142 /etc/dropbear/dropbear-ecdsa_host_key 143 /etc/dropbear/dropbear_ecdsa_host_key
143 or specified on the commandline with -r. These are of the form generated 144 or specified on the commandline with -r. These are of the form generated
144 by dropbearkey. The -R option can be used to automatically generate keys 145 by dropbearkey. The -R option can be used to automatically generate keys
145 in the default location - keys will be generated after startup when the first 146 in the default location - keys will be generated after startup when the first
146 connection is established. This had the benefit that the system /dev/urandom 147 connection is established. This had the benefit that the system /dev/urandom
147 random number source has a better chance of being securely seeded. 148 random number source has a better chance of being securely seeded.