dropbearkey.1 1.4 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061
  1. .TH dropbearkey 1
  2. .SH NAME
  3. dropbearkey \- create private keys for the use with dropbear(8) or dbclient(1)
  4. .SH SYNOPSIS
  5. .B dropbearkey
  6. \-t
  7. .I type
  8. \-f
  9. .I file
  10. [\-s
  11. .IR bits ]
  12. [\-y]
  13. .SH DESCRIPTION
  14. .B dropbearkey
  15. generates a
  16. \fIRSA\fR, \fIDSS\fR, \fIECDSA\fR, or \fIEd25519\fR
  17. format SSH private key, and saves it to a file for the use with the
  18. Dropbear client or server.
  19. Note that
  20. some SSH implementations
  21. use the term "DSA" rather than "DSS", they mean the same thing.
  22. .SH OPTIONS
  23. .TP
  24. .B \-t \fItype
  25. Type of key to generate.
  26. Must be one of
  27. .I rsa
  28. .I ecdsa
  29. .I ed25519
  30. or
  31. .IR dss .
  32. .TP
  33. .B \-f \fIfile
  34. Write the secret key to the file
  35. \fIfile\fR. For client authentication ~/.ssh/id_dropbear is loaded by default
  36. .TP
  37. .B \-s \fIbits
  38. Set the key size to
  39. .I bits
  40. bits, should be multiple of 8 (optional).
  41. .TP
  42. .B \-y
  43. Just print the publickey and fingerprint for the private key in \fIfile\fR.
  44. .SH NOTES
  45. The program dropbearconvert(1) can be used to convert between Dropbear and OpenSSH key formats.
  46. .P
  47. Dropbear does not support encrypted keys.
  48. .SH EXAMPLE
  49. generate a host-key:
  50. # dropbearkey -t rsa -f /etc/dropbear/dropbear_rsa_host_key
  51. extract a public key suitable for authorized_keys from private key:
  52. # dropbearkey -y -f id_rsa | grep "^ssh-rsa " >> authorized_keys
  53. .SH AUTHOR
  54. Matt Johnston (matt@ucc.asn.au).
  55. .br
  56. Gerrit Pape (pape@smarden.org) wrote this manual page.
  57. .SH SEE ALSO
  58. dropbear(8), dbclient(1), dropbearconvert(1)
  59. .P
  60. https://matt.ucc.asn.au/dropbear/dropbear.html