diff options
author | Markus Friedl <markus@cvs.openbsd.org> | 2001-01-13 17:59:19 +0000 |
---|---|---|
committer | Markus Friedl <markus@cvs.openbsd.org> | 2001-01-13 17:59:19 +0000 |
commit | 180080effd32451a209da1a51d39b89a5384c734 (patch) | |
tree | 9e761f39ca121de7e41eec2a594add75e40b30b3 /usr.bin/ssh | |
parent | d0f5bbe42d87f9d5691b960b1b9fbe35dd17af39 (diff) |
small ssh-keygen manpage cleanup; stevesk@pobox.com
Diffstat (limited to 'usr.bin/ssh')
-rw-r--r-- | usr.bin/ssh/ssh-keygen.1 | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/usr.bin/ssh/ssh-keygen.1 b/usr.bin/ssh/ssh-keygen.1 index 3a7ffe23f24..f58cf3790b6 100644 --- a/usr.bin/ssh/ssh-keygen.1 +++ b/usr.bin/ssh/ssh-keygen.1 @@ -81,7 +81,7 @@ generates and manages authentication keys for defaults to generating an RSA key for use by protocols 1.3 and 1.5; specifying the .Fl t -allows you to create a key for use by protocol 2.0. +option allows you to create a key for use by protocol 2.0. .Pp Normally each user wishing to use SSH with RSA or DSA authentication runs this once to create the authentication @@ -100,7 +100,7 @@ The public key is stored in a file with the same name but appended. The program also asks for a passphrase. The passphrase may be empty to indicate no passphrase -(host keys must have empty passphrase), or it may be a string of +(host keys must have an empty passphrase), or it may be a string of arbitrary length. Good passphrases are 10-30 characters long and are not simple sentences or otherwise easily guessable (English |