From 180080effd32451a209da1a51d39b89a5384c734 Mon Sep 17 00:00:00 2001 From: Markus Friedl Date: Sat, 13 Jan 2001 17:59:19 +0000 Subject: small ssh-keygen manpage cleanup; stevesk@pobox.com --- usr.bin/ssh/ssh-keygen.1 | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'usr.bin/ssh') diff --git a/usr.bin/ssh/ssh-keygen.1 b/usr.bin/ssh/ssh-keygen.1 index 3a7ffe23f24..f58cf3790b6 100644 --- a/usr.bin/ssh/ssh-keygen.1 +++ b/usr.bin/ssh/ssh-keygen.1 @@ -81,7 +81,7 @@ generates and manages authentication keys for defaults to generating an RSA key for use by protocols 1.3 and 1.5; specifying the .Fl t -allows you to create a key for use by protocol 2.0. +option allows you to create a key for use by protocol 2.0. .Pp Normally each user wishing to use SSH with RSA or DSA authentication runs this once to create the authentication @@ -100,7 +100,7 @@ The public key is stored in a file with the same name but appended. The program also asks for a passphrase. The passphrase may be empty to indicate no passphrase -(host keys must have empty passphrase), or it may be a string of +(host keys must have an empty passphrase), or it may be a string of arbitrary length. Good passphrases are 10-30 characters long and are not simple sentences or otherwise easily guessable (English -- cgit v1.2.3