SS-ADD
Section: User Commands (1)
Index
Return to Main Contents
BSD mandoc
NAME
ss-add
- adds private key identities to the OpenSSH authentication agent
SYNOPSIS
ss-add
[-
CcDdKkLlNqvXx [-
E fingerprint_hash
]
]
[-
H hostkey_file
]
[-
h destination_constraint
]
[-
S provider
]
[-
t life
]
[
file ...
]
ss-add
-
s pkcs11
[-
Cv [
certificate ...
]
]
ss-add
-
e pkcs11
ss-add
-
T
pubkey ...
DESCRIPTION
ss-add
adds private key identities to the authentication agent,
ss-agent1.
When run without arguments, it adds the files
~/.ssh/id_rsa
~/.ssh/id_ecdsa
~/.ssh/id_ecdsa_sk
~/.ssh/id_ed25519
and
~/.ssh/id_ed25519_sk
After loading a private key,
ss-add
will try to load corresponding certificate information from the
filename obtained by appending
-cert.pub
to the name of the private key file.
Alternative file names can be given on the command line.
If any file requires a passphrase,
ss-add
asks for the passphrase from the user.
The passphrase is read from the user's tty.
ss-add
retries the last passphrase if multiple identity files are given.
The authentication agent must be running and the
SSH_AUTH_SOCK
environment variable must contain the name of its socket for
ss-add
to work.
The options are as follows:
- -C
-
When loading keys into or deleting keys from the agent, process
certificates only and skip plain keys.
- -c
-
Indicates that added identities should be subject to confirmation before
being used for authentication.
Confirmation is performed by
ss-askpass1.
Successful confirmation is signaled by a zero exit status from
ss-askpass1,
rather than text entered into the requester.
- -D
-
Deletes all identities from the agent.
- -d
-
Instead of adding identities, removes identities from the agent.
If
ss-add
has been run without arguments, the keys for the default identities and
their corresponding certificates will be removed.
Otherwise, the argument list will be interpreted as a list of paths to
public key files to specify keys and certificates to be removed from the agent.
If no public key is found at a given path,
ss-add
will append
.pub
and retry.
If the argument list consists of
``-''
then
ss-add
will read public keys to be removed from standard input.
- -E fingerprint_hash
-
Specifies the hash algorithm used when displaying key fingerprints.
Valid options are:
``md5''
and
``sha256''
The default is
``sha256''
- -e pkcs11
-
Remove keys provided by the PKCS#11 shared library
pkcs11
- -H hostkey_file
-
Specifies a known hosts file to look up hostkeys when using
destinatio-constrained keys via the
-h
flag.
This option may be specified multiple times to allow multiple files to be
searched.
If no files are specified,
ss-add
will use the default
ssh_config5
known hosts files:
~/.ssh/known_hosts
~/.ssh/known_hosts2
/etc/ssh/ssh_known_hosts
and
/etc/ssh/ssh_known_hosts2
- -h destination_constraint
-
When adding keys, constrain them to be usable only through specific hosts or to
specific destinations.
Destination constraints of the form
`[user@]des-hostname'
permit use of the key only from the origin host (the one running
ss-agent1)
to the listed destination host, with optional user name.
Constraints of the form
`sr-hostname>[user@]ds-hostname'
allow a key available on a forwarded
ss-agent1
to be used through a particular host (as specified by
`sr-hostname'
to authenticate to a further host,
specified by
`ds-hostname'
Multiple destination constraints may be added when loading keys.
When attempting authentication with a key that has destination constraints,
the whole connection path, including
ss-agent1
forwarding, is tested against those constraints and each
hop must be permitted for the attempt to succeed.
For example, if key is forwarded to a remote host,
`hos-b'
and is attempting authentication to another host,
`hos-c'
then the operation will be successful only if
`hos-b'
was permitted from the origin host and the subsequent
`hos-b>hos-c'
hop is also permitted by destination constraints.
Hosts are identified by their host keys, and are looked up from known hosts
files by
.
Wildcards patterns may be used for hostnames and certificate host
keys are supported.
By default, keys added by
ss-add
are not destination constrained.
Destination constraints were added in OpenSSH release 8.9.
Support in both the remote SSH client and server is required when using
destinatio-constrained keys over a forwarded
ss-agent1
channel.
It is also important to note that destination constraints can only be
enforced by
ss-agent1
when a key is used, or when it is forwarded by a
cooperating
ssh(1).
Specifically, it does not prevent an attacker with access to a remote
SSH_AUTH_SOCK
from forwarding it again and using it on a different host (but only to
a permitted destination).
- -K
-
Load resident keys from a FIDO authenticator.
- -k
-
When loading keys into or deleting keys from the agent, process plain private
keys only and skip certificates.
- -L
-
Lists public key parameters of all identities currently represented
by the agent.
- -l
-
Lists fingerprints of all identities currently represented by the agent.
- -N
-
When adding certificates, by default
ss-add
will request that the agent automatically delete the certificate shortly
after the certificate's expiry date.
This flag suppresses this behaviour and does not specify a lifetime for
certificates added to an agent.
- -q
-
Be quiet after a successful operation.
- -S provider
-
Specifies a path to a library that will be used when adding
FIDO authenticato-hosted keys, overriding the default of using the
internal USB HID support.
- -s pkcs11
-
Add keys provided by the PKCS#11 shared library
pkcs11
Certificate files may optionally be listed as comman-line arguments.
If these are present, then they will be loaded into the agent using any
corresponding private keys loaded from the PKCS#11 token.
- -T pubkey ...
-
Tests whether the private keys that correspond to the specified
pubkey
files are usable by performing sign and verify operations on each.
- -t life
-
Set a maximum lifetime when adding identities to an agent.
The lifetime may be specified in seconds or in a time format
specified in
sshd_config5.
- -v
-
Verbose mode.
Causes
ss-add
to print debugging messages about its progress.
This is helpful in debugging problems.
Multiple
-v
options increase the verbosity.
The maximum is 3.
- -X
-
Unlock the agent.
- -x
-
Lock the agent with a password.
ENVIRONMENT
- DISPLAY, SSH_ASKPASS and SSH_ASKPASS_REQUIRE
-
If
ss-add
needs a passphrase, it will read the passphrase from the current
terminal if it was run from a terminal.
If
ss-add
does not have a terminal associated with it but
DISPLAY
and
SSH_ASKPASS
are set, it will execute the program specified by
SSH_ASKPASS
(by default
``ss-askpass''
and open an X11 window to read the passphrase.
This is particularly useful when calling
ss-add
from a
.xsession
or related script.
SSH_ASKPASS_REQUIRE
allows further control over the use of an askpass program.
If this variable is set to
``never''
then
ss-add
will never attempt to use one.
If it is set to
``prefer''
then
ss-add
will prefer to use the askpass program instead of the TTY when requesting
passwords.
Finally, if the variable is set to
``force''
then the askpass program will be used for all passphrase input regardless
of whether
DISPLAY
is set.
- SSH_AUTH_SOCK
-
Identifies the path of a
UNIX
socket used to communicate with the agent.
- SSH_SK_PROVIDER
-
Specifies a path to a library that will be used when loading any
FIDO authenticato-hosted keys, overriding the default of using
the buil-in USB HID support.
FILES
- ~/.ssh/id_ecdsa
-
- ~/.ssh/id_ecdsa_sk
-
- ~/.ssh/id_ed25519
-
- ~/.ssh/id_ed25519_sk
-
- ~/.ssh/id_rsa
-
Contains the ECDSA, authenticato-hosted ECDSA, Ed25519,
authenticato-hosted Ed25519 or RSA authentication identity of the user.
Identity files should not be readable by anyone but the user.
Note that
ss-add
ignores identity files if they are accessible by others.
EXIT STATUS
Exit status is 0 on success, 1 if the specified command fails,
and 2 if
ss-add
is unable to contact the authentication agent.
SEE ALSO
ssh(1),
ss-agent1,
ss-askpass1,
ss-keygen1,
sshd(8)
AUTHORS
OpenSSH is a derivative of the original and free
ssh 1.2.12 release by Tatu Ylonen.
Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos,
Theo de Raadt and Dug Song
removed many bugs, r-added newer features and
created OpenSSH.
Markus Friedl contributed the support for SSH
protocol versions 1.5 and 2.0.
Index
- NAME
-
- SYNOPSIS
-
- DESCRIPTION
-
- ENVIRONMENT
-
- FILES
-
- EXIT STATUS
-
- SEE ALSO
-
- AUTHORS
-