-
Notifications
You must be signed in to change notification settings - Fork 108
/
keychain.txt
282 lines (221 loc) · 11.6 KB
/
keychain.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
NAME
keychain - re-use ssh-agent and/or gpg-agent between logins
SYNOPSIS
keychain [ -hklQqV ] [ --clear --confhost --gpg2 --help --ignore-missing
--list --noask --nocolor --nogui --nolock --quick --quiet --version ]
[ --agents *list* ] [ --attempts *num* ] [ --dir *dirname* ]
[ --host *name* ] [ --lockwait *seconds* ]
[ --stop *which* ] [ --timeout *minutes* ] [ keys... ]
DESCRIPTION
keychain is a manager for ssh-agent, typically run from ~/.bash_profile.
It allows your shells and cron jobs to easily share a single ssh-agent
process. By default, the ssh-agent started by keychain is long-running
and will continue to run, even after you have logged out from the
system. If you want to change this behavior, take a look at the --clear
and --timeout options, described below.
When keychain is run, it checks for a running ssh-agent, otherwise it
starts one. It saves the ssh-agent environment variables to
~/.keychain/${HOSTNAME}-sh, so that subsequent logins and
non-interactive shells such as cron jobs can source the file and make
passwordless ssh connections.
In addition, when keychain runs, it verifies that the key files
specified on the command-line are known to ssh-agent, otherwise it loads
them, prompting you for a password if necessary. Typically, private key
files are specified by filename only, without path, although it is
possible to specify an absolute or relative path to the private key file
as well. If just a private key filename is used, which is typical usage,
keychain will look for the specified private key files in ~/.ssh,
~/.ssh2, or with the -c/--confhost option, inspect the ~/.ssh/config
file and use the IdentityFile option to determine the location of the
private key. Private keys can be symlinks to the actual private key.
Keychain expects associated public key files to exist in the same
directory as the private key files, with a .pub extension. If the
private key is a symlink, the public key can be found alongside the
symlink, or in the same directory as the symlink target (This capability
requires the 'readlink' command to be available on the system.)
As an additional feature, if a private key has an extension ".ext",
keychain will look for privkey.ext.pub first, and if not found, will
look for privkeyname.pub.
Keychain also supports gpg-agent in the same ways that ssh-agent is
supported. By default keychain attempts to start ssh-agent only. You can
modify this behavior using the --agents option.
Keychain supports most UNIX-like operating systems, including Cygwin. It
works with Bourne-compatible, csh-compatible and fish shells.
OPTIONS
--agents *list*
Start the agents listed. By default keychain will start ssh-agent if
it is found in your path. The list should be comma-separated, for
example "gpg,ssh"
--attempts *num*
Try num times to add keys before giving up. The default is 1.
--clear
Delete all of ssh-agent's keys. Typically this is used in
.bash_profile. The theory behind this is that keychain should assume
that you are an intruder until proven otherwise. However, while this
option increases security, it still allows your cron jobs to use
your ssh keys when you're logged out.
--confhost
By default, keychain will look for key pairs in the ~/.ssh/
directory. The --confhost option will inform keychain to look in
~/.ssh/config for IdentityFile settings defined for particular
hosts, and use these paths to locate keys.
--confirm
Keys are subject to interactive confirmation by the SSH_ASKPASS
program before being used for authentication. See the -c option for
ssh-add(1).
--absolute
Any arguments to "--dir" are interpreted to be absolute. The default
behavior is to append "/.keychain" to the argument for backwards
compatibility.
--dir *dirname*
Keychain will use dirname rather than $HOME/.keychain
--query
Keychain will print lines in KEY=value format representing the
values which are set by the agents.
--eval
Keychain will print lines to be evaluated in the shell on stdout. It
respects the SHELL environment variable to determine if Bourne shell
or C shell output is expected.
--env *filename*
After parsing options, keychain will load additional environment
settings from "filename". By default, if "--env" is not given, then
keychain will attempt to load from ~/.keychain/[hostname]-env or
alternatively ~/.keychain/env. The purpose of this file is to
override settings such as PATH, in case ssh is stored in a
non-standard place.
--gpg2
This option changes the default gpg calls to use gpg2 instead to
support distributions such as Ubuntu which has both gpg and gpg2
-h --help
Show help that looks remarkably like this man-page. As of 2.6.10,
help is sent to stdout so it can be easily piped to a pager.
--host *name*
Set alternate hostname for creation of pidfiles
--ignore-missing
Don't warn if some keys on the command-line can't be found. This is
useful for situations where you have a shared .bash_profile, but
your keys might not be available on every machine where keychain is
run.
--inherit *which*
Attempt to inherit agent variables from the environment. This can be
useful in a variety of circumstances, for example when ssh-agent is
started by gdm. The following values are valid for "which":
local Inherit when a pid (e.g. SSH_AGENT_PID) is set in the
environment. This disallows inheriting a forwarded
agent.
any Inherit when a sock (e.g. SSH_AUTH_SOCK) is set in the
environment. This allows inheriting a forwarded agent.
local-once Same as "local", but only inherit if keychain isn't
already providing an agent.
any-once Same as "any", but only inherit if keychain isn't
already providing an agent.
By default, keychain-2.5.0 and later will behave as if "--inherit
local-once" is specified. You should specify "--noinherit" if you
want the older behavior.
-l --list
List signatures of all active SSH keys, and exit, similar to
"ssh-add -l".
-L --list-fp
List fingerprints of all active SSH keys, and exit, similar to
"ssh-add -L".
--lockwait *seconds*
How long to wait for the lock to become available. Defaults to 5
seconds. Specify a value of zero or more. If the lock cannot be
acquired within the specified number of seconds, then this keychain
process will forcefully acquire the lock.
--noask
This option tells keychain do everything it normally does (ensure
ssh-agent is running, set up the ~/.keychain/[hostname]-{c}sh files)
except that it will not prompt you to add any of the keys you
specified if they haven't yet been added to ssh-agent.
--nocolor
Disable color highlighting for non ANSI-compatible terms.
--nogui
Don't honor SSH_ASKPASS, if it is set. This will cause ssh-add to
prompt on the terminal instead of using a graphical program.
--noinherit
Don't inherit any agent processes, overriding the default "--inherit
local-once"
--nolock
Don't attempt to use a lockfile while manipulating files, pids and
keys.
-k --stop *which*
Kill currently running agent processes. The following values are
valid for "which":
all Kill all agent processes and quit keychain immediately.
Prior to keychain-2.5.0, this was the behavior of the bare
"--stop" option.
others Kill agent processes other than the one keychain is
providing. Prior to keychain-2.5.0, keychain would do this
automatically. The new behavior requires that you specify
it explicitly if you want it.
mine Kill keychain's agent processes, leaving other agents
alone.
--systemd
Inject environment variables into the systemd --user session.
-Q --quick
If an ssh-agent process is running then use it. Don't verify the
list of keys, other than making sure it's non-empty. This option
avoids locking when possible so that multiple terminals can be
opened simultaneously without waiting on each other.
-q --quiet
Only print messages in case of warning, error or required
interactivity. As of version 2.6.10, this also suppresses
"Identities added" messages for ssh-agent.
--timeout *minutes*
Allows a timeout to be set for identities added to ssh-agent. When
this option is used with a keychain invocation that starts ssh-agent
itself, then keychain uses the appropriate ssh-agent option to set
the default timeout for ssh-agent. The --timeout option also gets
passed to ssh-add invocations, so any keys added to a running
ssh-agent will be individually configured to have the timeout
specified, overriding any ssh-agent default.
Most users can simply use the timeout setting they desire and get
the result they want -- with all identities having the specified
timeout, whether added by keychain or not. More advanced users can
use one invocation of keychain to set the default timeout, and
optionally set different timeouts for keys added by using a
subsequent invocation of keychain.
-V --version
Show version information.
EXAMPLES
This snippet should work in most shells to load two ssh keys and one gpg
key:
eval `keychain --eval id_rsa id_dsa 0123ABCD`
For the fish shell, use the following format:
if status --is-interactive
keychain --eval --quiet -Q id_rsa | source
end
If you have trouble with that in csh:
setenv SHELL /bin/csh
eval `keychain --eval id_rsa id_dsa 0123ABCD`
This is equivalent for Bourne shells (including bash and zsh) but
doesn't use keychain's --eval feature:
keychain id_rsa id_dsa 0123ABCD
[ -z "$HOSTNAME" ] && HOSTNAME=`uname -n`
[ -f $HOME/.keychain/$HOSTNAME-sh ] && \
. $HOME/.keychain/$HOSTNAME-sh
[ -f $HOME/.keychain/$HOSTNAME-sh-gpg ] && \
. $HOME/.keychain/$HOSTNAME-sh-gpg
This is equivalent for C shell (including tcsh):
keychain id_rsa id_dsa 0123ABCD
host=`uname -n`
if (-f $HOME/.keychain/$host-csh) then
source $HOME/.keychain/$host-csh
endif
if (-f $HOME/.keychain/$host-csh-gpg) then
source $HOME/.keychain/$host-csh-gpg
endif
To load keychain variables from a script (for example from cron) and
abort unless id_dsa is available:
# Load keychain variables and check for id_dsa
[ -z "$HOSTNAME" ] && HOSTNAME=`uname -n`
. $HOME/.keychain/$HOSTNAME-sh 2>/dev/null
ssh-add -l 2>/dev/null | grep -q id_dsa || exit 1
SEE ALSO
ssh-agent(1)
NOTES
Keychain was created and is currently maintained by Daniel Robbins. If
you need to report a bug or request an enhancement, please post to the
Funtoo Linux bug tracker <http://bugs.funtoo.org>. For more information
about keychain, please visit <http://www.funtoo.org/Keychain>.