vpka - VanDyke Software Secure Shell public-key assistant program
vpka [options] source [source ...] destination
is a public-key assistant program which allows a user with no public key file on the server to upload a public key for use in authentication.
File sources and destinations specified when using the -a, -d, or -f options may contain a user, host and port specification, in the following format:
The following conditions apply:
* The user@ argument is optional. If it is not specified, your network username will be used.
* The host argument is optional. If it is not specified, your current host is used.
* The #port argument is optional. If it is not specified, the default port 22 will be used.
Command-line options are described below.
-a key file
The key file to add or upload to the public-key directory on the remote machine; multiple instances of this option are allowed.
to automatically accept host keys.
Note: This option should be used with caution.
If a host key has changed, it will invalidate
the ability to detect a man-in-the-middle
--auth authentication list
The authentication methods to be used in a comma separated list. Valid methods are keyboard-interactive, publickey, password, and gssapi.
The cipher that the SSH2 server will use. Protocol strings or display strings are permitted.
-d key file
The key file to delete from the remote machine. The specified key file must exist on the local machine for this option to work. If the file does not exist on the local machine, you must use the -f option to remove the key. Multiple instances of the -d option are allowed.
-f fingerprint key
The fingerprint key file to delete from the remote machine. This option can be used instead of the -d option when a key file does not exist on the local machine but the fingerprint is available. To view all the keys on the remote machine, use the -s option. Multiple instances of the -f option are allowed.
The identity file to use for public-key authentication or a PKCS#12 file to use for X.509 authentication. If no file is specified,
will attempt to use all public keys in the $HOME/.vshell/publickey directory.
Specifies which key exchange algorithm to use. Valid algorithms are diffie-hellman, diffie-hellman-group, Kerberos, and any OID (in dotted number format) supported by the GSSAPI provider.
Specifies the remote username.
The MAC that the SSH2 server will use.
Fails if prompted for user input.
Specifies the port to be used during connection.
The passphrase for your private key.
Your user password.
Show all remote keys.
Specifies the Socks version 4 server to be used during connection.
Specifies the Socks version 5 server to be used during connection.
Allows you to manually specify the SPN (Server Principal Name). The SPN is almost always of the form host@<server canonical name>. An example of a valid string is "firstname.lastname@example.org". If the server is in a different Kerberos realm, the realm name may need to be appended (e.g., email@example.com@KRBS.MYDOMAIN.COM.
Displays verbose connection debug information.
The compression level (0-9). By default, the compression level is set to 5. Setting the level to 0 turns off compression. When compression is on,
attempts to use firstname.lastname@example.org, zlib, and no compression, in that order, when making a connection.
The following are the locations of data files.
Host key files
The directory of these files is the same directory as the public key directory, which can be specified in the
file. By default, the location is $HOME/.vshell/known_hosts.
Public key files
The directory of these files is specified in the
file. By default, the location is $HOME/.vshell/publickey.