.B ProxyCommand monkeysphere-ssh-proxycommand %h %p
The script can easily be incorporated into other ProxyCommand scripts
-by calling it with the "--no-connect" option, ie:
+by calling it with the "--no-connect" option, i.e.:
.B monkeysphere-ssh-proxycommand --no-connect "$HOST" "$PORT"
keyserver is queried for the host userID. If the host userID is found
in the user's keyring, then the keyserver is not checked. This
assumes that the keyring is kept up-to-date, in a cron job or the
-like, so that revokations are properly handled. If the host userID is
+like, so that revocations are properly handled. If the host userID is
not found in the user's keyring, but the host is listed in the
known_hosts file, then the keyserver is not checked. This last policy
-might change in the future, possibly by adding a defered check, so
+might change in the future, possibly by adding a deferred check, so
that hosts that go from non-monkeysphere-enabled to
monkeysphere-enabled will be properly checked.
.SH SEE ALSO
-.BR monkeypshere (1),
+.BR monkeysphere (1),
.BR ssh (1),
.BR gpg (1)
from the user's authorized_keys file. If no gpg key is found for the
user ID, nothing is done. This subcommand will exit with a status of
0 if at least one acceptable key was found for a user ID, 1 if no
-matching keys wer found at all, and 2 if matching keys were found but
+matching keys were found at all, and 2 if matching keys were found but
none were acceptable. `a' may be used in place of
`update-authorized_keys'.
.TP
HostKey /var/lib/monkeysphere/ssh_host_rsa_key
In order for users logging into the system to be able to verify the
-host via the monkeysphere, at least one person (ie. a server admin)
+host via the monkeysphere, at least one person (i.e. a server admin)
will need to sign the host's key. This is done in the same way that
key signing is usually done, by pulling the host's key from the
keyserver, signing the key, and re-publishing the signature. Once
It is recommended to add "monkeysphere-server update-users" to a
system crontab, so that user keys are kept up-to-date, and key
-revokations and expirations can be processed in a timely manor.
+revocations and expirations can be processed in a timely manor.
.SH ENVIRONMENT
user-controlled file (%h/.ssh/authorized_keys).
.TP
MONKEYSPHERE_MONKEYSPHERE_USER
-User to control authentication keychain (monkeypshere).
+User to control authentication keychain (monkeysphere).
.SH FILES