On Monday 27 Oct 2003 20:30, Matthias F. Brandstetter wrote:
> Ok, here is a mini-howto for enabling PubkeyAuthentication (under
> OpenSSH). First, uncomment these lines in your /etc/ssh/ssd_config:
>
> RSAAuthentication yes
> PubkeyAuthentication yes
> AuthorizedKeysFile � � �.ssh/authorized_keys
>
> Then, of course, restart your SSH server.
>
> Let's assume you start the backup from the laptop as root, then you
> have to create your laptop's RSA key with this command:
>
> $ ssh-keygen -t rsa
>
> Just press enter when the programm ask you something. Now, you have
> your keys under your user's ~/.ssh, in our example /root/.ssh:
>
> id_rsa
> id_rsa.pub
>
> Now, copy this id_rsa.pub from your laptop to the server's backup
> user's (root) .ssh dir (but as a file called "authorized_keys"):
>
> $ scp /root/.ssh/id_rsa.pub root@<server>:/root/.ssh/authorized_keys
>
> (ATTENTION: Look if you allready have such a authorized_keys file
> there. In this case you have to >> the content of id_rsa.pub into
> this file)
>
> After that, you should be able to login from your laptop to your
> server w/o giving your password.

That doesn't work here:

# ssh kroh
/etc/ssh/ssh_config: line 41: Bad configuration option: 
AuthorizedKeysFile
/etc/ssh/ssh_config: terminating, 1 bad configuration options

`man  5 ssh_config` doesn't list AuthorizedKeysFile as an option.

openssh-3.7.1_p2

Peter
-- 
======================================================================
Portage 2.0.49-r15 (default-x86-1.4, gcc-3.2.3, glibc-2.3.2-r1, 
2.4.23_pre8-gss)
i686 AMD Athlon(tm) XP 3200+
======================================================================


--
[EMAIL PROTECTED] mailing list

Reply via email to