On Monday 27 Oct 2003 20:30, Matthias F. Brandstetter wrote: > Ok, here is a mini-howto for enabling PubkeyAuthentication (under > OpenSSH). First, uncomment these lines in your /etc/ssh/ssd_config: > > RSAAuthentication yes > PubkeyAuthentication yes > AuthorizedKeysFile � � �.ssh/authorized_keys > > Then, of course, restart your SSH server. > > Let's assume you start the backup from the laptop as root, then you > have to create your laptop's RSA key with this command: > > $ ssh-keygen -t rsa > > Just press enter when the programm ask you something. Now, you have > your keys under your user's ~/.ssh, in our example /root/.ssh: > > id_rsa > id_rsa.pub > > Now, copy this id_rsa.pub from your laptop to the server's backup > user's (root) .ssh dir (but as a file called "authorized_keys"): > > $ scp /root/.ssh/id_rsa.pub root@<server>:/root/.ssh/authorized_keys > > (ATTENTION: Look if you allready have such a authorized_keys file > there. In this case you have to >> the content of id_rsa.pub into > this file) > > After that, you should be able to login from your laptop to your > server w/o giving your password.
That doesn't work here: # ssh kroh /etc/ssh/ssh_config: line 41: Bad configuration option: AuthorizedKeysFile /etc/ssh/ssh_config: terminating, 1 bad configuration options `man 5 ssh_config` doesn't list AuthorizedKeysFile as an option. openssh-3.7.1_p2 Peter -- ====================================================================== Portage 2.0.49-r15 (default-x86-1.4, gcc-3.2.3, glibc-2.3.2-r1, 2.4.23_pre8-gss) i686 AMD Athlon(tm) XP 3200+ ====================================================================== -- [EMAIL PROTECTED] mailing list
