Rick, Dave,

I did some more reading and playing around.  A more careful reading of the
"man sshd" page indicates that "RSAAuthentication yes" is only used for
SSH-1, and not SSH-2.  I also found out that SSH-2 is the default, and SSH-1
is a second choice.  So, if you want to use RSA, you have to use SSH-1.  I'm
not sure how you specify that in PuTTY, but one the command-line clients you
can use "-1" to force SSH-1.

I also found out that generating DSA keys creates two different files than
before:
~/.ssh/id_dsa
~/.ssh/id_dsa.pub
You'll have to copy your id_dsa.pub into the ~/.ssh/authorized_keys2 file.
You should _NOT_ have to modify sshd_config to get it to accept DSA keys.
In my case, it took over 20 minutes of CPU to generate my keys.  Ouch!

Finally, I could find no mention in any of the doc of "PubkeyAuthentication"
as a valid parameter to sshd.

Mark Post

-----Original Message-----
From: Rick Troth [mailto:[EMAIL PROTECTED]]
Sent: Friday, February 15, 2002 1:17 PM
To: [EMAIL PROTECTED]
Subject: Re: Setting up pvt/pub keys for SSHD DSA and PUTTY


> But..I don't get prompted for any passphrase when I try
> loggin in using SSH V2

Server might not be configured to allow key-based authentication.

> I suspect (after reviewing the man pages) that I may
> need to tweak the /etc/ssh/sshd_config file to use DSA,
> if so...can someone send me an example of that???

Sounds like you've figured it out already.
Having the existing sshd_config helps a lot.
You may want to look at these statements:

        RSAAuthentication yes
        PubkeyAuthentication yes

Does password authentication work?
Notice that there is a statement controlling that too.

IHTH

Reply via email to