Rick, Dave, I did some more reading and playing around. A more careful reading of the "man sshd" page indicates that "RSAAuthentication yes" is only used for SSH-1, and not SSH-2. I also found out that SSH-2 is the default, and SSH-1 is a second choice. So, if you want to use RSA, you have to use SSH-1. I'm not sure how you specify that in PuTTY, but one the command-line clients you can use "-1" to force SSH-1.
I also found out that generating DSA keys creates two different files than before: ~/.ssh/id_dsa ~/.ssh/id_dsa.pub You'll have to copy your id_dsa.pub into the ~/.ssh/authorized_keys2 file. You should _NOT_ have to modify sshd_config to get it to accept DSA keys. In my case, it took over 20 minutes of CPU to generate my keys. Ouch! Finally, I could find no mention in any of the doc of "PubkeyAuthentication" as a valid parameter to sshd. Mark Post -----Original Message----- From: Rick Troth [mailto:[EMAIL PROTECTED]] Sent: Friday, February 15, 2002 1:17 PM To: [EMAIL PROTECTED] Subject: Re: Setting up pvt/pub keys for SSHD DSA and PUTTY > But..I don't get prompted for any passphrase when I try > loggin in using SSH V2 Server might not be configured to allow key-based authentication. > I suspect (after reviewing the man pages) that I may > need to tweak the /etc/ssh/sshd_config file to use DSA, > if so...can someone send me an example of that??? Sounds like you've figured it out already. Having the existing sshd_config helps a lot. You may want to look at these statements: RSAAuthentication yes PubkeyAuthentication yes Does password authentication work? Notice that there is a statement controlling that too. IHTH
