#generate keys:
ssh-keygen -t dsa
#copy to destenation
scp .ssh/id_dsa.pub <target_machin>:/<path to home>/.ssh/authorized_keys2
#(actually you should append to destenation instead of copying to it)


erez.

On Feb 16, 2008 1:40 PM, Geoff Shang <[EMAIL PROTECTED]> wrote:

> Hi,
>
> First, thanks to everyone who made suggestions re incremental backups.
> I've not looked into every suggestion, but have so far decided to go with
> duplicity as it appears to take care of all the physical backup files so I
> don't need to know how it's all stored and how to get at a particular
> backed up file - it takes care of that for me.
>
> I've now hit a problem with SSH keys however.  Duplicity needs to be able
> to conect via SSH without needing a password or passphrase, as there seems
> to be no way to specify it.  At any rate, I want this to be automated.
>
> Since I'm new to the world of keys, I've done a bit of experimenting.  I
> did have logins from my home machine to the target machine working
> properly
> at one stage.  But then I tried setting it up from the machine to be
> backed
> up and found that it always wanted the passphrase, and now my home machine
> does too.
>
> If it is relevant, the target machine is running Ubuntu Feisty openssh
> 1:4.3p2, the source machine is running Fedora 7 (not sure which version of
> ssh) and my home box is mostly running Debian Woody with OpenSSH 1:3.4p1.
>
> I'm using FTP instead for now but would rather do this securely.
>
> Any ideas?  Do I have to use the agent for this or is there some way to
> make this happen reliably without it?
>
> Geoff.
>
> =================================================================
> To unsubscribe, send mail to [EMAIL PROTECTED] with
> the word "unsubscribe" in the message body, e.g., run the command
> echo unsubscribe | mail [EMAIL PROTECTED]
>
>

Reply via email to