On Sep 01 14:24:34, [email protected] wrote: > but directly related to a port <smile>
What port? > I want password-less ssh login Create a password-less key and copy it into ~/.ssh/authorized_keys on the remote site. Make sure that ~/.ssh is chmod 700 and authorized_keys is chmod 600 if you are creating them from scratch. (The OS possibly did that for you upon user creation.) > i usually copy the public key by hand, but I also used ssh-copy-id > from 1_mac to another > from 1_mac to itself > from 1_mac to a plethora of linux machines and virtual machines > > 1_mac cannot login passwd-less to another. To another what? What happens if you copy the key by hand, not relying on ssh-copy-id? Have you checked that the key is actually installed there? > Passwd is requested then all is well. What password, if it's a password-less key? > 1_mac CAN login to itself passwdless > 1_mac CAN login to the linux boxes passwdless > > The logs show nothing of interest (-vvv, not tried to get server logs yet) You have succesfully logged in. The logs will say so. What else do you expect to see there? > Google is full of stuff, eg since High Sierra Apple silently enforces a 2048 > bit key, but nothing that actually solves the problem What problem? On Sep 01 17:45:13, [email protected] wrote: > > I want password-less ssh login > > i usually copy the public key by hand, but I also used ssh-copy-id > > I've done that, but I think it involved temporarily enabling TELNET etc, > then ye olde copy/paste of the public key. Why would you use TELNET to transfer your ssh key? To completely defeat the purpose? Jan
