From: Gordon Messmer <yinyang@xxxxxxxxx> Date: Thu, 13 Nov 2003 16:07:10 -0800 To: redhat-list@xxxxxxxxxx
Peter B. West wrote:
I ended up going the other way. Create the key(s) you want in linux, using the appropriate ssh commands. These will be created in ~/.ssh. Copy the public key(s) into ~/.ssh/authorized_keys (SSH1 RSA) or ~/.ssh/authorized_keys2 (SSH2 RSA or DSA).
Not a correction, but a clarification:
authorized_keys2 is depreciated. Store all of your keys in the authorized_keys file.
Gordon,
Thanks for the clarification. The current man page doesn't mention authorized_keys2 at all, so I assume that on the Redhat end it is safe to put all of the keys in authorized_keys. What is acceptable on other systems is another question. Within the past 2 years I have had to separate the keys on a remote system to get communication to work, and so I set up my local keys the same way. Where does PuTTY look?
Peter -- Peter B. West <http://www.powerup.com.au/~pbwest/resume.html>
-- redhat-list mailing list unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe https://www.redhat.com/mailman/listinfo/redhat-list