Re: PuTTY SSH w/o a Password

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



From:
Gordon Messmer <yinyang@xxxxxxxxx>
Date:
Thu, 13 Nov 2003 16:07:10 -0800
To:
redhat-list@xxxxxxxxxx


Peter B. West wrote:



I ended up going the other way. Create the key(s) you want in linux, using the appropriate ssh commands. These will be created in ~/.ssh. Copy the public key(s) into ~/.ssh/authorized_keys (SSH1 RSA) or ~/.ssh/authorized_keys2 (SSH2 RSA or DSA).


Not a correction, but a clarification:

authorized_keys2 is depreciated. Store all of your keys in the authorized_keys file.

Gordon,


Thanks for the clarification. The current man page doesn't mention authorized_keys2 at all, so I assume that on the Redhat end it is safe to put all of the keys in authorized_keys. What is acceptable on other systems is another question. Within the past 2 years I have had to separate the keys on a remote system to get communication to work, and so I set up my local keys the same way. Where does PuTTY look?

Peter
--
Peter B. West <http://www.powerup.com.au/~pbwest/resume.html>


-- redhat-list mailing list unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux