If you are running RHEL it should not be a problem. Did you compile the ssh/openssh from tar ball? Are you using different user? Is root disable? If all these are no then follow the steps carefully and it should work. I did many times and it takes not more than 2 minutes. I did in RHEL 3/4/5 On Tue, Jul 22, 2008 at 11:53 PM, Ben Kevan <ben.kevan@xxxxxxxxx> > On Tuesday 22 July 2008 08:10:02 pm Sanjay Chakraborty wrote: >> I do not know why you are writing a script for this. In redhat for ssh >> key fingureprint do: >> type ssh-keygen -t rsa or dsa >> it will create two .files id_rsa and id_rsa.pub (if you type dsa it >> will be id_dsa) in .ssh directory. copy id_rsa.pub key to other box in >> .ssh directory and name that authorized_keys. >> Remember .ssh should be 700 as permission. Now do ssh from that user >> you should be able to login without local password. >> > > If you read the script, it does what you just said. Why would I do it? It's > quit a bit easier to run ssh-copy-id user@$i then it is to do the whole copy > command, then append it to the current authorized_keys file. > > With that said, the method you talk about (using DSA does not work). On > another server with identical /etc/ssh/sshd_config it works .. what's the > deal? > > > -- > redhat-list mailing list > unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe > https://www.redhat.com/mailman/listinfo/redhat-list > -- Regards. Sanjay Chakraborty -- redhat-list mailing list unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe https://www.redhat.com/mailman/listinfo/redhat-list