Differences between current version and predecessor to the previous major change of SSHKeys.

Other diffs: Previous Revision, Previous Author, or view the Annotated Edit History

Newer page: version 30 Last edited on Wednesday, July 1, 2009 5:03:09 am by AristotlePagaltzis
Older page: version 29 Last edited on Tuesday, June 30, 2009 11:26:01 pm by JohnBillings Revert
@@ -14,15 +14,13 @@
 !!! Generating key pairs 
 This is what ssh-keygen(1) is for. 
-<verbatim >  
-ssh-keygen -t dsa  
-# or  
-ssh-keygen -t rsa  
-</verbatim >  
-There is ongoing discussion on which algorithm is "better" [RSA] or [DSA]. Define better? Are you talking about security or efficiency? Do a google on ["RSA vs DSA"|] and decide for yourself. At the end of the day, either or get the job of securing your communication from eavesdroppers done. Someday it's inevitable these algorithms will become obsolete and replaced by something else.  
+<pre >  
+ssh-keygen -t [ dsa|DSA]  
+# or, effectively equivalent as far as [SSH] is concerned:  
+ssh-keygen -t [ rsa|RSA]  
 !!! Distributing public keys 
 If you accepted the defaults for ssh-keygen(1) you should have two new files in <tt>~~/.ssh</tt>, <tt>id_dsa</tt> and <tt></tt> (or <tt>id_rsa</tt> and <tt></tt>). The <tt>.pub</tt> file is your ''public'' key. You transfer a copy of this key to all remote hosts that you wish to use your key pair with. The easy way to do so is by using ssh-copy-id(1):