Differences between version 23 and revision by previous author of SSHKeys.
Other diffs: Previous Major Revision, Previous Revision, or view the Annotated Edit History
Newer page: | version 23 | Last edited on Saturday, February 18, 2006 5:08:40 pm | by JohnMcPherson | Revert |
Older page: | version 22 | Last edited on Saturday, February 18, 2006 6:20:35 am | by StephenScahefer | Revert |
@@ -23,9 +23,9 @@
(DSA keys are probably preferable to RSA keys.)
!!! Distributing public keys
-If you accepted the defaults for ssh-keygen(1) you should have two new files in ~/.ssh, __id_dsa__ and __id_dsa.pub__ (or __id_rsa__ and __id_rsa.pub__)%%%
+If you accepted the defaults for ssh-keygen(1) you should have two new files in ~
~/.ssh, __id_dsa__ and __id_dsa.pub__ (or __id_rsa__ and __id_rsa.pub__)%%%
The .pub file is your public key, you need to upload it to all remote hosts that you want to use Keys with.%%%
You need a __.ssh__ directory in your home on the remote machine. This directory must not be group or world writable. Keys go into the __.ssh/authorized_keys__ file, which must also not be group or world writable.
One any local machine that you wish to ssh *from*, you must have the private key __id_dsa__ (unless you forward an "ssh agent", discussed below) and it must not be readable by anyone other than the owner.
Obviously the directory and these files must be owned by the correct user. If the permissions are wrong, [SSH] will refuse to read them (without telling you, unfortunately - it only cries to syslogd(8)). [Debian] provides a ssh-copy-id(1) program which does all this automagically. Just say