Penguin

Differences between version 28 and predecessor to the previous major change of SSHKeys.

Other diffs: Previous Revision, Previous Author, or view the Annotated Edit History

Newer page: version 28 Last edited on Tuesday, June 30, 2009 11:24:32 pm by JohnBillings Revert
Older page: version 27 Last edited on Friday, January 26, 2007 4:59:35 pm by BenStaz Revert
@@ -20,9 +20,9 @@
 # or 
 ssh-keygen -t rsa 
 </verbatim> 
  
-(DSA keys are probably preferable to RSA keys .)  
+There is ongoing discussion on which algorithm is "better". Define better? Are you talking about security or efficiency? Do a google on [" RSA vs DSA"|http://www.google.co.nz/search?hl=en&q=rsa+vs+dsa] and decide for yourself. At the end of the day, either or get the job of securing your communication from eavesdroppers done. Someday it's inevitable these algorithms will become obsolete and replaced by something else
  
 !!! Distributing public keys 
  
 If you accepted the defaults for ssh-keygen(1) you should have two new files in <tt>~~/.ssh</tt>, <tt>id_dsa</tt> and <tt>id_dsa.pub</tt> (or <tt>id_rsa</tt> and <tt>id_rsa.pub</tt>). The <tt>.pub</tt> file is your ''public'' key. You transfer a copy of this key to all remote hosts that you wish to use your key pair with. The easy way to do so is by using ssh-copy-id(1):