-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Matthew Simpson wrote:

>>>ssh-keygen of A, this created 2 files .shh/identity and
>>>.ssh/identity.pub. Then I scp .ssh/indentity.pub to
>>>.ssh/authorized-keys on machine B. When I tried sshing from A to B I
>>>still get promt for passwd
>>>debug1: got SSH2_MSG_SERVICE_ACCEPT
>>>debug1: authentications that can continue: publickey,password
>>>debug1: next auth method to try is publickey
>>>debug1: try privkey: /home/msimpson/.ssh/id_rsa
>>>debug1: try privkey: /home/msimpson/.ssh/id_dsa
>>>debug1: next auth method to try is password
>>
>>Ah. Seems to be that you're using ssh protocol 2 (which is good) but
>>using an ssh protocol 1 key.  Try generating your key with the flag
>>'-t dsa'.  (I'm sure -d used to attain this result; looks like it
>>changed.)

>On  Machine A the openssh vers is openssh-2.5.2p2-5 which uses the 
>ssh-keygen -t option but on machine B the vers is openssh-2.1.1p4-1
>
>[root@B /root]# ssh-keygen -d dsa
>Too many arguments.
>Usage: ssh-keygen [-lpqxXydc] [-b bits] [-f file] [-C comment] [-N 
>new-pass] [-P pass]
>
>Any clues? If I just create a rsa1 key and use ssh -1 i works no probs.

Older versions (still works in 3.0.2, but not documented):  
$ ssh-keygen -d

Newer versions:
$ ssh-keygen -t dsa

One of the above will give you a dsa key, called (by default) id_dsa.

But the biggest problem you currently have is 2.1.1 accepting protocol 
1.  You're asking to be rooted.  Update it pronto, and turn off v.1.

- -d

- -- 
David Talkington

PGP key: http://www.prairienet.org/~dtalk/0xCA4C11AD.pgp
- --
http://setiathome.ssl.berkeley.edu/pale_blue_dot.html

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8
Comment: Made with pgp4pine 1.75-6

iQA/AwUBPHG3a79BpdPKTBGtEQJ3XACeKpAMJ3o7qk0tJByMY/A/jeoGUEMAoORQ
qmVX6aV7NlfEV6p4/UYZu3VF
=HPc8
-----END PGP SIGNATURE-----




_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to