What we're doing | How | Where |
1. Generate SSH Keys | ssh-keygen -t dsa -f .ssh/id_dsa | Local |
2. Copy Public Key to the Remote Machine | scp .ssh/id_dsa.pub REMOTE: | Local |
3. Add Public Key to the list of keys | cat id_dsa.pub >> .ssh/authorized_keys2 | Remote |
4. Set up permissions | chmod 640 .ssh/authorized_keys2 | Remote |
This will work for the unisys machines, engsoft, remus or romulus (not both... figure out why), and most newer servers. For capone, you'll want to try the following procedures, too...
What we're doing | How | Where |
1. Convert SSH Public Key | ssh-keygen -e, then tell it where the public key is | Local |
2. Create the public key file on the SSH2 machine | vi .ssh2/id_dsa.unisysXX, then paste it in. Use your number in place of XX | Remote |
3. Add Public Key to the list of keys | echo "key id_dsa.unisysXX >> .ssh2/authorization | Remote |
What we're doing | How | Where |
1. Create SSH Keys | ssh-keygen -t dsa | Local |
2. Tell SSH2 who it is (don't ask) | echo "idkey id_dsa_1024_a" >> .ssh2/identification | Local |
3. Set permissions | chmod 600 .ssh2/idkey id_dsa_1024_a.pub .ssh2/identification | Local |
4. Copy the public key to the OpenSSH machine | scp .ssh/id_dsa_1024_a.pub REMOTE: | Local |
5. Convert the public key, and add it | ssh-keygen -i -f id_dsa_1024_a.pub >> .ssh/authorized_keys2 | Remote |