Re: Passwordless SSH problem



"Bhishma" <madhu.bhishma@xxxxxxxxx> writes:

Hi,

I am new to linux and I was trying out passwordless SSH to another
machine in the network.

I did the following steps :

1) did a ssh-keygen -t rsa
2) copied the content in is_rsa.pub and pasted it in
$HOME/.ssh/authorized_keys in the remote machine.

A) Look for spelling mistakes. For example, it is id_rsa.pub, not
is_rsa.pub. You may have made a similar error in typing authorized_keys for
example.
What are the permissions on .ssh and on authorized_keys?

Do ssh -vv remotehost
to see what it is trying.


it is still asking for password while logging in...

i did not give any passphrase while creating the key... is that a
problem??

Kindly help me out..

Regards,
Madhu

.



Relevant Pages

  • Re: I do not get ssh. Why is it more secure?
    ... How is this any more secure that plain old telnet? ... And, well, I just don't get the advantage of ssh ... If you put your ssh server on port 12345, it will be free from attacks. ... SSH connections, in the hands of someone who actually knows what they are doing, have the benefit of treating a remote machine as a remote machine. ...
    (comp.os.linux.misc)
  • Re: Remote Execution Through FTP
    ... > I need to send some file from my local machine to a remote machine ... > generation mechanism in SSH. ... then you can script this quite easily using public key's to authenticate. ... Make sure the permissions on the .ssh directory and all the files in it are ...
    (comp.unix.admin)
  • Re: OT: Hard disk mirror with Paragon on USB stick?
    ... at least two pages of intricate command line stuff. ... The password is only used when you want to backup to a remote machine ... via the network, using the ssh protocol. ... (e.g. with linux, ...
    (sci.electronics.design)
  • Re: Is SSH worth it??
    ... > We would be using SSH and SCP. ... SCP for automated scripts. ... > client will not be prompted for a password. ... remote machine, but imho it is better to swap client+server and give ...
    (Security-Basics)
  • simulate attacks
    ... login through ssh, on a remote machine in "actual" conditions. ... I got a little network with 2 machines and a hardware router. ... I'm just trying to teach myself some skills on security issues. ...
    (comp.security.unix)