[lug] problems with ssh key authorization after

dan radom dradom at redback.com
Wed Aug 29 13:23:23 MDT 2001


Hugh,

ssh2 uses dsa keys.  ssh-keygen -t dsa

dan

* Hugh Brown (hugh at vecna.com) wrote:
> I seem to remember that ssh1 was fundamentally flawed and allowed for a
> theoretical hack even though the hack would be really hard to implement.
> 
> Does anyone know how to generate an ssh2 style RSA key?
> 
> Hugh
> 
> "dan radom"
> > 
> > I've found that ssh2 is much faster for port forwarding.  I don't really use ssh1 anymore, so I'm not sure about the speed of that protocol.  It should like you've got a client (ssh) configured to use ssh1 and a daemon (sshd) configured to use ssh2.  Configure them both to use the same protocol and generate the appropriate keys and you shouldn't have to specify -1 or -2 anymore.
> > 
> > dan
> > 
> > > 	i havent tried switching the 2,1 to 1,2 or anything else within
> > > 	the ssh/sshd config files, however i was able to get rsync up
> > > 	and running properly (meaning that no passwords were prompted)
> > > 	by using
> > > 
> > > 	  rsync -e "ssh -1"
> _______________________________________________
> Web Page:  http://lug.boulder.co.us
> Mailing List: http://lists.lug.boulder.co.us/mailman/listinfo/lug



More information about the LUG mailing list