This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: >mkdir .ssh 5. Logout from the SSH server >lougout 6. Create client DSA public key >ssh-keygen -t dsa -b 1024 -f ~/.ssh/id_dsa 7. Provide no passphrase for the dsa key >Generating public/private dsa key pair. >Enter passphrase (empty for no passphrase): >Enter same passphrase again: >Your identification has been saved in /root/.ssh/id_dsa >Your public key has been saved in /root/.ssh/id_dsa.pub The key fingerprint is: b3:84:76:86:7a:f8:87:d2:a1:13:30:0d:fa:da:0c:44 root@Knoppix 8. Copy the Client's DSA Public key onto the SSH host >scp ~/.ssh/id_dsa.pub firstname.lastname@example.org:~/.ssh/authorized_keys >Password:*** id_dsa.pub 100% 602 0.6KB/s 00:00 9. Verify that the Client Private key is functional by re-logging-in >logout >ssh email@example.com...
View Full Document
This note was uploaded on 06/02/2009 for the course CS 35L taught by Professor Eggert during the Spring '09 term at UCLA.
- Spring '09