
Code: Select all
drwx------ .ssh/
-rw------- .ssh/id_dsa
-rw------- .ssh/known_hostsCode: Select all
drwx------ .ssh/
-rw------- .ssh/authorized_keysCode: Select all
Port 22
Protocol 2
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key
UsePrivilegeSeparation yes
KeyRegenerationInterval 3600
ServerKeyBits 768
SyslogFacility AUTH
LogLevel INFO
LoginGraceTime 600
PermitRootLogin no
StrictModes yes
RSAAuthentication no
PubkeyAuthentication yes
# rhosts authentication should not be used
RhostsAuthentication no
# Don't read the user's ~/.rhosts and ~/.shosts files
IgnoreRhosts yes
PermitEmptyPasswords no
# Change to no to disable s/key passwords
#ChallengeResponseAuthentication yes
# To disable tunneled clear text passwords, change to no here!
PasswordAuthentication yes
X11Forwarding yes
X11DisplayOffset 10
PrintMotd no
PrintLastLog yes
KeepAlive yes
# disconnect clients if they time out
ClientAliveInterval 15
ClientAliveCountMax 3
# deny root access full-stop
DenyUsers root
Subsystem sftp /usr/lib/sftp-server
Code: Select all
ssh-keygen -t dsa
<blank passphrase>
scp ./.ssh/id_dsa.pub <user>@<host>:~/.ssh/authorized_keys

Code: Select all
ssh -A username@remotehost.com 

Is there any reason you are using a RSA key instead of a DSA key? DSA keys are more secure and there's no real reason I'm aware of not to use them over RSA.Paulten wrote:I wrote a small article on my homepage when I did this.
Maybe it comes usefull for someone : http://paul.kde.no/modules/articles/article.php?id=5
I did not know that, probably because I saw something about RSAAuthentication in sshd_config or something like that. thank you for telling me.Is there any reason you are using a RSA key instead of a DSA key? DSA keys are more secure and there's no real reason I'm aware of not to use them over RSA.