# build your user keys (do as root) ssh-keygen -t dsa -f /.ssh/id_dsa -C "root@kinscoe.harcourt.com" ssh-keygen -t rsa -f /.ssh/id_rsa -C "root@kinscoe.harcourt.com" (do as kinscoe) ssh-keygen -t dsa -f ~/.ssh/id_dsa -C "kinscoe@kinscoe.harcourt.com" ssh-keygen -t rsa -f ~/.ssh/id_rsa -C "kinscoe@kinscoe.harcourt.com" # copy the keys # faulkner backup (SSH1.2) (as root) cat /.ssh/id_dsa.pub | ssh root@faulkner 'cat - >> /.ssh/authorized_keys' (as root) cat /.ssh/id_rsa.pub | ssh root@faulkner 'cat - >> /.ssh/authorized_keys' (as root) cat /.ssh/id_dsa.pub | ssh root@faulkner 'cat - >> /.ssh/authorized_keys2' (as root) cat /.ssh/id_rsa.pub | ssh root@faulkner 'cat - >> /.ssh/authorized_keys2' (as root) cat /.ssh/identity.pub | ssh root@faulkner 'cat - >> /.ssh/authorized_keys' (as root) cat /.ssh/id_dsa.pub | ssh root@kinscoe.harcourt.com 'cat - >> /.ssh/authorized_keys' (as root) cat /.ssh/id_rsa.pub | ssh root@kinscoe.harcourt.com 'cat - >> /.ssh/authorized_keys' (as kinscoe) cat ~/.ssh/id_dsa.pub | ssh kinscoe@inscoe.org 'cat - >> ~/.ssh/authorized_keys' (as kinscoe) cat ~/.ssh/id_rsa.pub | ssh kinscoe@inscoe.org 'cat - >> ~/.ssh/authorized_keys' (as kinscoe) cat ~/.ssh/id_dsa.pub | ssh kinscoe@inscoe.org 'cat - >> ~/.ssh/authorized_keys2' (as kinscoe) cat ~/.ssh/id_rsa.pub | ssh kinscoe@inscoe.org 'cat - >> ~/.ssh/authorized_keys2' (as kinscoe) cat ~/.ssh/identity.pub | ssh kinscoe@inscoe.org 'cat - >> ~/.ssh/authorized_keys' # run ssh to the SSH 1.2 client ssh -o "UsePrivilegedPort yes" faulkner ls (must do this for a SSH 1.5 client) (and enable on remote in sshd_config: PermitRootLogin yes RhostsAuthentication yes RhostsRSAAuthentication yes RSAAuthentication yes PasswordAuthentication yes PermitEmptyPasswords yes) #