Christoph Lameter <[EMAIL PROTECTED]> writes: > You can simply decrypt the private key and then no passwords are required.
I couldn't figure out how to do that, but isn't that a little unsafe? After some more investigation, it looks like the way ssh wants you to do this is with ssh-agent and ssh-add. All you have to do is launch an rxvt with ssh agent like this: ssh-agent rxvt& then add your pass phrase to the agent like this: ssh-add and you'll be able to connect to any server holding your public identity in ~./ssh/authorized_keys without typing the pass phrase repeatedly. This appears to be a way to get around the problems with rsh from a masqueraded host, and will allow cvs access. The security is an added bonus, I suppose. Thanks -- Rob -- TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to [EMAIL PROTECTED] . Trouble? e-mail to [EMAIL PROTECTED] .