Michael,

The -v helped tons. The problem was that the permissions
on the ~/.ssh/authorization was 664 instead of 600. I
changed the perms and it worked but I had to supply the
passphase. I generated a new key pair (ssh-keygen) and
left the passphrase empty. Now the server refuses the
connection and asks me for the user's login password.

The output is:
debug: Encryption type: 3des
debug: Sent encrypted session key.
debug: Installing crc compensation attack detector.
debug: Received encrypted confirmation.
debug: Trying RSA authentication with key 'user@hostB'
debug: Server refused our key.
debug: Doing password authentication.

Any ideas on how I can type:
ssh hostB date
and get the output without typing a passphrase or password?

Thanks again,

Darren Curtis

-----Original Message-----
RSA authentication can be a bit tricky to set up if you aren't used to
it.  Have you tried running ssh manually as the user in question?  The
-v switch can be really useful when RSA isn't working as expected, as
the output should tell you right where SSH is falling down.



"Curtis, Darren S" wrote:
> 
> Hello,
> 
> I have looked through all the documentation and the FAQs
> and can still not find out a way (that works) to use ssh
> as a direct replacement for rsh.


-- 
Michael Jinks, IB // Technical Entity // Saecos Corporation

Reply via email to