I am new to this, but have learned a little from "SSH the secure shell" by
O'reilly. The "proper" way to go about this is as follows:
:use ssh-keygen to create a pair of keys. At the time you do this you can
elect to enter a passphrase or not. The proper thing to do is to enter one
and then use the steps below to avoid continuously entering the key. If you
do not enter a passphrase then one will not be required to use the key.
:take the public key enter enter it into ~/.ssh/authorized_keys on the
client system
:on your main system execute "ssh-agent $SHELL" this will load the agent
program and give you a new shell.
:execute "ssh-add" this should prompt you for the pass phrase. Now the
passphrase is loaded and you will not be asked for it on each execution of
ssh or scp.
These steps from the book worked for me on a Solaris 2.5 box running
F-Secure and are documented to work for SSH1 or OpenSSH.
Stephen
-----Original Message-----
From: David Miller
To: [EMAIL PROTECTED]
Sent: 3/5/01 2:08 AM
Subject: eliminating need for password
I have a small network of machines and am ssh and scp'ing amongst them
quite frequently. I would love to configure ssh so that I do not
constantly need to enter a password every time I ssh or scp. I have
tried setting up the automatic RSA protocol using the authorized_keys
file, following the instructions in 'man ssh' but I still need to enter
my password every time, even though the instructions indicate otherwise.
I would be extremely grateful if anyone could help me sort this out, or
point me in the direction of a good document describing this problem.
Thanks!
-David-