On Fri, Jun 22, 2001 at 05:37:10PM -0700, Dan B wrote:

> #copy public key to server
> scp .ssh/identity.pub SERVER:/root/CLIENT.identity.pub

Oh!  You're trying to do this as *root*?  Make sure you enabled
"PermitRootLogin yes" in the sshd_config, then.

Most people should be ssh'ing as themselves, not as the superuser.

On the other hand, it looks like you're getting in as root, so that's
probably not an issue at the moment.

> #allow public key, (does NOT go in authorized_keys2 file)
> cat CLIENT.identity.pub >> .ssh/authorized_keys

That seems a bit roundabout.  It would be a bit easier to do something
like

  cat ~/.ssh/identity.pub | ssh SERVER 'cat >>~/.ssh/authorized_keys'

> debug1: try privkey: /root/.ssh/id_rsa
> debug3: no such identity: /root/.ssh/id_rsa
> debug1: try privkey: /root/.ssh/id_dsa
> debug3: no such identity: /root/.ssh/id_dsa
> debug2: we did not send a packet, disable method

It would appear that your connection used protocol 2 instead of
protocol 1.  Just to confuse you, protocol 2 uses a totally different
set of files -- ~/.ssh/id_rsa.pub on the client side, and
~/.ssh/authorized_keys2 on the server side.

I bet your setup would work if you used "ssh -1 SERVER".

Reply via email to