|Newer page:||version 30||Last edited on Wednesday, July 1, 2009 5:03:09 am||by AristotlePagaltzis|
|Older page:||version 29||Last edited on Tuesday, June 30, 2009 11:26:01 pm||by JohnBillings||Revert|
@@ -14,15 +14,13 @@
!!! Generating key pairs
This is what ssh-keygen(1) is for.
-ssh-keygen -t dsa
-ssh-keygen -t rsa
There is ongoing discussion on which algorithm is "better" [RSA] or [DSA]. Define better? Are you talking about security or efficiency? Do a google on ["RSA vs DSA"|http://www.google.co.nz/search?hl=en&q=rsa+vs+dsa] and decide for yourself. At the end of the day, either or get the job of securing your communication from eavesdroppers done. Someday it's inevitable these algorithms will become obsolete and replaced by something else.
+ssh-keygen -t dsa
+ssh-keygen -t rsa
!!! Distributing public keys
If you accepted the defaults for ssh-keygen(1) you should have two new files in <tt>~~/.ssh</tt>, <tt>id_dsa</tt> and <tt>id_dsa.pub</tt> (or <tt>id_rsa</tt> and <tt>id_rsa.pub</tt>). The <tt>.pub</tt> file is your ''public'' key. You transfer a copy of this key to all remote hosts that you wish to use your key pair with. The easy way to do so is by using ssh-copy-id(1):