Editing Generating keys
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
This is a tutorial for creating keys for use with [[pony|pony]]. It is necessary to have a working key to connect to pony via SSH. For a good (nonfree) introduction to cryptography, see [[http://www.google.com/search?hl=en&q=cryptography+decrypted&um=1&biw=1440&bih=642&ie=UTF-8&sa=N&tab=iw | Cryptography Decrypted]] | This is a tutorial for creating keys for use with [[pony|pony]]. It is necessary to have a working key to connect to pony via SSH. For a good (nonfree) introduction to cryptography, see [[http://www.google.com/search?hl=en&q=cryptography+decrypted&um=1&biw=1440&bih=642&ie=UTF-8&sa=N&tab=iw|Cryptography Decrypted]] | ||
==Generating the key== | ==Generating the key== | ||
Line 5: | Line 5: | ||
The command: | The command: | ||
<pre> | <pre> | ||
ssh- | ssh-kegen -t dsa | ||
</pre> | </pre> | ||
will generate a DSA key pair that we can use to authenticate ourselves. | will generate a DSA key pair that we can use to authenticate ourselves. | ||
Line 31: | Line 31: | ||
IdentityFile ~/.ssh/pony.pub | IdentityFile ~/.ssh/pony.pub | ||
</pre> | </pre> | ||
This defines a new hostname for ssh, sets some options for our security (no forwarding) and links this host to the key we generated. | This defines a new hostname for ssh, sets some options for our security (no forwarding) and links this host to the key we generated. | ||
==Configuring Pony== | ==Configuring Pony== |