Date: Tue, 22 Sep 2009 16:22:54 -0500 From: David Kelly <dkelly@hiwaay.net> To: Jerry McAllister <jerrymc@msu.edu> Cc: freebsd-questions@freebsd.org Subject: Re: network freebsd computers Message-ID: <20090922212254.GA47261@Grumpy.DynDNS.org> In-Reply-To: <20090922204649.GB86783@gizmo.acns.msu.edu> References: <BLU0-SMTP94A0279291FD20358E7D2E93DC0@phx.gbl> <8DFC1B25-8AED-4CD1-ABDC-7A9DDF45C362@olivent.com> <BLU0-SMTP22DAC69001869CA07A8B4793DC0@phx.gbl> <alpine.BSF.2.00.0909221222480.10016@wonkity.com> <BLU0-SMTP88BA9159A1905AF96AE51993DC0@phx.gbl> <20090922185317.GA86411@gizmo.acns.msu.edu> <BLU0-SMTP55839259195A53C656BB6693DC0@phx.gbl> <20090922204649.GB86783@gizmo.acns.msu.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, Sep 22, 2009 at 04:46:49PM -0400, Jerry McAllister wrote: > On Tue, Sep 22, 2009 at 03:27:35PM -0400, Carmel NY wrote: > > > I was just playing around with ssh. Would it be possible to store > > multiple keys in the ~/.ssh/authorized_keys file? > > It will put a key there for every place you go to with ssh. I think this is the place one puts the public key of accounts (not the host) from which one is *coming* from that one wishes to accept login without further challenge. ~/.ssh/known_hosts automatically (prompted first time) records the host public key of places you have been so as to warn you that the connection is not to a previously known machine. -- David Kelly N4HHE, dkelly@HiWAAY.net ======================================================================== Whom computers would destroy, they must first drive mad.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20090922212254.GA47261>