Spent an hour working on SSH private key authentication this week without success. The entire process is simple, you have to follow ALL the steps though. Generating the public/private keys, add the public key to $HOME/.sssh/authorized_keys, and test SSH authentication. I skipped step two: update/create authorized_keys.
Question your assumptions - reviewing the howto is better than researching a debug level 3 error. One "Design for Six Sigma" tool that caught my attention is "Pair Programming". The concept is simple: two people on one workstation. Both people are engaged, checking each others design and providing feedback real-time; as a result the quality and volume of work increases. The camaraderie is a great perk too.
If I had engaged a co-worker, even one unfamiliar with SSH, instead of hammering away I could have resolved the issue much faster.
Question your assumptions - reviewing the howto is better than researching a debug level 3 error. One "Design for Six Sigma" tool that caught my attention is "Pair Programming". The concept is simple: two people on one workstation. Both people are engaged, checking each others design and providing feedback real-time; as a result the quality and volume of work increases. The camaraderie is a great perk too.
If I had engaged a co-worker, even one unfamiliar with SSH, instead of hammering away I could have resolved the issue much faster.
Comments