2 # Do some of the steps necessary to SSH (key-based) with another server.
7 # We need a public key to copy over, so generate it if not found.
8 if [ ! -f ~/.ssh/id_rsa.pub ]; then
12 # Add target to ~/.ssh/known_hosts so we don't get
13 # asked for permission at inopportune moments.
14 ssh-keyscan -H "$target" >> ~/.ssh/known_hosts
16 # Tell user what to do.
17 echo "APPEND FOLLOWING TO TARGET'S ~/.ssh/authorized_keys:"