If you work a lot on linux and use ssh often, you quickly realize that typing your password every time you connect to a remote host gets annoying. Not only that, it is not the best solution in terms of security either: Every time you type a password, a snooper has an extra chance to see it. Every host you ssh to with which you use your password, well, has to know your password. Or a hash of your password. In any case, you probably have typed your password on that host once or twice in your life (even if just for passwd, for example). If you are victim of a Man In The Middle attack, your password may get stolen. Sure, you can verify the fingerprint of every host you connect to, and disable authentication without challenge and response in your ssh config. But what if there was a way you didn't have to do that? This is where key authentication comes into play: instead of using a password to log in a remote host, you can use a pair of keys, and well, ssh-age...