OpenSSH is being commonly used on Linux, it's it adapts different protocol and key pairs, so usually you don't need to worry about protocols and version things.
However, sometime, you may need to verify it, how?
Here is some tips:
My test environment:
OpenSSH_5.3p1, OpenSSL 1.0.1e-fips 11 Feb 2013
When generating ssh key pair:
Specifies the type of key to create. The possible values are:
“rsa1” for protocol version 1
"rsa” or "dsa" for protocol version 2.
By looking at the key
The user creates his/her key pair by running ssh-keygen. This stores the private key in
~/.ssh/identity (protocol 1)
~/.ssh/id_dsa (protocol 2 DSA)
~/.ssh/id_ecdsa (protocol 2 ECDSA)
~/.ssh/id_rsa (protocol 2 RSA)
stores the public key in
~/.ssh/identity.pub (protocol 1)
~/.ssh/id_dsa.pub (protocol 2 DSA)
~/.ssh/id_ecdsa.pub (protocol 2 ECDSA)
~/.ssh/id_rsa.pub (protocol 2 RSA)
SSH command option
ssh -1 ( protocol 1)
ssh -2 ( protocol 2)
The user should then copy the public key to ~/.ssh/authorized_keys in his/her home directory on the remote machine. The authorized_keys file has one key per line, though the lines can be very long. After this, the user can log in without giving the password.