欧美bbbwbbbw肥妇,免费乱码人妻系列日韩,一级黄片

詳解SSH如何配置key免密碼登錄

 更新時(shí)間:2017年03月30日 11:17:30   作者:多客博圖  
這篇文章主要介紹了詳解SSH如何配置key免密碼登錄的相關(guān)資料,文中介紹的非常詳細(xì),對(duì)大家的學(xué)習(xí)或者工作具有一定的參考價(jià)值,需要的朋友們下面來一起看看吧。

如何使用

直接指定ip然后-i 指定key文件,然后指定用戶

ssh 1.1.1.1 -i Test1 -l userxxx

不指定用戶實(shí)際上就是使用當(dāng)前的本機(jī)登陸的用戶名去登陸遠(yuǎn)端主機(jī),比如本地用戶是AAA,那么:

ssh 1.1.1.1 -i Test1

等同于

ssh 1.1.1.1 -i Test1 -l AAA

這里要注意,生成的key是和一對(duì)用戶綁定的,生成key的用戶以及存儲(chǔ)這個(gè)key的公鑰的遠(yuǎn)端主機(jī)的用戶。ssh的原理就是,公鑰給人家,自己留秘鑰,遠(yuǎn)端主機(jī)的其他用戶也是無法看到這個(gè)指定的用戶的接受到的公鑰的,所以用戶是一對(duì)一的。

比如我在test-server 下面的azuo1228生成key,然后拷貝到遠(yuǎn)端主機(jī)dest-server去使用,那么放在遠(yuǎn)端主機(jī)的哪個(gè) 用戶home目錄下面,對(duì)應(yīng)的遠(yuǎn)端主機(jī)的這個(gè)用戶才可以被無密碼登陸,并不等于對(duì)遠(yuǎn)端主機(jī)的其他用戶也能免密碼登陸。

開始操作

1.生成key:

[azuo1228@test-server ~]$ ssh-keygen

這里一直敲回車就好

Generating public/private rsa key pair.
Enter file in which to save the key (/home/azuo1228/.ssh/id_rsa):
Created directory '/home/azuo1228/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/azuo1228/.ssh/id_rsa.
Your public key has been saved in /home/azuo1228/.ssh/id_rsa.pub.
The key fingerprint is:
d2:33:66:86:0a:b4:27:a9:86:92:24:ff:13:63:96:15 azuo1228@test-server
The key's randomart image is:
+--[ RSA 2048]----+
|   |
| E  |
| . .  |
| . o .o  |
|..= .oo S |
|++ +*. = o |
|=..o.o  |
|o ..  |
| ..  |
+-----------------+
[azuo1228@test-server ~]$ cd .ssh/
[azuo1228@test-server .ssh]$ dir
id_rsa id_rsa.pub

查看生產(chǎn)結(jié)果

[azuo1228@test-server .ssh]$ ll
total 8
-rw------- 1 azuo1228 administrator 1675 Dec 21 18:11 id_rsa
-rw------- 1 azuo1228 administrator 403 Dec 21 18:11 id_rsa.pub
[azuo1228@test-server .ssh]$ cat id_rsa.pub
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxp1CLe+v3L9OjlJCoBBMtQP5p2zQSACJuCD8rPRT2KQmLFznJo9ehTJQp3UfbSzAo3muudiJ9hvyL8f8hN05voXzBSyrul3v39iiqyPJGFbZhtlIsvVuHNEOVaa+StP/WVcH3nT50Y2TsIx0ikXUOVaaawHKUV3wBHlyLLANMAG8yOy4NIzCj++TO4n+66uyrgVvUf
mZ02ALGGL0gUIV97tlhdwVQLG+2mJwSU0E3fksMVlhKxQrpaOx1OtObF0Xo4CmuuXAowtm/uW50gHRVYMA7N/VNgbWaa4hbypCV5m6UqF6P8bHp1Kgz0qm/U0ro1jFzNv1+fin2ZdwV1Ytr azuo1228@test-server

2.拷貝到遠(yuǎn)端主機(jī)指定用戶的home下面

可以看到這次還是要輸密碼的

[azuo1228@test-server .ssh]$ scp id_rsa.pub azuo1228@10.148.167.106:/home/azuo1228
Access and Authorization to this server is controlled by Active Directory. Please login with your admin account.
azuo1228@10.148.167.106's password:
id_rsa.pub 100% 403 0.4KB/s 00:00

在此測(cè)試登錄 -- 需要密碼,還沒免密碼

[azuo1228@test-server .ssh]$ ssh azuo1228@10.148.167.106
Access and Authorization to this server is controlled by Active Directory. Please login with your admin account.
azuo1228@10.148.167.106's password:
Last login: Wed Dec 21 18:07:21 2016 from shang1lu4gnl.ads.autodesk.com
Authorized uses only. All activity may be monitored and reported.
[azuo1228@dest-server ~]$

不存在.ssh的話需要?jiǎng)?chuàng)建

[azuo1228@dest-server ~]$ mkdir .ssh
[azuo1228@dest-server ~]$ cd .ssh/
[azuo1228@dest-server .ssh]$ cat ../id_rsa.pub | tee -a authorized_keys
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxp1CLe+v3L9OjlJCoBBMtQP5p2zQSACJuCD8rPRT2KQmLFznJo9ehTJQp3UfbSzAo3muudiJ9hvyL8f8hN05voXzBSyrul3v39iiqyPJGFbZhtlIsvVuHNEOVaa+StP/WVcH3nT50Y2TsIx0ikXUOVaaawHKUV3wBHlyLLANMAG8yOy4NIzCj++TO4n+66uyrgVvUfmZ02ALGGL0gUIV97tlhdwVQLG+2mJwSU0E3fksMVlhKxQrpaOx1OtObF0Xo4CmuuXAowtm/uW50gHRVYMA7N/VNgbWaa4hbypCV5m6UqF6P8bHp1Kgz0qm/U0ro1jFzNv1+fin2ZdwV1Ytr azuo1228@test-server
[azuo1228@dest-server .ssh]$ ll
total 4
-rw-r--r-- 1 azuo1228 administrator 403 Dec 21 20:33 authorized_keys

需要權(quán)限為600

[azuo1228@dest-server .ssh]$ chmod 600 authorized_keys

[azuo1228@test-server .ssh]$ ssh azuo1228@10.148.167.106
Access and Authorization to this server is controlled by Active Directory. Please login with your admin account.
Last login: Wed Dec 21 20:32:08 2016 from c72
Authorized uses only. All activity may be monitored and reported.
[azuo1228@dest-server ~]$
[azuo1228@dest-server ~]$
[azuo1228@dest-server ~]$ exit
logout
Connection to 10.148.167.106 closed.

再次登陸,就已經(jīng)免密了

[azuo1228@test-server .ssh]$ ssh 10.148.167.106
Access and Authorization to this server is controlled by Active Directory. Please login with your admin account.
Last login: Wed Dec 21 20:33:34 2016 from c72
Authorized uses only. All activity may be monitored and reported.

在嘗試登陸zhour用戶,依舊要密碼,可見免密過程是一對(duì)一的。

[azuo1228@test-server .ssh]$ ssh 10.148.167.106 -l zhour
Access and Authorization to this server is controlled by Active Directory. Please login with your admin account.
zhour@10.148.167.106's password:

拷貝公鑰到另一個(gè)用戶zhour

[azuo1228@test-server .ssh]$ scp id_rsa.pub zhour@10.148.167.106:/home/zhour

Access and Authorization to this server is controlled by Active Directory. Please login with your admin account.
zhour@10.148.167.106's password:
id_rsa.pub  100% 403 0.4KB/s 00:00

登陸依舊需要密碼

[azuo1228@test-server .ssh]$ ssh 10.148.167.106 -l zhour
Access and Authorization to this server is controlled by Active Directory. Please login with your admin account.
zhour@10.148.167.106's password:
Last login: Wed Dec 21 17:55:32 2016 from shang1lu4gnl.ads.autodesk.com
Authorized uses only. All activity may be monitored and reported.

添加公鑰給zhour

[zhour@dest-server .ssh]$ cat ../id_rsa.pub | tee -a authorized_keys

ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxp1CLe+v3L9OjlJCoBBMtQP5p2zQSACJuCD8rPRT2KQmLFznJo9ehTJQp3UfbSzAo3muudiJ9hvyL8f8hN05voXzBSyrul3v39iiqyPJGFbZhtlIsvVuHNEOVaa+StP/WVcH3nT50Y2TsIx0ikXUOVaaawHKUV3wBHlyLLANMAG8yOy4NIzCj++TO4n+66uyrgVvUfmZ02ALGGL0gUIV97tlhdwVQLG+2mJwSU0E3fksMVlhKxQrpaOx1OtObF0Xo4CmuuXAowtm/uW50gHRVYMA7N/VNgbWaa4hbypCV5m6UqF6P8bHp1Kgz0qm/U0ro1jFzNv1+fin2ZdwV1Ytr azuo1228@test-server

這樣就免密了

[azuo1228@test-server .ssh]$ ssh 10.148.167.106 -l zhour
Access and Authorization to this server is controlled by Active Directory. Please login with your admin account.
Last login: Wed Dec 21 20:34:49 2016 from c72
Authorized uses only. All activity may be monitored and reported.

注意

需要注意兩點(diǎn),如下:

免密之后,scp這種走ssh 通道的都會(huì)免密;

key拷貝到遠(yuǎn)程主機(jī)的指定用戶home目錄下,最后,免輸入密碼的時(shí)候是遠(yuǎn)端主機(jī)的指定用戶,非本地主機(jī)的用戶

總結(jié)

以上就是這篇文章的全部?jī)?nèi)容了,希望本文的內(nèi)容對(duì)大家的學(xué)習(xí)或者工作能帶來一定的幫助,如果有疑問大家可以留言交流,謝謝大家對(duì)腳本之家的支持。

相關(guān)文章

  • CentOS7yum安裝PHP7.2的操作方法

    CentOS7yum安裝PHP7.2的操作方法

    下面小編就為大家分享一篇CentOS7yum安裝PHP7.2的操作方法,具有很好的參考價(jià)值,希望對(duì)大家有所幫助。一起跟隨小編過來看看吧
    2018-03-03
  • linux封鎖IP簡(jiǎn)單防御UDP攻擊

    linux封鎖IP簡(jiǎn)單防御UDP攻擊

    這篇文章主要介紹了linux使用封鎖IP的辦法簡(jiǎn)單防御UDP攻擊,需要的朋友可以參考下
    2015-01-01
  • Linux安裝PHP MongoDB驅(qū)動(dòng)

    Linux安裝PHP MongoDB驅(qū)動(dòng)

    在php中使用mongodb你必須使用 mongodb 的 php驅(qū)動(dòng)。本文是小編在部署生產(chǎn)環(huán)境時(shí)候記錄的筆記,特此分享到腳本之家平臺(tái)供大家參考
    2016-11-11
  • Linux提權(quán)技巧全面匯總

    Linux提權(quán)技巧全面匯總

    在Linux系統(tǒng)中,提權(quán)是指獲取更高的權(quán)限,這通常通過使用特定的命令或工具來完成,在這篇文章中,我們將探討一些常見的Linux提升權(quán)限的技巧:常用提權(quán)命令,反彈shell,獲取完整交互式SHELL,Linux內(nèi)核漏洞提權(quán),臟牛提權(quán),metasploit linux提權(quán),SUID提權(quán),passwd提權(quán),ssh密鑰提權(quán)
    2024-05-05
  • Linux中一種友好的find替代工具(fd命令)

    Linux中一種友好的find替代工具(fd命令)

    這篇文章主要介紹了Linux中一種友好的find替代工具(fd命令),文中通過示例代碼介紹的非常詳細(xì),對(duì)大家的學(xué)習(xí)或者工作具有一定的參考學(xué)習(xí)價(jià)值,需要的朋友們下面隨著小編來一起學(xué)習(xí)學(xué)習(xí)吧
    2019-11-11
  • linux環(huán)境搭建圖數(shù)據(jù)庫(kù)neo4j的講解

    linux環(huán)境搭建圖數(shù)據(jù)庫(kù)neo4j的講解

    今天小編就為大家分享一篇關(guān)于linux環(huán)境搭建圖數(shù)據(jù)庫(kù)neo4j的講解,小編覺得內(nèi)容挺不錯(cuò)的,現(xiàn)在分享給大家,具有很好的參考價(jià)值,需要的朋友一起跟隨小編來看看吧
    2019-04-04
  • Linux下apache如何限制并發(fā)連接和下載速度

    Linux下apache如何限制并發(fā)連接和下載速度

    在Linux下限值A(chǔ)pache的并發(fā)連接數(shù)和下載速度需要用到一款A(yù)pache的擴(kuò)展模塊mod_limitipconn,下面我們就來討論mod_limitipconn的安裝使用方法
    2014-11-11
  • 安裝CentOS 6.x報(bào)錯(cuò)

    安裝CentOS 6.x報(bào)錯(cuò)"Disk sda contains BIOS RAID metadata"解決方法

    今天在安裝CentOS6.2的時(shí)候,當(dāng)進(jìn)到檢測(cè)硬盤的時(shí)候,總是過不去,報(bào)錯(cuò)如下: Disk sda contains BIOS RAID metadata, but is not part of any recognized BIOS RAID sets. Ignoring disk sda,真是不知如何解決,下面小編把我的思路分享到腳本之家平臺(tái),需要的朋友參考下
    2019-11-11
  • Linux中FTP賬號(hào)無法刪除文件夾的解決方案

    Linux中FTP賬號(hào)無法刪除文件夾的解決方案

    本篇文章主要給大家分享了Linux中FTP賬號(hào)無法刪除文件夾的解決方案以及原因探索,有興趣的朋友學(xué)習(xí)下吧。
    2018-01-01
  • CentOS7搭建gerrit 代碼審查服務(wù)方法

    CentOS7搭建gerrit 代碼審查服務(wù)方法

    下面小編就為大家分享一篇CentOS7搭建gerrit 代碼審查服務(wù)方法,具有很好的參考價(jià)值,希望對(duì)大家有所幫助。一起跟隨小編過來看看吧
    2018-03-03

最新評(píng)論