status:disabled6. Turn off the firewall[email protected] ~]# iptables-f #清空防火墙配置[[email protected] ~]#/etc/init.d/iptables save #清空防火墙配置后, remember to saveIptables: Save firewall Rules to/etc/sysconfig/iptables: [OK]7. Set Putty Login via keyOpen the Putty tool, select the left Connection--ssh--auth right "private key file for authentication" click "Browse" to select the previously saved private
Transferred from: http://blog.sina.com.cn/s/blog_6561ca8c0102vb0d.htmlFirst, Key IntroductionUnder Linux, the remote login system has two authentication methods: Password authentication and key authentication. The method of password auth
#③ Close SELinuxSELinux is a security mechanism for CentOS, and the way to turn off SELinux# Setenforce 0 ## Vi/etc/selinux/configEnter after change, selinux=enforcing for selinux=disabled then: Wq save exit, last reboot system④ Startup key Authentication login, at the same time for the sake of security system, the way to turn off password Authentication!# vim/e
On two Linux hosts due to the needs of the environment, often to configure the two host between the password-free login, which will be used to key authentication, that is, the so-called public key authentication. Easy to understand, I'm here to specify two hosts for A and B. If a host wants to be password-free to log o
key password set in the first step:650) this.width=650; "src=" Https://s4.51cto.com/wyfs02/M01/A7/82/wKioL1nnc0uwhFQgAAAQ-lJY2Ds956.png "title=" 4.png "alt=" Wkiol1nnc0uwhfqgaaaq-ljy2ds956.png "/>At this point, the key authentication is complete!Attention:-----------------------------------------There are two firewalls: SELinux and NetFilterSetenforce 0//Tempora
) After remote login with putty and Xshell, you can view the historical operation and various long information in the window freely (can be viewed up and down).2) using putty and Xshell for remote login can copy the information of the window (left mouse button selected) and paste (right mouse button)3) Xshell can save login account and password, log in again when you can not enter the user name and password directly into the system, Xshell can also be multi-window display and editing.Extended:1.
SSH login verification with RSA key pairThe advantage of using RSA key pair to verify SSH is 1) no password 2) is more secure than password authentication; The disadvantage is 1) The first configuration is a bit of a hassle. 2) The private key needs to be carefully saved. Anyway with
OpenSSH's RSA/DSA key authentication system, which can replace the standard Secure Password authentication system used by the OpenSSH default.The OpenSSH RSA and DSA authentication protocol is based on a pair of specially generated keys, called private keys and public keys, respectively. The advantage of using these
sent data does come from the sender. Back to top 3. Guarantee the authenticity of the data
To ensure that the data comes from the sender, the acknowledgment message is from the correct sender, known as message authentication. 3.1 Message authentication code
The Message Authentication code (MSG authentication code, or
password to complete the login, so that the completion of the Putty key authentication login. (Note: The advantage of using key authentication is to prevent others from knowing that your password can log on to the server, you can use the key to log in to prevent password lo
(key) left to the management machine, id_dsa.pub (lock) sent to all the managed machinesSsh-copy-id principle:Send Id_dsa.pub (lock) to all managed machines, renamed to ~/.ssh/authorized_keysAt the same time, the ~/.SSH permission is 700.grep authorized/etc/ssh/sshd_config#authorizedkeysfile. ssh/authorized_keysManaged by machine:[email protected] tmp]# ll ~/. ssh/authorized_keys1598 Oct 9:/root/ . SSH/-ld ~/. SSH drwx 2 4096 Oct 9:/root/ . SSH1.
that the USB key is developed from the dongle, and the function of the dongle is to prevent unauthorized users from copying and cracking the software.Second, the key is used when the computer starts up. In this case, the USB key is used to verify the user's identity, which is similar to that of a smart card. Compared with biometric identification systems (such a
-_dzroafnaaexxnwxukw847.jpg"/>Select the public key to copy, keep, or save as a file, followed by650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/5B/1B/wKiom1T--x_Do4YbAAIzTMn2Tsc501.jpg "title=" 6.jpg " alt= "Wkiom1t--x_do4ybaaiztmn2tsc501.jpg"/>On the server side, save the public key to the server, modify the relevant files[Email protected]ost ~]# mkdir. SSH[[email protected] ~]# vim. Ssh/author
"Service sshd reload" to load services after changes are completeLogin authentication method: For the remote management of the server, in addition to the user account security control, the way of login verification is also very important. Sshd Two authentication methods _ Password Authentication, key pair
~/.ssh/id_rsa #第一个步骤生成的公钥文件对应的私钥文件After you save the file, you can log in to the SSH server using an aliasAlias for SSH alias #alias是你在 ~/.ssh/config file configurationIf you have more than one SSH account to configure, just write it in ~/.ssh/config empty line, as follows:Host foo HostName 192.168.2.222 Port $ User test identityfile ~/.ssh/id_ Rsahost alias HostName HostName Port Port user User
If y
SSH is an abbreviation for secure Shell that provides security for Telnet sessions and other network services. The SSH protocol can effectively prevent the information leakage problem in the process of remote management. The ability to encrypt all transmitted data through SSH can also prevent DNS spoofing and IP spoofing. Another advantage is that the data transmitted for it is compressed, so it can speed up the transmission.
In the client's view, SSH provides two levels of security
Key authentication is a secure authentication mechanism supported by the SSH service under Linux. it uses a pair of cryptographic strings, one called the public key (PublicKey) , used for encryption, and another called a key. (Privatekey) , only the creator can have it, and
SSH service supports a security authentication mechanism, that is, key authentication. The so-called key authentication, in fact, is to use a pair of encrypted strings, one called the public key, which anyone can see its contents,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.