Linux Remote access and control

Source: Internet
Author: User
Tags file copy ssh server

First, SSH remote management

    1. Features of SSH

SSH (Secure Shell) is a secure channel protocol, which is mainly used to realize remote login of character interface, and so on.

The SSH protocol encrypts the data transmitted by both parties, including the user password entered when the user logs in. The SSH protocol provides better security compared to applications such as early telnet (telnet), rsh (remote Shell, remotely execute command), RCP (remote file copy).

    1. Configuring the OpenSSH service side

Service Listening options

The default port number used by the SSHD service is 22 if necessary, it is recommended to modify the secondary port number and specify the specific IP address of the listening service to improve the concealment in the network. In addition, the version of the SSH protocol is better than the V2 of V1, and disabling DNS reverse resolution can improve the responsiveness of the server.

[[Email protected]~]# vim/etc/ssh/sshd_config

port22//Listening Port is 22

protocol2//using the SSHV2 protocol

listenaddress192.168.4.254//Listener Address is

usednsno//Disabling DNS reverse resolution

...//Omit part of the content

[[Email protected]~]# service sshd Reload

Reload sshd:[OK]

User Login Control

The sshd service allows the root user to log on by default

[[Email protected]~]# vim/etc/ssh/sshd_config

permitrootloginno//Disabling root User Login

permitemptypasswordsno//disallow null password user login

logingracetime2m//Login Verification time is 2 minutes

maxauthtries6//Maximum retry count of 6

...//Omit part of the content

Allowusersjerry [email protected] //Allow user Jerry and admin to log in, and

Where the Admin user can only be from the IP address host Telnet, multiple

Users are separated by a space

[[email protected]~]# service sshd Reload

Login authentication Method

SSHD Service supports two authentication methods, password authentication, key pair verification

    • Password Authentication: Authenticate with the login name and password of the local system user in the server. Vulnerable to brute force attacks.
    • Key pair validation: A matching key information is required to pass validation.

When password authentication and key pair validation are enabled, the server takes precedence over key pair validation.

[[email protected]~] #vim/etc/ssh/sshd_config

passwordauthenticationyes//Enable password verification

pubkeyauthentiactionyes//enabling key pair validation

Authorizedkeysfile.ssh/authorized_keys//specifying a public key library data file

...//Omit part of the content

[[email protected]~] #servicesshdreload 3) using the SSH client program

In the RHEL5 system, the OpenSSH client is provided by the Openssh-clients package (installed by default)

Command program SSH, SCP, SFTP

    • SSH Telnet

Basic format: SSH user name @ remote Host


650) this.width=650; "src=" "/>

When a user logs on to an SSH server for the first time, they must accept the RSA key from the server (enter Yes as prompted) before continuing the verification. The key information that is received is saved to the ~/.ssh/known_hosts file.

Check the current login status and confirm the current host address

650) this.width=650; "src=" "/>

If the SSHD server uses a non-default port number (for example: 2345), the port number must be specified at login with the "-P" option

Example: Access the host 2345 port to the other side of the Zhangsan user authentication login

650) this.width=650; "src=" "/>

    • SCP Remote Replication

      Basic format:

      To replicate remote host content:

      SCP "Remote host user name" @ "Host IP": "Copy Directory" "Copy to local directory"

      Copy Local to remote host:

      Scp-r "Local Directory" "Remote host User name" @ "Host IP": "Remote directory copied to"

      Note: If you are not using the default port, use the "-P" parameter (uppercase) to specify the port number

      Example 1: Copy the remote host's/etc/passwd file to the native

650) this.width=650; "src=" "/>

Example 2: Copying a native/etc/vsftpd/directory to a remote host

650) this.width=650; "src=" "/>

    • SFTP Secure FTP

The SFTP command allows you to upload and download files using SSH secure connections with remote hosts, using FTP-like logon processes and interactive environments to facilitate directory resource management.

Example: basic operation of SFTP login, browse, file upload

650) this.width=650; "src=" "/>

Graphical Tools PUTTYCN, WinSCP

First, specify the IP of the remote host and the corresponding port number

650) this.width=650; "src=" "/>

Then, enter the remote account password, log in successfully can see the current IP authentication is correct

650) this.width=650; "src=" "/>

4) Constructing the SSH system of key pair authentication

Basic idea: The first step to create a key pair (private key file: Id_rsa, public key file:

The second step is to upload the public key file

The third step is to import the public key information (database file: ~/.ssh/authorized_keys)

Fourth step using key pair authentication method

Create a key pair on the client

In a Linux client, the Ssh-keygen tool for the current user

Linux Remote access and control

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.