Linux Server SSH commands

Source: Internet
Author: User
Tags ssh account ssh port

Login: SSH [hostname]-u user

Enter the password :*****

After login, you can control it like you control your own machine, but there is no visual interface. But now I have used two versions of Linux (SUSE and fc5) that can use tools similar to the FTP interface. When using the tool to connect, select ssh. The port is the ssh port of the server. The default port is 22, but it must be manually entered. After the connection, the FTP interface and shell can be used at the same time to improve work efficiency.

Simple transfer command: SCP

SCP/etc/PHP. ini user@www.linuxidc.com:/home/user

Copy the local/etc/PHP. ini file to www.linuxidc.com.

After the command is executed, you need to enter the password and then start transmission.

SCP user@ww.linuxidc.com:/etc/PHP. INI/home/user2

Copy the/etc/PHP. ini file on the host ww.liniux.cn to the local/home/user2 directory.

Ssh-l user-P 22 britepic.org

Enter the password to log on.

L login_name

If this option is not added to the user specified to log on to the remote machine, ssh lost can also be played directly. It is used by the current user of the reader to log on. Example: SSH-l root http://www.britepic.org

========================================================== ==============

-C blowfish | 3DES

Select the encrypted password type during the period. The default value is 3DES, and 3DES (Data Encryption by three times) uses three different cryptographic keys for three encryption-decryption-encryption. Blowfish is a fast block cryptographic tool, which is safer and faster than 3DES.

========================================================== ==============

-V

Verbose mode. Enable SSH to print out the error message about the trip, which is helpful in connection debugging, authentication, and setting.

========================================================== ==============

-F

Require SSH to execute commands in the background. If SSH needs to ask for a password or a pass, you can use this method if you want it to be executed in the background, it is better to add-l user, for example, activating X11 in a remote location, a bit like ssh-F host xterm.

========================================================== ==============

-I identity_file

Select the file to be read by the RSA Authentication. The default is. Ssh/identity in the user's home directory.

========================================================== ==============

-N

Re-import stdin to/dev/null (in fact, to avoid reading stdin ). It must be used only when SSH is executed behind the scenes. A common trick is to use this option to execute X11 programs on a remote machine, such as SSH-N shadows. CS. hut. FI Emacs &, will be in shadows. CS. hut. emace is activated on fi, And the X11 connection is automatically sent over the encrypted channel. The SSH program will put it behind the scenes. (This will not work if SSH needs to ask for the password)

========================================================== ==============

-T

Forcibly configure the pseudo-tty. This allows you to execute any screen-based procedure on a remote machine, for example, menu services.

========================================================== ==============

-C

To compress all data (including stdin, stdout, stderr, and X11 and TCP/IP connections), the computation rules are the same as those of gzip, but the compression level cannot be controlled. Compression is a good choice when the modem or online speed is slow, but if the reader's network speed is fast, the speed will slow down.

========================================================== ==================

-P Port

Connect to the port on the remote machine. This option is not used. The default value is 22.

========================================================== ====================

-P

Use a non-specific port to connect to the Internet. This option can be used if the reader's firewall does not need to be connected from a specific port. Note that this option will disable RhostsAuthentication and RhostsRSAAuthentication.

========================================================== ==================

-L listen-Port: Host: Port

Specify the port on the machine where the local port is located.

========================================================== ================

-R listen-Port: Host: Port

Assign a remote port to the local address.

-2 force SSH to use Protocol version 2.

-4 force SSH to use IPv4 addresses.

-6 force SSH to use IPv6 addresses.

========================================================== ==================

-G

Allow the remote host to connect to the ports specified locally.

-

Disable online Authentication Proxy.

-E character

Set escape characters

SCP uses SCP to copy files on a remote machine

========================================================== ====================

Copy local files to a remote machine

SCP/etc/Lilo. conf my@www.britepic.org:/home/My

Copy the local/etc/Lilo. conf file to www.britepic.org.

========================================================== ==================

Copy the files on the remote machine to the local device

SCP my@www.britepic.org:/etc/Lilo. CONF/etc

The/etc/Lilo. conf file in the http://www.britepic.org is copied to the local/etc directory.

========================================================== ==================

Keep the attribute of the source host file

SCP-P my@www.britepic.org:/etc/Lilo. CONF/etc

Ssh-keygen

Generate a Public Key (pulib key) and a private key to ensure the security of SSH connection.

When SSH is connected to the SHD server, the Public Key is exchanged, and the system checks the key stored in/etc/ssh_know_hosts, if a client is found, this key is used to generate a randomly generated session key and send it to the server. Both ENDS use this key to continue the remaining stages of SSH.

It generates identity. pub and identity files. Private keys are stored in identity, and public keys are stored in identity. pub, then use SCP to set the identity. pub copy to the Home Directory of the remote machine. authorized_keys under ssh. . Ssh/authorized_keys (this authorized_keys file is equivalent to the Protocol's rhosts file). Then, the user can log in without a password. RSA Authentication is definitely more secure and reliable than rhosts authentication.

Run:

SCP identity. Pub my@sohu.com:. Ssh/authorized_keys

If you do not enter a password when using SSH-keygen to generate a key pair, as shown above, you do not need to enter a password to log on to sohu.com from the http://www.britepic.org.

Here, the password entered here can be different from the account password or not.

SSH protocol version 1:

Each host can use the RSA encryption method to generate a 1024-bit RSA key. This RSA encryption method is mainly used to generate public keys and private keys! The entire online encryption step of version 1 can be simply described as follows:

1. Each time SSH daemon (sshd) is activated, A 768-bit Public Key (or server key) is generated and stored on the server;

2. If a client needs to transfer the public key, the server will send the public key to the client, and the client will confirm this public key by comparing its RSA encryption method;

3. after the client accepts the 768-bit server key, the client will randomly generate a 256-bit private key ), in addition, the server key and host key are encrypted into a complete key, and the key is also transmitted to the server;

4. Later, the server and client will use this 1024-bit key to transfer data online!

Of course, because the 256-bit key of the client is randomly obtained at a time, your online connection will be different from the next online key!

========================================================== ======

SSH protocol version 2:

Different from version 1, server keys are no longer generated in version 2. Therefore, when the client is online to the server, the two will generate a shared key using the Diffie-Hellman key calculation method, and then the two will perform synchronous decryption through the computation method similar to Blowfish!

Each sshd provides the two versions online. To decide whether the two modes are online, you must select the online mode when the client is online. Currently, the online mode of version 2 is automatically used by default! Since our online materials have been encrypted and decrypted by the public and private keys, the transmission process in the middle is certainly much safer!

If you directly use SSH hostname to connect to the host hostname, the "account name" of the host hostname will be the user account in your current environment! For example, if I run the command as root. domain. name, then the other host. domain. name is the host, and the root identity will be used for me to confirm the password login action! Therefore, to avoid such troubles, I usually log on to a remote host using a simple e-mail method, for example, "SSH user @ hostname, I use the user account to log on to the host hostname. Of course, you can also use the-l username format! After logging on to the host, all other executions are the same as those on the Linux host ~ So, it's really easy! ^_^ To remotely control the host! In addition, by default, SSH is "allow you to log on as root! Haha! It's even better! In addition, please note that when you want to connect to the host of the other party, if it is the first connection, the server will ask you that your online key has not yet been established, do you want to accept keys sent from the server and establish an online connection? Haha! In this case, please enter yes instead of Y or y so that the program will accept

Sftp-l username hostname or SFTP user @ hosname

After entering SFTP, it is similar to the normal FTP mode.

CD

Ls dir

Mkdir

Rmdir

PWD

Chgrp

Chown

Chmod

Ln oldname newname

Rm path

Rename oldname newname

Exit bye

==========================================

LCD path

Lls

Lmkdir

Lpwd

Put [local] [remote]

Get [remote] [local]

Sshcommand uses skill .txt

Preface

I don't need to talk about the benefits of SSH?

In short, the previous RPC command and telnet are all replaced by SSH.

For example, the following common functions:

-Remote Logon

SSH user@remote.machine

-Remote Execution

SSH user@remote.machine 'COMMAND ...'

-Remote replication

SCP user@remote.machine:/remote/path/local/path

SCP/local/path user@remote.machine:/remote/path

-X forward

Ssh-x user@remote.machine

Xcommand...

-Tunnel/portforward

Ssh-l 1234: Remote. Machine: 4321 user@remote.machine

Ssh-r 1234: Local. Machine: 4321 user@remote.machine

Ssh-l 1234: Other. Machine: 4321 user@remote.machine

II. Implementation

1) prohibit Root Login

# Vi/etc/ssh/sshd_config

Permitrootlogin No

2) Cancel Password Logon and force RSA Authentication (assume that the SSH account is user1)

# Vi/etc/ssh/sshd_config

Rsaauthentication Yes

Pubkeyauthentication Yes

Authorizedkeysfile. Ssh/authorized_keys

Passwordauthentication No

# Service sshd restart

# Su-user1

$ Mkdir ~ /. Ssh 2>/dev/null

$ Chmod 700 ~ /. SSH

$ Touch ~ /. Ssh/authorized_keys

$ Chmod 644 ~ /. Ssh/authorized_keys

--------------------------------------------------

To the client:

$ Ssh-keygen-T RSA

(You do not need to set a password when you press enter three times, unless you use SSH-agent .)

$ SCP ~ /. Ssh/id_rsa.pub user1@server.machine: id_rsa.pub

(For Windows client, puttygen.exe can be used to generate a public key,

Copy it to the server and modify it to make the content a single line .)

---------------------------------------------------

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.