background:
Not familiar with Linux, the new server centos,1 a gpu,512m memory, would like to use to put something;Dos attack, and then understand the need for SSH key login, but also prohibit the account password log in the way, prohibit the use of root account login tool
Putty: Very small, find a corresponding download on the line, click on the download address, mainly in the full version has a puttyagen
Ssh establishes a secure channel between two machines to encrypt all data. For example, machine A logs on to machine B through ssh (machine A is an ssh client and machine B is an ssh server ). 1. confirm that there is an account on machine B. 2. Generate A
key login for SSH normal user (non-root user)
This takes the username Zhangsan as an example.
Because of personal habits, I changed the user Zhangsan default directory, in the process of using the key to log in, always prompted to enter the user password, and/var/log/secure also did not have any information,Later in the/etc/passwd the default directory changed
Assume that from a host SSH login B host, with the secret key instead of the password, the steps are as follows:1. Execute on Host A: ssh-keygen-t RSAAll by default, without entering a password, generate two files:/root/.ssh/id_rsa/root/.
installation
#ee/etc/inetd.conf
Remove the # in front of the sshd
#ee/etc/rc.conf
Add inetd_enable= "YES"
#kill-hup ' Cat/var/run/inetd.pid '
Then use Putty remote login, always end immediately, failThere's a message from the FreeBSD terminal."May 7 21:38:26 FreeBSD sshd[595]: error:could not loadHost key:/etc/ssh/ssh_host_dsa_key "
Idea put on/etc/ssh
When SSH logs on to the remote host in Linux, the public private key authentication method can be done.① Environment Description: Two Linux hosts, host1:192.168.5.1,host2:192.168.5.10. Now set up on host1 and then go to log on to the HOST2 host.② SSH service is turned on automatically by default. You can view the next netstat–nlutp|grepssh in LinuxThis shows that
1, download the Git client, for: HTTPS://GIT-SCM.COM/DOWNLOAD/MAC2, open the installation package, you can see the interface at this point is: we need to install the. PKG installation package into the system. After I double-clicked the installation package, the results failed to install successfully. The interface is: Here is a pit, although it is very simple problem, but for beginners sometimes headache. Later, on the internet finally found the reason, because this requires permission, so the d
access, can specify the local private key file, so that the trouble of losing the password every time, and more than every time the password is more secure.This public key can be generated using Putty key generator, download link View official website: http://www.chiark.greenend.org.uk/~sgtatham/putty/ Download.html, if the official website link cannot open, can
The first step is to generate a public/private key pair
Using the SECURECRT tool-> create the public key, the cryptographic algorithm chooses RSA because the RSA algorithm is selected in the sshd configuration file
This step generates two files, the default is identity and Identity.pub, where identity is the key and
By using Ssh-keygen to generate the public key, a new channel geek is established between the two machines.Suppose the local machine is the client and the remote machine is the server.1. Use Ssh-keygen to generate RSA keygen (this will overwrite the previously generated ~/.
Iii. Ssh password-less (key verification) login configurationConfigure host a password-free login to host B method 1) 1. generate an SSH-keygen-t rsa key pair on host a, which is stored in. generate a
I didn't care much about using SSH before. After the installation is not how to configure. Login is also directly with the password. This is not too safe, in fact, it is more troublesome, because each time you have to enter a password. If the public key of the private key is used to authenticate. You can log in directly (provided that the private
In linux, the public/private key is generated to allow putty (ssh) to log on automatically (and ssh to log on automatically using the key in linux). Method 1: Use puttygen.exe. Step 1: generate a key to run puttygen.exe, select th
privateKey to decrypt and send this random number back to the remote system. Finally, the sshd of the remote system will come to the conclusionWe have a matching private key that allows us to log in.
4. Manufacturing KeyUse the Puttygen of the putty suit to generate the key. The type of key is recommended to select SS
server makes a comparison of the information returned by the client. If the comparison succeeds, the authentication succeeds and the client can log on. If the comparison fails, the authentication fails, and the login verification is continued with other means, such as password verification.
The Certificate verification Interactive logon process shows:Linux Client Demo Login:1. Generate a pair of child keys locally on the client:[Email protected]
$feature _name Write code, commit change Git commit-am "Myfeatureisready" pushes your submission to [emailprotected]git pushorigin $feature _name on the submission page you can view your changes, for example: http://git.oschina.net/oschina/git-osc/commit/ F3DD1C5BAE48FA4244E2595A39E750E5606DD9BE Create a pullrequest you can fork any public project, and when you have modified your fork project, you can submit a pull to the source project request. The author of the project can decide whether to a
ArticleDirectory
Linux Configuration
Windows Configuration
Recently, git is used, and it is inconvenient to enter the password each time. You want to use the SSH key (a mechanism similar to the-I parameter in the SSH command ). Now the problem has been solved. Here we will summarize the problem (from the beginning of the database creation) for
When we use a Linux host, we typically produce two forms of key, one that is generated on a Linux host and then distributed with the private key, and one that is generated with the SSH tool and then uploads the public key to the server. The following three scenarios require a key
Use SSH login VPS generally use the ip+ port, enter username and password to log in
In order to enhance the security of the VPS, use the public key and the private key way to login VPS
The specific methods are:
Generate key on Linux remote server:ssh-ke
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.