Use of SSH-copy-ID
Ssh-copy-ID is a preset command in the SSH client suite. Simply put, it is just a script, when you have produced an RSA or DSA on your computerAuthentication. You can send the authentication token to the local host using the ssh-copy-id command.
How to Est
Use digital signature RSA or DSA to implement ssh between two linux machines without the user name and password, rsassh
To enable two linux machines to use ssh, the user name and password are not required. Therefore, the digital signature RSA or DSA is used to complete this operation.
Model Analysis
Assume that A (192.
start_point] ssh-keygen- toutput_file-f input_file [-v] [-a num_trials] [-W generator] [/code] description ssh-keygen is used for ssh (1) generate, manage, and convert authentication keys, including RSA and DSA. You can use the-t
In case the URL is lost, copy the backup. Copy Source Ssh-keygen parameter descriptionSsh-keygen-Generate, manage, and convert authentication keysSsh-keygen[- Q] [- bbits]- Ttype[- NNew_passphrase] [- CComment] [- FOutput_keyfile]ssh-key
Always want to transfer their server SSH authentication mode from user name password mode to RSA and DSA authentication protocol, through the release of OpenSSH 4.2, today wrote a configuration process and collected some reference articles on RSA and DSA.Idea Finishing:Has not understood the authentication process in the public key mode, here summarizes the method of making and placing the public key and th
account login for security reasonsPermitrootlogin No #选项前面可以加 # is commented out and the root user is also disabledwith the certificate login, disable password login, security matterspasswordauthentication No #选项前面可以加 # comment out, also disable password loginRestart the SSH service so that the SSH configuration will take effect:[email protected]:~# systemctl Restart Sshd.serviceFour,
Ssh-keygen generates a public and private key pair.Ssh-copy-id The local public key is copied to the remote machine's Authorized_keys file, Ssh-copy-id can also let you have to the remote machine/home/username/.ssh and ~/.ssh/authorized_ The right to the keys.Operation Recor
or her private key and then sent back. The remote host decrypts with a pre-stored public key and, if successful, proves that the user is trustworthy, allowing the login shell to be logged in and no longer requiring a password. This way, we can guarantee the security of the entire login process and will not be attacked by the man-in-the-middle. See the rest of the content: http://www.cnblogs.com/likui360/p/6012075.htmlThe following is an analysis of Ssh
Environment:192.168.2.10192.168.2.11Implementation: 2.10 SSH without password login to 2.11In 2.10 ssh to 2.11 machines, a password is required, which makes it inconvenient for some scripts to work because of the need for a password, which requires manual intervention. The previous method is to copy Authorized_keys inside (remember, before), recently found a command ssh
In this example, we will configure DSA common key authentication for SSH2 on two machines (Machine A and Machine B.
After the configuration is complete, we can log on to Machine B through SSH2 from Machine A without entering the password. we can also configure it as without passphrase (remember: This method is not recommended ). DSA public key authentication only applies to one host and one user, not to the
SSH to the 163 host requires a password, which is inconvenient for some scripts because the password is required, that is, manual intervention is required. The method used previously was to copy the authorized_keys file (I can't remember it, I used it before). Recently, I found a command ssh-copy-ID is very convenient. I tried it and it really worked well. It was recorded below:
On 192.168.42.142
1) Run
created.(The possible values is "RSA1" for protocol version 1 and "DSA", "ECDSA" or "RSA" for Protocol version 2.)-VDebug mode-Y(this option would read a private OpenSSH format file and print an OpenSSH public key to stdout.)Practice1 extracting a public key that conforms to the standard format[[emailprotected] ssh]# ssh-key
I. Overview
1, is to allow two Linux machines to use SSH between the user name and password is not required. Digital signature RSA or DSA is used to complete this operation.
2. Model Analysis
Assuming that a (192.168.20.59) is a client machine, B (192.168.20.60) is the target machine;The purpose to be achieved:A machine SSH login B machine does not need to enter
a pair of keys (private key + public key) to place the public key on the server registration. When a user logs on to a server from a client, the server receives a security authentication request using the key (that is, the public key registered on the server), the server is first compared to the public key that is sent from the client and the public key registered with the client, and if it is consistent, the server uses that public key to encrypt data to "challenge"[ 1], thus avoiding man-in-t
SSH Remote connection command:Usage format:ssh ipaddr does not specify the user to log on to the remote host as the user of the current host login systemssh [email protected] telnet to a host as a user via SSH protocolusage:ssh [email protected] Telnet to the 192.168.1.100 host via the SSH protocol as rootssh-l USERNAME ipaddr equivalent to
Using ssh-keygen to set ssh password-less ssh logon is a protocol designed for security of remote logon sessions and other network services. By default, ssh connections require password authentication. You can add system authentication (Public Key-Private Key) modifications.
:
$ Password: (enter Password)
At this point, if the secret is correct, you can log in.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
In the trust environment, if each remote login, you have to enter a password, feel too wasted time, especially the password is very complex, maintenance of the server more than the case.
So there is a normal need: you do not have to enter a password to achieve remote logins.
The implementation steps are as follows:
1, local generat
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.