Article Title: to talk about how to use SSH2 on Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open
I have previously written a perfect method for using SSH and securecrt keys in Linux. Many friends have asked me how to implement SSH2. SSH1 is a little outdated. You may wish to add the instructions for SSH2. In fact, it is as simple as SSH1.
1.
Article Title: This article analyzes the supplement of SecureCrt using SSH2. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems,
To enable public key user authentication, the user should create a user-key pair that consists of a public key and a key. When public key authentication is performed, the user signature is created by Xshell with the key, and the SSH server uses the
The SSH Protocol (Secure Shell Protocol) was originally developed by the Tatu Ylönen in Finland in 1995 and is a network working group of the IETF (Internet Engineering Task Force) (Networks working Grou p) Set standards.Tatu Ylönen designed the SSH
1, login to the host and enter ssh-keygen-t RSA
Prompt for enter file in which to save the key (/ROOT/.SSH/ID_RSA):
Input/root/.ssh/sea_rsa
Enter the relevant pathname and filename as prompted and generate two files (followed by two options to
About SSHTraditional network service programs, such as ftp,pop,telnet, are inherently insecure because they transmit data, user accounts, and user passwords in clear text on the network, and are vulnerable to attack by a man-in-the-middle attack
SSH is much safer than telnet, and it is more perfect if RSA verification is added.
A key pair is generated and encrypted by passphrase. The public key is placed on the server to be logged on (in the home directory of an account. SSH). The private
Method One: Use Puttygen.exeThe first step: Creating a secret key
Run Puttygen.exe, select the key type and length you want, use the default SSH2 (RSA), and set the length to 1024.
Passphrase can be empty so that you don't have to enter a password
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.