小知识:Linux配置远程SSH无密码登录

本文实例为大家分享了jaLinux配置远程SSH无密码登录的方法,供大家参考,具体内容如下

系统:

CentOS 6.8

主机1:192.168.0.177

主机2:192.168.0.178

工具介绍:

ssh-keygen:创建公钥和密钥

ssh-copy-id:把生成的公钥复制到192.168.0.178主机上的authorized_keys文件上,

ssh-copy-id也会给远程主机的用户主目录(/home)和/root/.ssh和/root/.ssh/authorized_key设置合适的权限

1)创建公钥和密钥

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
[root@test ~]# ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/root/.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/id_rsa.
Your public key has been saved in /root/.ssh/id_rsa.pub.
The key fingerprint is:
79:a9:66:cd:1a:a5:7c:82:80:c3:06:ec:44:13:b9:7a root@test
The keys randomart image is:
+–[ RSA 2048]—-+
| +o |
|o.. |
|.o. |
|o+ . . . |
|..= . S + |
|..E. . o B |
| . . O + |
| o = |
| . |
+—————–+

%小知识:Linux配置远程SSH无密码登录-猿站网-插图

[root@test ~]#

2)拷贝公钥到远程主机

?
1
2
3
4
5
6
7
8
9
10
11
12
13
[root@test ~]# ls .ssh/
authorized_keys id_rsa id_rsa.pub
[root@test ~]#
[root@test ~]# ssh-copy-id -i /root/.ssh/id_rsa.pub root@192.168.0.178
The authenticity of host 192.168.0.178 (192.168.0.178) cant be established.
RSA key fingerprint is 53:bd:d7:e6:27:96:f3:70:f1:4b:4d:35:a4:38:1d:69.
Are you sure you want to continue connecting (yes/no)? YES
Warning: Permanently added 192.168.0.178 (RSA) to the list of known hosts.
root@192.168.0.178s password:
Now try logging into the machine, with “ssh root@192.168.0.178”, and check in:
.ssh/authorized_keys
to make sure we havent added extra keys that you werent expecting.
[root@test ~]#

3)测试远程连接

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
[root@test ~]# ip addr show
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
link/ether 00:0c:29:7e:1f:f6 brd ff:ff:ff:ff:ff:ff
inet 192.168.0.177/24 brd 192.168.0.255 scope global eth0
inet6 fe80::20c:29ff:fe7e:1ff6/64 scope link
valid_lft forever preferred_lft forever
[root@test ~]#
[root@test ~]# ssh 192.168.0.178
Last login: Sat Sep 24 14:00:49 2016 from 192.168.0.103
[root@test ~]#ip addr
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
link/ether 00:0c:29:36:93:06 brd ff:ff:ff:ff:ff:ff
inet 192.168.0.178/24 brd 192.168.0.255 scope global eth0
inet6 fe80::20c:29ff:fe36:9306/64 scope link
valid_lft forever preferred_lft forever

查看192.168.0.177生成的authorized_keys

?
1
2
[root@test .ssh]# cat authorized_keys
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA+I6LXDE5DvSmQJcX98FpzScXoGpJ6fD47yXzp/tp/HTpOTQgNbiTjH6s6yNMsd5LQlBED8a5CTx5wKm+H7rT0po2xD+AZcF69js+4SwO8/xFwHLZ/8O64hsvn68GmxqO9vP8giWWcZNy/CsmOecllOB1NFXpCwQ1TBw+P4n84oj2YHwdSzGcre8j/OiAChHl6QHFtAuFvOdVRYFeyurFM8KP6Bb6tEeDDrqILboaQtTJOwRD2Fkt33C5lpuZNNGqc+DmRjDabgC3ZgzRCe3OyYbhaRlfiwVHFPYt7pDQMnrp/dUmyBSs/6gwd2CiK3cV4ZvpOzyGdynPqXsxIIBIKw== root@test

到此信任添加就完成了,192.168.0.177就可以无密码远程登录192.168.0.178服务器了,如果要想实现双向信任请在192.168.0.178

重复以上步骤,写本文目的只是想把会的东西记录下来,以备遗忘之时查阅!

以上就是本文的全部内容,希望对大家的学习有所帮助,也希望大家多多支持服务器之家。

声明: 猿站网有关资源均来自网络搜集与网友提供,任何涉及商业盈利目的的均不得使用,否则产生的一切后果将由您自己承担! 本平台资源仅供个人学习交流、测试使用 所有内容请在下载后24小时内删除,制止非法恶意传播,不对任何下载或转载者造成的危害负任何法律责任!也请大家支持、购置正版! 。本站一律禁止以任何方式发布或转载任何违法的相关信息访客发现请向站长举报,会员发帖仅代表会员个人观点,并不代表本站赞同其观点和对其真实性负责。本网站的资源部分来源于网络,如有侵权烦请发送邮件至:2697268773@qq.com进行处理。
建站知识

小知识:yum安装CDH5.5 hive、impala的过程详解

2023-4-20 5:39:46

建站知识

小知识:Linux中使用crontab命令启用自定义定时任务实例

2023-4-20 5:56:08

0 条回复 A文章作者 M管理员
    暂无讨论,说说你的看法吧
个人中心
购物车
优惠劵
今日签到
有新私信 私信列表
搜索