当前位置:网站首页>SSH password free login
SSH password free login
2022-07-28 22:30:00 【5xp_ two thousand and one】
Recent synchronization django Configuration requires secret free synchronization nas Catalog The configuration is sorted as follows
SSH Three steps to solve the secret free login
- 1. The client generates public and private keys
- 2. Upload public key to server
- 3. Test password free login
1. The client generates public and private keys
Local clients generate public and private keys :( Return all the way by default )
ssh-keygen
- 1
The above command will be in the user directory .ssh Create a public / private key folder
cd ~/.ssh
- 1
ls
- 1
Create two keys under :
- id_rsa ( Private key )
- id_rsa.pub ( Public key )
2. Upload public key to server
The server address used for the test here is :192.168.235.22
The user is :root
ssh-copy-id -i ~/.ssh/id_rsa.pub [email protected]
- 1
The above command is written to the server ssh The list goes down
cd ~/.ssh
- 1
vim authorized_keys
- 1
You can see that the client writes to the server id_rsa.pub ( Public key ) Content .
3. Test password free login
ssh [email protected]Client pass ssh Connect to remote server , You can log in without password .
Add
[[email protected] .ssh]# ssh-copy-id -i ./id_rsa.pub "-p 58422 [email protected]"
Reference resources https://www.cnblogs.com/chuyiwang/p/10729591.html
Report errors
ssh-copy-id -i ./id_rsa.pub -p 41022 [email protected]
Bad port 'umask 077; test -d ~/.ssh || mkdir ~/.ssh ; cat >> ~/.ssh/authorized_keys && (test -x /sbin/restorecon && /sbin/restorecon ~/.ssh ~/.ssh/authorized_keys >/dev/null 2>&1 || true)'
Report a mistake again
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that the RSA host key has just been changed.
The fingerprint for the RSA key sent by the remote host is
d5:e0:49:db:cb:ce:09:99:38:b6:7f:20:9a:b6:a6:35.
Please contact your system administrator.
Add correct host key in /root/.ssh/known_hosts to get rid of this message.
Offending key in /root/.ssh/known_hosts:5
RSA host key for [101.200.120.97]:41022 has changed and you have requested strict checking.
Host key verification failed.
terms of settlement It's empty known_hosts file test ssh Password login is normal Use the default id_rsa Write... Manually authorized after ok
边栏推荐
- Lotus 1.16.0 extend sector expiration time
- 2022年一级建造师考试什么时候才能报名?
- Remember the first line segment tree (corresponding to Luogu 3372)
- Ecmasript 5/6 notes
- LVS+KeepAlived高可用部署实战应用
- Hcip experiment (15)
- XXX port is already in use
- For loops and functions
- MySQL installation and configuration (super detailed, simple and practical)
- Leetcode integer exercises integer inversion
猜你喜欢

HCIP第七次实验

If you want to grow rapidly, you must first experience a major blow!

105. Construct binary tree from preorder and inorder traversal sequence (medium binary tree DFS hash table binary tree)

HCIP(15)

Sword finger offer II 054. Sum of all values greater than or equal to nodes (medium binary search tree DFS)

npm ERR code ETIMEDOUT npm ERR syscall connect npm ERR errno ETIMEDOUT npm ERR network reques...

Basic introduction of Rockwell AB PLC rslogix digital quantity IO module
![[LiteratureReview]Object Detection and Mapping with Bounding Box Constraints](/img/37/7cb5fa3a9078a5f5947485147c819d.png)
[LiteratureReview]Object Detection and Mapping with Bounding Box Constraints

HCIP(8)

成立不到一年!MIT衍生量子计算公司完成900万美元融资
随机推荐
HCIP(11)
[leetcode] maximum depth of binary tree
示波器发展史中的变化
How to install WiFi correctly
Establishment of Ruiji takeout development environment
HCIP(14)
DOM programming + events
Learn kotlin - extension function
JS convert numbers to letters
HCIP(11)
imx6q gpio复用
Ukrainian officials: half of Ukrainian agricultural products are exported through the Danube port
Sword finger offer II 057. the difference between the value and the subscript is within the given range (medium array bucket sort sliding window TreeSet)
Win11 how to open software notification
JMeter installs third-party plug-ins plugins Manager
32. Longest valid bracket (difficult stack string)
105. Construct binary tree from preorder and inorder traversal sequence (medium binary tree DFS hash table binary tree)
SQL injection less42 (post stack injection)
微信小程序使用canvas绘图,圆形头像,网络背景图,文字,虚线,直线
Leetcode question brushing series - sum of majority type