码迷,mamicode.com
首页 > 系统相关 > 详细

Linux实现SSH无密码登录(对目录权限的设置非常详细,可以参考一下)

时间:2016-07-25 07:04:32      阅读:989      评论:0      收藏:0      [点我收藏+]

标签:

假设服务器IP地址为192.168.1.1,机器名:cluster.hpc.org

         客户端IP地址为172.16.16.1,机器名:p470-2.wangrx.sioc.ac.cn

客户端用户yzhao需要使用ssh无密码登录服务器的zhaoy帐户

 

实现原理

使用一种被称为"公私钥"认证的方式来进行ssh登录. "公私钥"认证方式简单的解释是

  • 首先在客户端上创建一对公私钥 (公钥文件:~/.ssh/id_rsa.pub 私钥文件:~/.ssh/id_rsa
  • 然后把公钥放到服务器上~/.ssh/authorized_keys, 自己保留好私钥
  • 当ssh登录时,ssh程序会发送私钥去和服务器上的公钥做匹配.如果匹配成功就可以登录了

 

 

设置如下:

1、以yzhao用户登录客户机器并在客户端机器上执行"ssh-keygen -t rsa"

(注:每次执行"ssh-keygen -t rsa"产生的私钥文件都会不同)

a)如果文件"~/.ssh/id_rsa"存在,会提示是否覆盖该文件,此时可选择"n"不覆盖该文件而使用已有的id_rsa文件;如果选择"y"则会重新生成"~/.ssh/id_rsa"文件,接下来会提示输入passphrase,回车确定使用空的passphrase,再次回车确认(这里也可以输出passphrase,相当于ssh时登录的密码)。然后会重新生成"~/.ssh/id_rsa"文件和"~/.ssh/id_rsa.pub"文件(结果如下)。

[yzhao@p470-2 ~]$ ssh-keygen -t rsa

Generating public/private rsa key pair.

Enter file in which to save the key (/disk2/yzhao/.ssh/id_rsa):

/disk2/yzhao/.ssh/id_rsa already exists.

Overwrite (y/n)? y

Enter passphrase (empty for no passphrase):

Enter same passphrase again:

Your identification has been saved in /disk2/yzhao/.ssh/id_rsa.

Your public key has been saved in /disk2/yzhao/.ssh/id_rsa.pub.

The key fingerprint is:

6d:a1:17:8a:b6:d2:c0:a1:6c:66:ba:85:0b:7b:9f:0c yzhao@p470-2.wangrx.sioc.ac.cn

 

b)如果"~/.ssh/id_rsa"文件和"~/.ssh/id_rsa.pub"文件不存在则会自动创建新的"~/.ssh/id_rsa"文件和"~/.ssh/id_rsa.pub"文件,passphrase设置同上。

[yzhao@p470-2 ~]$ ssh-keygen -t rsa

Generating public/private rsa key pair.

Enter file in which to save the key (/disk2/yzhao/.ssh/id_rsa):

Created directory ‘/disk2/yzhao/.ssh‘.

Enter passphrase (empty for no passphrase):

Enter same passphrase again:

Your identification has been saved in /disk2/yzhao/.ssh/id_rsa.

Your public key has been saved in /disk2/yzhao/.ssh/id_rsa.pub.

The key fingerprint is:

54:49:ad:33:b3:ff:71:da:6d:db:78:d0:bb:6a:15:bc yzhao@p470-2.wangrx.sioc.ac.cn

 

2、使用ssh zhaoy@192.168.1.1登录到服务器,编辑服务器上"~/.ssh/authorized_keys"文件,将客户端机器上的"~/.ssh/id_rsa.pub"文件内容追加到"~/.ssh/authorized_keys"文件中。

(注:可以在客户端机器上使用以下命令来实现:

cat  ~/.ssh/id_rsa.pub | ssh zhaoy@192.168.1.1 "cat - >> ~/.ssh/authorized_keys"

 

cat /root/.ssh/id_rsa.pub|ssh root@192.168.2.168 "cat - >> /root/.ssh/authorized_keys"

 

此时会要求输入zhaoy在服务器上的登录密码,输入后即会将客户端机器上的"~/.ssh/id_rsa.pub"文件内容追加到服务器上的"~/.ssh/authorized_keys"文件中)

 

如果是首次连接服务器会出现以下的提示,确认连接并输入密码后其他直接回车确定。

[yzhao@p470-2 ~]$ ssh zhaoy@192.168.1.1

The authenticity of host ‘192.168.1.1 (192.168.1.1)‘ can‘t be established.

RSA key fingerprint is 94:91:33:01:6b:e7:10:ae:42:ac:ea:5c:8c:bb:f1:18.

Are you sure you want to continue connecting (yes/no)? yes

Warning: Permanently added ‘192.168.1.1‘ (RSA) to the list of known hosts.

zhaoy@192.168.1.1‘s password:

Last login: Fri Dec 21 17:41:38 2007 from 172.16.16.1

Rocks 4.2.1 (Cydonia)

Profile built 03:58 21-Jun-2007

 

Kickstarted 12:25 21-Jun-2007

Rocks Frontend Node - Our Cluster Cluster

 

It doesn‘t appear that you have set up your ssh key.

This process will make the files:

     /home/zhaoy/.ssh/id_rsa.pub

     /home/zhaoy/.ssh/id_rsa

     /home/zhaoy/.ssh/authorized_keys

 

Generating public/private rsa key pair.

Enter file in which to save the key (/home/zhaoy/.ssh/id_rsa):

Created directory ‘/home/zhaoy/.ssh‘.

Enter passphrase (empty for no passphrase):

Enter same passphrase again:

Your identification has been saved in /home/zhaoy/.ssh/id_rsa.

Your public key has been saved in /home/zhaoy/.ssh/id_rsa.pub.

The key fingerprint is:

7e:f6:ab:b0:79:70:cb:c9:f7:40:37:aa:10:4d:4a:ac zhaoy@cluster.hpc.org

 

3、如果在第1步中使用了空的passphrase,则可以跳过第4步,此时在客户端即可以使用"ssh zhaoy@192.168.1.1"即可无密码登录到服务器;如果第一步中设置了passphrase,则继续执行以下步骤。

 

4如果第1步中设置了passphrase,则此时需要输入该passphrase登录服务器。此时前面我们把输入密码变成了输入passphrase这没有带来任何方便但是我们可以通过ssh-agent来帮助我们自动输入passphrase(只是看起来像是自动输入而已)我们只要在第一次登录时输入一次passphrase, 以后的工作就可以交给ssh-agent。在客户端机器上执行命令ssh-add这里会提示输入一次passphrase。输入第一步中设置的passphrase之后会修改"~/.ssh/id_rsa"文件。再在客户端执行"ssh zhaoy@192.168.1.1"即可无密码登录到服务器端。

 

[yzhao@p470-2 ~]$ ssh-add

Enter passphrase for /disk2/yzhao/.ssh/id_rsa:

Identity added: /disk2/yzhao/.ssh/id_rsa (/disk2/yzhao/.ssh/id_rsa)

[yzhao@p470-2 ~]$ ssh zhaoy@192.168.1.1

Last login: Fri Dec 21 17:55:38 2007 from 172.16.16.1

Rocks 4.2.1 (Cydonia)

Profile built 03:58 21-Jun-2007

 

Kickstarted 12:25 21-Jun-2007

Rocks Frontend Node - Our Cluster Cluster

[zhaoy@cluster ~]$

 

 

 

 

 

 

linux 修改目录文件权限,目录文件所属用户,用户组  


 

1:查看命令:ls -l

drwxr-xr-x  4 gamer ftp      4096 Mar  7 16:56 gstore
drwxrwxrwx 10 root  ftp      4096 Dec 16 01:30 resin-doc
 
前面共10个字符,第一个字符如果是“-” 表示这是个文件, 如果是 “d” 表示的是文件夹,“l” 表示链接文件等等
后面9个字符分为3个字符一组共三组,分别表示user(文件所属用户) 的权限、group组用户的权限、other其它用户的权限。
r表示读,w表示写,x的话示执行。各种权限代表的数字r (4) , w (2) , x (1)
 
2:修改目录文件权限:
chmod 777 /ftp 改变ftp目录的权限为
chmod -R 777 /ftp            改变ftp目录及子目录
 
3:修改文件所属用户和用户组
drwxr-xr-x  4 gamer ftp      4096 Mar  7 16:56 gstore
drwxrwxrwx 10 root  ftp      4096 Dec 16 01:30 resin-doc
红色部分,前一个是所属用户,后一个是用户组。
 
修改所属用户
chown gamer gstore         改变gstore目录
chown -R gamer gstore         改变gstore目录及子目录
 
修改所属用户组
chown :ftp gstore    改变gstore目录
chown -R :ftp  gstore  改变gstore目录及子目录

 

http://blog.csdn.net/langeldep/article/details/6565706

Linux实现SSH无密码登录(对目录权限的设置非常详细,可以参考一下)

标签:

原文地址:http://www.cnblogs.com/findumars/p/5702181.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!