ssh互信
[root@zphtest ~]# ssh-keygen
Generating public/private rsa key pair.Enter file in which to save the key (/root/.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/id_rsa.
Your public key has been saved in /root/.ssh/id_rsa.pub.
The key fingerprint is:
37:b4:0f:18:d2:06:3c:43:c5:1a:57:d2:fc:82:b6:2e root@zphtest
The key's randomart image is:
+--[ RSA 2048]----+
| oooo+. |
| =oo.o |
| .*+... |
| .oo+... |
| .S.=. |
| .. + |
| . . |
| E . |
| . |
+-----------------+
[root@zphtest ~]# ssh-copy-id -i ~/.ssh/id_rsa.pub 192.168.1.188
root@192.168.1.188's password:
Now try logging into the machine, with "ssh '192.168.1.188'", and check in:
.ssh/authorized_keys
to make sure we haven't added extra keys that you weren't expecting.
scp分发
[root@zphtest ~]# cat >>scpfenfa.sh <<EOF
#!/bin/bash
if [ $# -ne 2 ];then
echo "example: $0 [file] [/directory]"
exit 1
fi
for ip in `cat iplist`
do
/usr/bin/scp $1 root@$ip:$2
done
EOF
[root@zphtest ~]# chmod +x scpfenfa.sh
[root@zphtest ~]# vi iplist
192.168.1.188