1、配置ssh免密码登陆(已root用户名为例);
service: 192.168.11.5
client :192.168.12.150
Client端配置:
2、查看在root用户下是否存在.ssh文件夹(注意ssh前面有“.”,这是一个隐藏文件夹)
- [root@bogon ~]# pwd
- /root
- [root@bogon ~]# ls -a
- . .cshrc .gnome2_private .mozilla .tcshrc
- .. Desktop .gstreamer-0.10 .nautilus test
- anaconda-ks.cfg .dmrc .gtkrc-1.2-gnome2 pptpd-1.3.4-1.rhel5.1.i386.rpm .Trash
- .bash_history .eggcups .ICEauthority project .virtinst
- .bash_logout .gconf install.log .redhat .virt-manager
- .bash_profile .gconfd install.log.syslog
- .bashrc .gnome lvs .ssh
- .config .gnome2 .metacity .subversion
- [root@bogon ~]#
一般来说,安装SSH时会自动在当前用户下创建这个隐藏文件夹,如果没有,可以手动创建一个。
3、使用ssh-keygen命令生成密钥对
- ssh-keygen -t rsa -P '' -f ~/.ssh/id_dsa
解释一下,ssh-keygen代表生成密钥;-t(注意区分大小写)表示指定生成的密钥类型;-P用于提供密语;-f指定生成的密钥文件。这个命令会在.ssh文件夹下创建id_dsa及id_dsa.pub两个文件,这是SSH的一对私钥和公钥,类似于钥匙和锁。
4、将公钥上传到service(192.168.11.5)上
- [root@localhost .ssh]# rsync id_rsa.pub root@192.168.11.5:/opt
- root@192.168.11.5's password:
Service端配置:
5、将公钥导入~/.ssh/authorized_keys 文件中
- [root@localhost opt]# ls
- 11 id_rsa.pub
- [root@localhost opt]# cat id_rsa.pub >> ~/.ssh/authorized_keys
Client端配置:
5 ssh无密码登陆service (192.168.11.5)
- [root@bogon ~]# ssh root@192.168.11.5
- Last login: Sun Jan 27 07:39:50 2013 from localhost
- -bash: 1=root@localhost.localdomain:[$PWD]: command not found
- [root@localhost ~]# ifconfig | more
- eth0 Link encap:Ethernet HWaddr 00:1D:09:9E:6C:78
- inet addr:192.168.11.5 Bcast:192.168.11.255 Mask:255.255.255.0
- inet6 addr: fe80::21d:9ff:fe9e:6c78/64 Scope:Link
- UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
- RX packets:2512561 errors:5 dropped:0 overruns:0 frame:3
- TX packets:17889387 errors:0 dropped:0 overruns:0 carrier:0
- collisions:0 txqueuelen:100
- RX bytes:323831504 (308.8 MiB) TX bytes:1163281010 (1.0 GiB)
- Memory:fdfc0000-fdfe0000
6、测试成功!!
转载于:https://blog.51cto.com/xiaodong88/1127114