Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Server \ Xshell configure SSH free password     - VirtualBox snapshots (Linux)

- JDK installation under CentOS (Linux)

- Smooth upgrade to OpenSSH 6.7 Procedure (Linux)

- Linux command line under HTTP traffic sniffing tool: httpry (Linux)

- MySQL event table to achieve timing build a small note (Database)

- Automatic batch resolve dependencies problem locally installed rpm package (Linux)

- Install Visual Studio Code in Ubuntu (Linux)

- How to test your MongoDB application upgrade? (Database)

- Linux system performance and usage activity monitoring tools -Sysstat (Linux)

- To install Internet security firewall Raiders (Linux)

- Linux process scheduling opportunity (Programming)

- Linux module mechanism of (Programming)

- grep search from files and display the file name (Linux)

- Nine tips to protect the security of Linux desktop (Linux)

- Learning C language pointer essays (Programming)

- Postgres-X2 deployment steps (Database)

- Why everybody ought to know LLVM (Linux)

- How to use the Vault secure password storage and API key (Linux)

- Ubuntu 14.04 Nvidia graphics driver installation and settings (Linux)

- Kali Linux 2.0 U disk installation errors Your installation cd-rom could not be mounted (Linux)

 
         
  Xshell configure SSH free password
     
  Add Date : 2018-11-21      
         
         
         
  Buy a server, always use password authentication. Although the problem has not appeared, but always felt this way defective landing. Because companies typically use key authentication landing approach. So today his own way into the login server secret key landing approach. The whole process is no difficulty writing this article is mainly under the record.

Use key authentication in three steps:

1. Generate Key

2. Place the key, configure ssh

3. Configure the client to use ssh key login

First, generate a key

1. Use Xshell generate the key

The above can be generated by any one of the key ways;


After completing the key to save the resulting file

Save as id_rsa.pub (public key)

2. Use git to generate the key

Run the command ssh-keygen -t -rsa

Second, place the public key to the server, set up ssh

Xshell use to log into the server, go to "/root/.ssh/" directory

Id_rsa.pub will sent to the server, and then run the following command, the public (Public Key) into "authorized_keys" file:

[Root @ linuxidc ~] # cd /root/.ssh/

[Root @ linuxidc .ssh] # cat id_rsa.pub >> authorized_keys

[Root @ linuxidc .ssh] # chmod 600 authorized_keys

[Root @ linuxidc .ssh] # chown linuxidc: yearnfar authorized_keys # users, groups of users into their own

Verify login is correct, the ssh client configuration mode by a password to login publickey, public key file using the generated file to

If the login fails, check the ssh configuration file (/ etc / ssh / sshd_config) in PubkeyAuthentication whether yes.

If authentication is successful, then you can turn off password mode, and edit / etc / ssh / sshd_config, the PasswordAuthentication to no, ChallengeResponseAuthentication to no

Restart sshd (service sshd restart)

PS:

1. To ensure that the directory .ssh belong to the current user and permissions are 700

2. Make sure the file authorized_keys belonging to the current user and permissions are 600

/ Home / user directory must also be 700! ! ! If you turn it with root privileges, can lead not landing

Third, set the ssh client login

Fourth, some suggestions about security

Login authentication using the key, not to set the root key authentication, users can use su or sudo to obtain through other super administrator privileges
     
         
         
         
  More:      
 
- Install Java 8 on Ubuntu using PPA (Linux)
- STL spatial Configurator (Programming)
- Camouflage Nginx Web server version to prevent invasion (Linux)
- To share some very useful Vim command (Linux)
- Restrict console access to Linux servers to improve security (Linux)
- Internal class broadcasting needs public and static (Programming)
- Grading defense against Linux server attacks (Linux)
- Linux Timing task Crontab command Detailed (Linux)
- Android custom controls create the simplest skid menu in the history (Programming)
- Install DB2 V10 and Data Studio V3 under Linux (Ubuntu) environment (Database)
- Linux argument references and command substitution (Linux)
- C / C ++ language variable scope: local variables, global variables, file-level variables (Programming)
- How to find on Linux and delete duplicate files: FSlint (Linux)
- HTML5 Application Cache (Programming)
- Java generate two-dimensional code by Zxing (Programming)
- Linux process or thread is bound to a CPU (Programming)
- jQuery update the content and method of use 3.0 (Programming)
- Android recyclerview cardview (Programming)
- Bash difference in single quotes and double quotes (Programming)
- CentOS 6.5 opens the Xmanager Remote Desktop login (Linux)
     
           
     
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.