SSH 密钥远程登录 - 图1

    一键生成密钥

    自动生成authorized_keys 复制一份给自己

    1. [chroot@ntp-server-it-ap02 .ssh]$ ssh-copy-id ntp-server-it-ap02
    2. /usr/bin/ssh-copy-id: INFO: Source of key(s) to be installed: "/home/chroot/.ssh/id_rsa.pub"
    3. The authenticity of host 'ntp-server-it-ap02 (10.82.100.81)' can't be established.
    4. ECDSA key fingerprint is SHA256:YL7wjH4GtBLMgsgqXVg9lb0ga4pdVr0ENgFnESi7Nsc.
    5. Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
    6. /usr/bin/ssh-copy-id: INFO: attempting to log in with the new key(s), to filter out any that are already installed
    7. /usr/bin/ssh-copy-id: INFO: 1 key(s) remain to be installed -- if you are prompted now it is to install the new keys
    8. /etc/ssh/ssh_config line 59: Unsupported option "gssapiauthentication"
    9. Be sure you are authorized to access this system!
    10. chroot@ntp-server-it-ap02's password:
    11. Number of key(s) added: 1
    12. Now try logging into the machine, with: "ssh 'ntp-server-it-ap02'"
    13. and check to make sure that only the key(s) you wanted were added.
    14. [chroot@ntp-server-it-ap02 .ssh]$ ls -l
    15. total 16
    16. -rw------- 1 chroot chroot 579 Jan 9 10:28 authorized_keys
    17. -rw------- 1 chroot chroot 2610 Jan 9 10:09 id_rsa
    18. -rw-r--r-- 1 chroot chroot 579 Jan 9 10:09 id_rsa.pub
    19. -rw-r--r-- 1 chroot chroot 1158 Jan 9 10:28 known_hosts
    20. [chroot@ntp-server-it-ap02 .ssh]$

    手动生成权限设置
    chmod 700 ~/.ssh
    chmod 644 ~/.ssh/authorized_keys

    1. [chroot@ntp-server-it-ap02 .ssh]$ ssh-keygen -t rsa
    2. Generating public/private rsa key pair.
    3. Enter file in which to save the key (/home/chroot/.ssh/id_rsa):
    4. Enter passphrase (empty for no passphrase):
    5. Enter same passphrase again:
    6. Your identification has been saved in /home/chroot/.ssh/id_rsa
    7. Your public key has been saved in /home/chroot/.ssh/id_rsa.pub
    8. The key fingerprint is:
    9. SHA256:nn24ysqxCkUv40izxDyijeF9+xhyDi81bf9mGVBEtoo chroot@ntp-server-it-ap02
    10. The key's randomart image is:
    11. +---[RSA 3072]----+
    12. | o+ |
    13. | ... |
    14. | . .. |
    15. | o . . ... |
    16. |o B + oES.. |
    17. |oB.B = + o o |
    18. |o.=+o++ + o + |
    19. | oB.++ . * |
    20. | o*=oo.=. |
    21. +----[SHA256]-----+
    22. [chroot@ntp-server-it-ap02 .ssh]$ ls -l
    23. total 12
    24. -rw------- 1 chroot chroot 2610 Jan 9 10:09 id_rsa
    25. -rw-r--r-- 1 chroot chroot 579 Jan 9 10:09 id_rsa.pub
    26. -rw-r--r-- 1 chroot chroot 978 Jan 8 20:06 known_hosts
    27. [chroot@ntp-server-it-ap02 .ssh]$
    28. [chroot@ntp-server-it-ap02 .ssh]$ cat authorized_keys
    29. ssh-rsa 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 chroot@ntp-server-it-ap02
    30. [chroot@ntp-server-it-ap02 .ssh]$ cat id_rsa.pub
    31. ssh-rsa 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 chroot@ntp-server-it-ap02
    32. [chroot@ntp-server-it-ap02 .ssh]$

    https://www.cnblogs.com/isme-zjh/p/11596648.html
    一、authorized_keys
    1、就是为了让两个linux机器之间使用ssh不需要用户名和密码。采用了数字签名RSA或者DSA来完成这个操作

    2、模型分析

    假设 A (192.168.20.59)为客户机器,B(192.168.20.60)为目标机;

    要达到的目的:
    A机器ssh登录B机器无需输入密码;
    加密方式选 rsa|dsa均可以,默认dsa
    单向登陆的操作过程(能满足上边的目的):
    1、登录A机器
    2、ssh-keygen -t [rsa|dsa],将会生成密钥文件和私钥文件 id_rsa,id_rsa.pub或id_dsa,id_dsa.pub
    3、将 .pub 文件复制到B机器的 .ssh 目录, 并 cat id_dsa.pub >> ~/.ssh/authorized_keys
    4、大功告成,从A机器登录B机器的目标账户,不再需要密码了;(直接运行 #ssh 192.168.20.60 )

    双向登陆的操作过程:

    1、ssh-keygen做密码验证可以使在向对方机器上ssh ,scp不用使用密码.具体方法如下:
    2、两个节点都执行操作:#ssh-keygen -t rsa
    然后全部回车,采用默认值.

    3、这样生成了一对密钥,存放在用户目录的~/.ssh下。
    将公钥考到对方机器的用户目录下,并将其复制到~/.ssh/authorized_keys中(操作命令:#cat id_dsa.pub >> ~/.ssh/authorized_keys)。

    二、id_rsa、id_rsa.pub
    上班的第一天,上司大哥都会说:待会给我发个公钥吧。
    这里说的公钥其实就是id_rsa.pub。
    上司大哥是要把我们的客户端公钥上传到服务器,然后再把这个客户端公钥添加到authorized_keys。添加后,服务器就会认为你这个客户端为可信任。你则可以访问这个服务器了。

    本地主机在 ~/.ssh 键入
    ssh-keygen
    //会出现两个文件 后缀.pub就是公钥 另一个就是私钥
    ssh-copy-id {username}@ip
    //就会将公钥上传到服务器之后就可以登陆的