In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/03 Report--
I. introduction to SSH
SSH (Shell) is a secure channel protocol, which is mainly used to realize remote login of character interface,
Functions such as remote replication. SSH protocol deals with the data transmission between the two sides of the communication, including the user password entered when the user logs in. Compared with the early applications such as telnet (remote login), rsh (Remote Shell) and rcp (Remote File Copy), SSH protocol provides better security.
II. SSH services and configuration files
The 1.ssh service profile is located in the / etc/ssh/sshd_config directory by default.
Service snooping option
1 Port 22 / / the port number of the monitor is 22
2 Protocol 2 / / using SSH V2 protocol
3 ListenAdderss 0.0.0.0 / / the listening address is all addresses
4 UserDNS no / / prohibit DNS reverse parsing
User login control
1 PermitRootLogin no / / prohibit root users from logging in
2 PermitEmptyPasswords no / / prohibit users from logging in
3 LoginGraceTime 2m / / login authentication time is 2 minutes
4 MaxAuthTries 6 / / maximum number of retries 6
5 AllowUsers steven / / only allow steven users to log in
6 DenyUsers steven / / login user steven is not allowed
Login authentication method
1 PasswordAuthentication yes / / enable key
2 PubkeyAuthentication yes / / enable key authentication
3 AuthorsizedKeysFile .ssh / authorized_keys / / specify the public key database file
3. Use SSH client program
1. Command program ssh remote login
Format: ssh user name @ ip address
* * 2scp remote login
The scp command allows you to copy files to and from a remote host using a SSH secure connection. When using the scp command
In addition to specifying the replication source and destination, you should also specify the target host address, login user, and prompt to verify the password after execution.
Format: scp user name @ destination ip address: / directory
Sftp secure FTP
Through the sftp command, you can use the SSH secure connection to upload and download files with the remote host, using the FTP
Similar login process and interactive environment to facilitate directory resource management
four
1. Create a key pair on the client
Command: sh-keygen
two。 Pair the key to the replicated server
3. Use key pair authentication on the client side
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.