介绍了ssh服务
1) 远程连接加密传输数据协议,实现远程连接登录,默认端口22
2)ssh远程连接原理
依赖于锁头(公钥)和钥匙(私钥),实现远程加密连接
3)ssh基于秘钥远程登录原理
a 管理服务器创建秘钥対,将公钥传输发送给给管理端
b 管理端请求与被管理端建立连接
c 被管理向管理端发送公钥质询
d 管理端处理质询信息,实现管理与被管理端免密码交互
4)基于ssh协议相关命令
ssh scp sftp
netstat -lntup |egrep sshd 查看ssh端口
1.1 部署ssh+key (免密码交互方式) 架构换环境
确认一下部署架构环境 管理服务器:m01
被管理服务器: web01 nfs01 backup
架构部署(ssh+key)
第一个里程:在管理服务器上创建秘钥対
两种创建秘钥对方法:
a 利用交互方式创建秘钥对
[root@m01 ~]# ssh-keygen -t dsa
Generating public/private dsa key pair. --- 提示进行秘钥对创建
Enter file in which to save the key (/root/.ssh/id_dsa): --- 提示私钥文件保存在什么位置,进行确认
Enter passphrase (empty for no passphrase): --- 是否给私钥文件进行加密处理
Enter same passphrase again:
Your> Your public key has been saved in /root/.ssh/id_dsa.pub. --- 提示公钥文件最终保存路径
The key fingerprint is: --- 以下内容表示秘钥指纹信息提示
0b:d2:c0:14:3c:9b:9d:de:1b:d8:3a:c6:92:f9:39:d5 root@m01
The key's randomart image is:
+--[ DSA 1024]----+
| .o. |
| oo |
| o= . |
| ooo |
| ..o+S. |
| .o.=.E |
| + o.o |
| + *.. |
| +oo |
+-----------------+
b 利用免交互方式创建秘钥对
a 交互方式位置:需要确认私钥文件保存路径
-f filename Specifies the filename of the key file.
-f "/root/.ssh/id_dsa"
b 交互方式位置:需要进行私钥文件加密确认
-N new_passphrase Provides the new passphrase.
-P passphrase Provides the (old) passphrase.
-N ""
ssh-keygen -t dsa -f "/root/.ssh/id_dsa" -N ""
ssh-keygen -t dsa -f "/root/.ssh/id_dsa" -N "" -q
第二个里程:在管理服务器上分发公钥给被管理端服务器
a 利用交互方式实现公钥分发
ssh-copy-id [-i [identity_file]] [user@]machine
ssh-copy-id -i /root/.ssh/id_dsa.pub 172.16.1.41
(172.16.1.41
)' can't be established.
RSA key fingerprint is 59:41:4e:36:ae:75:83:01:23:93:7b:c8:68:ff:37:9f.
Are you sure you want to continue connecting (yes/no)? yes --- 确认是否接受连接主机公钥信息
Warning: Permanently added '172.
.1.41
' (RSA) to the list of known hosts.
root@172.16.1.41's password: --- 首次连接需要基于口令连接
Now try logging into the machine, with "ssh '172.16.1.41
'", and check in:
.ssh/authorized_keys
to make sure we haven't added extra keys that you weren't expecting.
[root@m01 ~]# ssh 172.16.1.41
--- 进行连接测试,已经可以免密码登录远程主机
Last login: Tue Dec 5 12:02:48 2017 from 10.0.0.253
b 第一次远程连接需要基于口令认证 sshpass -p 123456 ssh-copy-id -i /root/.ssh/id_dsa.pub "172.16.1.8 -p22 -o StrictHostKeyChecking=no"
Now try logging into the machine, with "ssh '172.16.1.8
-p52113 -o StrictHostKeyChecking=no'", and check in:
.ssh/authorized_keys
to make sure we haven't added extra keys that you weren't expecting.
第三个里程碑:如何实现公钥批量分发,秘钥对自动生成 编写脚本实现公钥批量分发
[root@m01 scripts]# cat fenfa_check.sh
#!/bin/bash
var info
Password_info=123456
Server_Port=22
Cmd_info=$1
push public key to client server
for ip in 8 31 41
do
echo "================= host 172.16.1.$ip check_info ================="
ssh -p$Server_Port 172.16.1.$ip $Cmd_info
echo ""
done
[root@m01 scripts]# cat fenfa_keygen.sh
#!/bin/bash
var info
Password_info=123456
Server_Port=22
create key pair
rm /root/.ssh/id_dsa* -f
ssh-keygen -t dsa -f "/root/.ssh/id_dsa" -N "" -q
push public key to client server
for ip in 8 31 41
do
echo "================= host 172.16.1.$ip info ================="
sshpass -p $Password_info ssh-copy-id -i /root/.ssh/id_dsa.pub "172.16.1.$ip -p$Server_Port -o StrictHostKeyChecking=no"
echo "================= host info end ================="
echo ""
done
[root@m01 scripts]# cat test_shift.sh
#!/bin/bash
until [ $# -eq 0]
do
echo $*
shift
done
安装免密码sshpass