设为首页 收藏本站
查看: 375|回复: 0

[经验分享] Linux下配置ssh无密码登陆

[复制链接]
累计签到:1 天
连续签到:1 天
发表于 2015-6-9 09:57:12 | 显示全部楼层 |阅读模式
mkdir ~/.ssh
chmod 700 ~/.ssh
ssh-keygen -t rsa
ssh-keygen -t dsa
然后,在节点 dbtest1 执行以下命令
cat ~/.ssh/id_rsa.pub >> ~/.ssh/authorized_keys
cat ~/.ssh/id_dsa.pub >> ~/.ssh/authorized_keys
ssh dbtest2 cat ~/.ssh/id_rsa.pub >> ~/.ssh/authorized_keys
ssh dbtest2 cat ~/.ssh/id_dsa.pub >> ~/.ssh/authorized_keys
scp ~/.ssh/authorized_keys dbtest2:~/.ssh/authorized_keys


节点1:
node1:~ #cd /root
node1:~ # mkdir .ssh
node1:~ # chmod 700 .ssh
node1:~ # ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/root/.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/id_rsa.
Your public key has been saved in /root/.ssh/id_rsa.pub.
The key fingerprint is:
b0:1d:73:0a:99:2a:ee:ce:cd:5f:de:e5:db:c9:ab:6e [MD5] root@node1
The key's randomart image is:
+--[ RSA 2048]----+
|                 |
|       o         |
|      = o .      |
|     . = =       |
|  . . . S        |
| . .             |
|  .     .   .    |
| o o   o . oEo . |
| .+ o.. . .o=o=. |
+--[MD5]----------+
node1:~ # ssh-keygen -t dsa
Generating public/private dsa key pair.
Enter file in which to save the key (/root/.ssh/id_dsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/id_dsa.
Your public key has been saved in /root/.ssh/id_dsa.pub.
The key fingerprint is:
9c:93:19:6b:df:bd:f3:01:b6:82:be:32:0c:ee:b0:68 [MD5] root@node1
The key's randomart image is:
+--[ DSA 1024]----+
|                 |
|                 |
|        .        |
|       . *       |
|        S    o   |
|     . . o....o  |
|   .. o  ....... |
| E. o. +.   . ...|
|.. ...  oo.   .o.|
+--[MD5]----------+
node1:~ #

节点2
node2:~ # cd /root
node2:~ # mkdir .ssh
node2:~ # chmod 700 .ssh/                              
node2:~ # ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/root/.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/id_rsa.
Your public key has been saved in /root/.ssh/id_rsa.pub.
The key fingerprint is:
f2:ca:0c:73:98:04:55:69:48:1a:9a:a8:8e:0c:96:0c [MD5] root@node2
The key's randomart image is:
+--[ RSA 2048]----+
|  ..oo..         |
|.o +. o          |
|E o  .           |
|+ ..             |
|o+  . . S        |
|*  . o o         |
|.o  = . .        |
|     * .         |
|      +          |
+--[MD5]----------+
node2:~ # ssh-keygen -t dsa
Generating public/private dsa key pair.
Enter file in which to save the key (/root/.ssh/id_dsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/id_dsa.
Your public key has been saved in /root/.ssh/id_dsa.pub.
The key fingerprint is:
6a:c4:e1:cc:bb:c7:32:51:5c:96:49:46:24:df:86:ad [MD5] root@node2
The key's randomart image is:
+--[ DSA 1024]----+
|        .+=o     |
|         +=+     |
|      .. oo +    |
|     = .o  o     |
|      *.S E      |
|     ..o         |
|      +o         |
|     .o.o        |
|      .+         |
+--[MD5]----------+
node2:~ #

同步authorized_key

node1:~/.ssh # cat id_rsa.pub >>authorized_keys
node1:~/.ssh # cat id_dsa.pub >>authorized_keys
node1:~/.ssh # ssh node2 cat /root/.ssh/id_rsa.pub >> authorized_keys
The authenticity of host 'node2 (10.0.0.31)' can't be established.
ECDSA key fingerprint is b4:30:1b:97:e9:75:1e:e2:2c:85:91:2a:76:85:77:ce [MD5].
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added 'node2,10.0.0.31' (ECDSA) to the list of known hosts.
Password:
node1:~/.ssh # ssh node2 cat /root/.ssh/id_dsa.pub >> authorized_keys
Password:
node1:~/.ssh # scp authorized_keys node2:/root/.ssh/
Password:
authorized_keys                               100% 1984     1.9KB/s   00:00   
node1:~/.ssh #
测试
node1:~/.ssh # ssh node2 date
Sat May  9 05:40:58 CST 2015
node1:~/.ssh #
node2:~ # ssh node1 date
Sat May  9 05:41:03 CST 2015
node2:~ #



运维网声明 1、欢迎大家加入本站运维交流群:群②:261659950 群⑤:202807635 群⑦870801961 群⑧679858003
2、本站所有主题由该帖子作者发表,该帖子作者与运维网享有帖子相关版权
3、所有作品的著作权均归原作者享有,请您和我们一样尊重他人的著作权等合法权益。如果您对作品感到满意,请购买正版
4、禁止制作、复制、发布和传播具有反动、淫秽、色情、暴力、凶杀等内容的信息,一经发现立即删除。若您因此触犯法律,一切后果自负,我们对此不承担任何责任
5、所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其内容的准确性、可靠性、正当性、安全性、合法性等负责,亦不承担任何法律责任
6、所有作品仅供您个人学习、研究或欣赏,不得用于商业或者其他用途,否则,一切后果均由您自己承担,我们对此不承担任何法律责任
7、如涉及侵犯版权等问题,请您及时通知我们,我们将立即采取措施予以解决
8、联系人Email:admin@iyunv.com 网址:www.yunweiku.com

所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其承担任何法律责任,如涉及侵犯版权等问题,请您及时通知我们,我们将立即处理,联系人Email:kefu@iyunv.com,QQ:1061981298 本贴地址:https://www.yunweiku.com/thread-75398-1-1.html 上篇帖子: redhat忘记root密码解决方法 下篇帖子: linux的定时计划任务Crontab Linux 密码
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

扫码加入运维网微信交流群X

扫码加入运维网微信交流群

扫描二维码加入运维网微信交流群,最新一手资源尽在官方微信交流群!快快加入我们吧...

扫描微信二维码查看详情

客服E-mail:kefu@iyunv.com 客服QQ:1061981298


QQ群⑦:运维网交流群⑦ QQ群⑧:运维网交流群⑧ k8s群:运维网kubernetes交流群


提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;本站内容均来自个人观点与网络等信息,非本站认同之观点.


本站大部分资源是网友从网上搜集分享而来,其版权均归原作者及其网站所有,我们尊重他人的合法权益,如有内容侵犯您的合法权益,请及时与我们联系进行核实删除!



合作伙伴: 青云cloud

快速回复 返回顶部 返回列表