其他分享
首页 > 其他分享> > SSH远程管理服务实战

SSH远程管理服务实战

作者:互联网

SSH远程管理服务实战

目录

SSH基本概述

SSH是一个安全协议,在进行数据传输时,会对数据包进行加密处理,加密后在进行数据传输。确保了数

据传输安全。

SSH服务主要功能

1.提供远程连接服务器的服务

2.对传输的数据进行加密

ssh协议和telnet协议的区别

ssh服务会对传输数据进行加密, 监听在本地22/tcp端口, ssh服务默认支持roo用户登录

telnet服务不对数据进行加密, 监听在本地23/tcp端口, Telnet默认不支持root用户登录

ssh相关命令

ssh远程登录服务器命令

ssh root@10.0.0.41 -p 22

#root:指定用哪个用户连接(远端服务器的用户),当前用户是root就可以不加
#@:分隔符
#10.0.0.41:远端主机的IP
#-p:指定远端主机端口,ssh默认22可以省略

ssh root@172.16.1.31 'ifconfig'

在远端机器上执行命令,不用连接过去

[root@backup ~]$ ssh root@172.16.1.31 'ifconfig'
The authenticity of host '172.16.1.31 (172.16.1.31)' can't be established.
ECDSA key fingerprint is SHA256:3enksfMN5/ep92kZMkIEC39u/yyFXAX8gO9F83Lm1vE.
ECDSA key fingerprint is MD5:84:3b:b2:f2:ea:31:9f:96:b1:d8:45:2b:13:b7:62:eb.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '172.16.1.31' (ECDSA) to the list of known hosts.
root@172.16.1.31's password: 
eth1: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 172.16.1.31  netmask 255.255.255.0  broadcast 172.16.1.255
        inet6 fe80::20c:29ff:fea7:5d90  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:a7:5d:90  txqueuelen 1000  (Ethernet)
        RX packets 2110  bytes 128819 (125.7 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 1098  bytes 68693 (67.0 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

scp -rp /oldboy/ root@172.16.1.7:/opt

远程拷贝(全量)走的是ssh协议

[root@backup ~]$ scp -rp /oldboy/ root@172.16.1.7:/opt
The authenticity of host '172.16.1.7 (172.16.1.7)' can't be established.
ECDSA key fingerprint is SHA256:3enksfMN5/ep92kZMkIEC39u/yyFXAX8gO9F83Lm1vE.
ECDSA key fingerprint is MD5:84:3b:b2:f2:ea:31:9f:96:b1:d8:45:2b:13:b7:62:eb.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '172.16.1.7' (ECDSA) to the list of known hosts.
root@172.16.1.7's password: 
1.txt                                                                         100%    0     0.0KB/s 

[root@web01 ~]$ ll /opt/
total 0
drwxr-xr-x 2 root root 19 Jul  9 19:44 oldboy

SSH的验证方式

img

创建秘钥对 (公钥私钥)

公钥:管理机发给远程机

私钥:管理机用来打开远程机的锁(公钥)

#在管理机上生成公钥和私钥
[root@m01 ~]$ ssh-keygen

[root@m01 ~]$ ll .ssh/
total 12
-rw------- 1 root root 1679 Jul  9 10:49 id_rsa			#私钥(钥匙)
-rw-r--r-- 1 root root  390 Jul  9 10:49 id_rsa.pub		#公钥(锁)
-rw-r--r-- 1 root root  682 Jul  9 11:21 known_hosts	#第一次利用公钥连接远程机时会有交互(输入yes),输入后就会在这个文件中产生远程机ip信息,表示已经第一次连接就输入过了,以后再连接就不用再输入了
[root@m01 ~]$ cat .ssh/known_hosts 
10.0.0.41 ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBP2D5teBiqz8QsHoJgZhSjikWfNTj3Z/fsyb+OREmH+ZeNRncYYNvJeGgTOXss9s6tCAbTjGw+i/fQ1UBzhGPpc=
10.0.0.31 ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBP2D5teBiqz8QsHoJgZhSjikWfNTj3Z/fsyb+OREmH+ZeNRncYYNvJeGgTOXss9s6tCAbTjGw+i/fQ1UBzhGPpc=
10.0.0.7 ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBP2D5teBiqz8QsHoJgZhSjikWfNTj3Z/fsyb+OREmH+ZeNRncYYNvJeGgTOXss9s6tCAbTjGw+i/fQ1UBzhGPpc=
10.0.0.8 ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBP2D5teBiqz8QsHoJgZhSjikWfNTj3Z/fsyb+OREmH+ZeNRncYYNvJeGgTOXss9s6tCAbTjGw+i/fQ1UBzhGPpc=

#将公钥发送给被管理端 
[root@m01 ~]$  ssh-copy-id -i ~/.ssh/id_rsa.pub root@10.0.0.41

#被管理端的服务器公钥保存后 
[root@backup ~]$ ll .ssh/
total 8
-rw------- 1 root root 390 Jul  9 10:53 authorized_keys		#存放公钥的文件
-rw-r--r-- 1 root root 345 Jul  9 19:45 known_hosts

ssh-copy-id这个命令都帮我们做了哪些事

# 1.在被管理端创建了一个.ssh目录在家目录下
mkdir ~/.ssh

# 2.将.ssh目录权限修改为700
chmod 700 ~/.ssh

# 3.创建公钥存放的文件 
[root@backup ~]$ cat .ssh/authorized_keys
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCu8ecP9QulOO45n79fI2oDFW8VQsfvDTCZBnAJm9sqU97QhBwqHs7fCLs5bgIMh7OEwNXQVQqHBLO1gCQVbU5D1YWpR7xnL0+lOevpvk48D5JVO3KvHO86Cg4CNk7Yergf/DqMZf0WB9UtNNmiE+wrYdbbtbsKAvYQye4/MZ7IklZcWZ2l4lHikz3gJsxTdpTvDFZO/aBfKef5qoxpx9r9L6BB0cfwIueah/gUhsTacWdgApYSZgTsb05XxFxYTnfxeOkWSGjZ8lI4g27hrqhpobueU5lx7PU+QFd6PoKUgWYLSFGKt5SWrMVsPKMmr4WqhZL/OUEkIxB2Ro3pgigl root@m01

# 4.修改公钥存放文件的权限 
 chmod 600 ~/.ssh/authorized_keys

ssh优化

[root@m01 ~]$ vim /etc/ssh/sshd_config 
#端口
17 Port 22

#允许root登录 
38 #PermitRootLogin yes

#允许密码登录 
65 PasswordAuthentication yes

#GSS接口认证 
79 GSSAPIAuthentication no

#使用DNS的反向解析 
115 UseDNS no

重启ssh服务
[root@m01 ~]$ systemctl restart sshd

标签:实战,公钥,m01,SSH,远程管理,172.16,root,ssh
来源: https://www.cnblogs.com/blogwjbb/p/15113051.html