secureCRT通过public key进行SSH访问
(2009-09-08 22:34:40)
标签:
dsassh-keygen-tsecurtcrt杂谈 |
分类: UNIX安全 |
[root@vm ~]# pwd /root [root@vm ~]# ls .ssh ls: .ssh: No such file or directory |
[root@vm ~]# ssh-keygen -t dsa Generating public/private dsa key pair. Enter file in which to save the key (/root/.ssh/id_dsa): Created directory '/root/.ssh'. Enter passphrase (empty for no passphrase): 注意此处不要输口令,否则以后用key仍要用口令,太麻烦 Enter same passphrase again: Your identification has been saved in /root/.ssh/id_dsa. Your public key has been saved in /root/.ssh/id_dsa.pub. The key fingerprint is: e5:89:31:e3:e6:1d:bf:c7:73:0b:c3:dc:75:7e:38:b5 root@vm.otas.cn [root@vm ~]# ls .ssh id_dsa |
只把public key 生成为authorized_keys2 [root@vm ~]# cd .ssh [root@vm .ssh]# cat id_dsa.pub >> authorized_keys2 [root@vm .ssh]# ls authorized_keys2 |
把双key(id_dsa |
从PC端设secureCRT 选SSH username为root authentication/primary,选publickey 点primary 后的properties,进入属性界面 选use identity file 选择id_dsa.pub的路径 注意:PC路径下必须两个key都存在,不能只有一个id_dsa.pub ,还要有一个id_dsa,尽管好象securtCRT没用到它 |
测试连接 应该一次过,不需要输入密码 |
[root@vm .ssh]# ls authorized_keys2 rm: remove regular file `id_dsa'? y rm: remove regular file `id_dsa.pub'? y [root@vm .ssh]# ls authorized_keys2 |
再测试,仍不需要输入密码直接登录 |
-
发起连接的一方(ssh client),放置双key(id_dsa id_dsa.pub), 以public key发起连接 -
接受连接的一方(sshd server),只放置public key(authorized_keys2)
如果一台机器没装openssl,无法生成key,也不要紧,可以从别的linux上生成好了”key对”,然后把“key对”存在pc上,把public key传到没装openssl的机器上,然后cat id_dsa.pub >> authorized_keys2即可
>>是追加。
前一篇:加密和安全