服务器之家:专注于VPS、云服务器配置技术及软件下载分享
分类导航

Linux|Centos|Ubuntu|系统进程|Fedora|注册表|Bios|Solaris|Windows7|Windows10|Windows11|windows server|

服务器之家 - 服务器系统 - Centos - centos6.5配置ssh免秘钥登陆执行pssh命令的讲解

centos6.5配置ssh免秘钥登陆执行pssh命令的讲解

2022-08-16 08:00zsx0728 Centos

今天小编就为大家分享一篇关于centos6.5配置ssh免秘钥登陆执行pssh命令的讲解,小编觉得内容挺不错的,现在分享给大家,具有很好的参考价值,需要的朋友一起跟随小编来看看吧

1.检查并安装pssh,yum list pssh

2.因为没有配置免秘钥登陆,pssh命令执行失败。

?
1
2
3
4
5
6
[root@bogon ]# pssh -H root@192.168.245.129 -i uptime
[1] 11:00:36 [FAILURE] root@192.168.245.129 Exited with error code 255
Stderr: The authenticity of host '192.168.245.129 (192.168.245.129)' can't be established.
RSA key fingerprint is 84:2d:70:33:1c:45:fa:e6:4b:94:72:7e:10:98:7c:a8.
Are you sure you want to continue connecting (yes/no)?
Host key verification failed.

3.生成秘钥。

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
[root@bogon tmp]# ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/root/.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/id_rsa.
Your public key has been saved in /root/.ssh/id_rsa.pub.
The key fingerprint is:
9e:14:9a:cc:8d:9b:fd:51:c5:68:24:e1:ce:c6:d7:33 root@bogon
The key's randomart image is:
+--[ RSA 2048]----+
|     o..  |
|     . o o  |
|    . . o o |
|   o = = . o  |
|   * S = o E |
|    * o o  o |
|   o + .   |
|     . .   |
|     .   |
+-----------------+
?
1
2
3
4
[root@bogon .ssh]# ll
total 8
-rw------- 1 root root 1675 Aug 22 11:06 id_rsa
-rw-r--r-- 1 root root 392 Aug 22 11:06 id_rsa.pub

4.拷贝到被管对象。

?
1
2
3
4
5
6
7
8
9
10
[root@bogon .ssh]# ssh-copy-id -i /root/.ssh/id_rsa.pub root@192.168.245.129
The authenticity of host '192.168.245.129 (192.168.245.129)' can't be established.
RSA key fingerprint is 84:2d:70:33:1c:45:fa:e6:4b:94:72:7e:10:98:7c:a8.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.245.129' (RSA) to the list of known hosts.
reverse mapping checking getaddrinfo for bogon [192.168.245.129] failed - POSSIBLE BREAK-IN ATTEMPT!
root@192.168.245.129's password:
Now try logging into the machine, with "ssh 'root@192.168.245.129'", and check in:
 .ssh/authorized_keys
to make sure we haven't added extra keys that you weren't expecting.

5.pssh命令执行成功。

?
1
2
3
[root@bogon .ssh]# pssh -H root@192.168.245.129 -i uptime
[1] 11:10:39 [SUCCESS] <a href="mailto:root@192.168.245.129" rel="external nofollow">root@192.168.245.129
</a> 20:10:39 up 2:07, 1 user, load average: 0.00, 0.00, 0.00

总结

以上就是这篇文章的全部内容了,希望本文的内容对大家的学习或者工作具有一定的参考学习价值,谢谢大家对服务器之家的支持。如果你想了解更多相关内容请查看下面相关链接

原文链接:https://blog.csdn.net/zsx0728/article/details/81940736

延伸 · 阅读

精彩推荐