Preface I believe that some people, including me, once thought that What is ssh ssh is a What is ssh used for? SSH strengthens remote applications. It replaces traditional remote protocols such as FTP, POP and Telnet. These protocols are inherently unsafe. They transmit data in plain text and are easily stolen by middlemen. The SSH protocol can solve these problems. It adds a layer of encryption protection to the data during remote transmission, making it difficult for attackers to crack it. This is why protocols such as How to use ssh Personally, I prefer to call it 1. Password login The command is as follows // Format ssh user@host // Example ssh [email protected] After entering the above command, ssh will prompt you to enter the remote server password. After entering the correct password, you can log in to the remote server and start interacting. In addition, since the server password needs to be entered every time the password is logged in, the second method is basically used: public key login.
2. Public Key Login The function of public key login is the so-called 1. If you have a public key, you must have a private key. They are a pair, also called secret keys. By default, they are placed in ssh-keygen -t rsa -C "your email" The generation process will prompt you to enter a password. This password can provide an additional layer of protection to prevent your key from being stolen by others. If you do not need this password, you can press Enter all the way. Enter passphrase (empty for no passphrase): After that, two files will be automatically generated in ~/.ssh: 2. Submit the private key ssh-agent ~/.ssh/id_rsa
eval `ssh-agent` 3. Upload the content of Upload method 1: Using the ssh-copy-id tool ssh-copy-id -i id_rsa user@host Upload method 2: Manual command upload $ cat ~/.ssh/id_rsa.pub | ssh user@host "mkdir -p ~/.ssh && cat >> ~/.ssh/authorized_keys" In the above command, just replace ssh re-correction ssh is not specifically used to implement password-free login, that is just the tip of the iceberg. ssh is more used for remote operations. ssh interacts with the remote server according to the commands it provides. During this interaction, it will help you encrypt the transmission. This is Well, that’s all for now. If you have any questions, please leave a message below. SummarizeThis is the end of this article about what is ssh? How to use? What are the misunderstandings? This is the end of the article. For more relevant ssh misunderstandings, please search 123WORDPRESS.COM’s previous articles or continue to browse the following related articles. I hope everyone will support 123WORDPRESS.COM in the future! You may also be interested in:
|
<<: How to use .htaccess to prohibit a certain IP from accessing the website
Overview As for the current default network of Do...
Installation environment: CentOS7 64-bit MINI ver...
Table of contents 1. Environmental Preparation 2....
A dynamic clock demo based on Canvas is provided ...
Preface: As far as I know, currently CSS can only...
This article example shares the specific code for...
Copy code The code is as follows: <hr style=&q...
For example, when you create a new table or updat...
The <base> tag specifies the default address...
This article example shares the specific code of ...
Table of contents Install Docker on CentOS 8 1. U...
Each time tomcat is started, the following log fi...
I didn't use MySQL very often before, and I w...
Table of contents When to use Structural branches...
Back in the Kernel 2.6 era, a new security system...