1、SSH密碼驗證
配置SSH服務器以從遠程服務器
[1] 使用最小化安裝centos,默認情況下一句安裝OpenSSH,因此不需要安裝新軟件包,你可以使用默認密碼身份驗證登錄系統,默認情況下,root用戶賬號是允許登錄,最好修改設置,禁用root賬號遠程登錄。
[root@sshserver ~]# vi /etc/ssh/sshd_config
PermitRootLogin yes 修改為 PermitRootLogin no
[root@sshserver ~]# systemctl restart sshd
[2] 如果Firewalld正在運行,請允許SSH服務。SSH使用[22 / TCP]。
[root@sshserver ~]# firewall-cmd --add-service=ssh --permanent
success
[root@sshserver ~]# firewall-cmd --reload
success
SSH客戶端:CentOS
[3] 安裝SSH客戶端。
[root@sshclient ~]# dnf -y install openssh-clients
[4] 使用任何普通用戶連接到SSH服務器。
#ssh [用戶名@(主機名或IP地址)]
[root@sshclient ~]# ssh tdops@192.168.6.58
The authenticity of host '192.168.6.58 (192.168.6.58)' can't be established.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added '192.168.6.58' (ECDSA) to the list of known hosts.
tdops@192.168.6.58's password:
.=""=.
/ _ _ \
| d b |
\ /\ /
,/'-=\/=-'\,
/ / \ \
| / \ |
\/ \ / \/
'. .'
_|`~~`|_
/|\ /|\
Web console: https://lianglab:9090/ or https://192.168.6.58:9090/
Last login: Fri Dec 4 22:58:30 2020 from 10.57.237.13
[tdops@sshserver ~]$
[5] 可以使用SSH在遠程主機上執行命令,如下所示。
[root@sshclient ~]# ssh tdops@192.168.6.58 "hostname"
tdops@192.168.6.58's password:
sshserver
[root@sshclient ~]#
2、SSH文件傳輸(CentOS與Windows)
通過ssh傳輸文件
[1] 使用SCP的實例
#命令⇒scp [選項]源目標
#將本地主機上的[test.txt]復制到遠程主機[sshserver]
[root@sshclient ~]# rm -rf test.txt
[root@sshclient ~]# touch test.txt
[root@sshclient ~]# echo "sshclient test file" > test.txt
[root@sshclient ~]# scp test.txt tdops@192.168.6.58:/tmp
tdops@192.168.6.58's password:
test.txt 100% 20 16.9KB/s 00:00
[root@sshclient ~]# ssh tdops@192.168.6.58
tdops@192.168.6.58's password:
Last login: Fri Dec 4 23:17:41 2020 from 192.168.6.149
[tdops@sshserver ~]$ cat /tmp/test.txt
sshclient test file
[tdops@sshserver ~]$
#將遠程主機[sshserver]上的[/home/tdops/test01.txt]復制到本地主機
[tdops@sshserver ~]$ touch test01.txt
[tdops@sshserver ~]$ echo "sshserver test01 file" > test01.txt
[tdops@sshserver ~]$ exit
logout
Connection to 192.168.6.58 closed.
[root@sshclient ~]# scp tdops@192.168.6.58:/home/tdops/test01.txt ./
tdops@192.168.6.58's password:
test01.txt 100% 22 18.1KB/s 00:00
[root@sshclient ~]# cat test01.txt
sshserver test01 file
[root@sshclient ~]#
[2] 這是使用SFTP(SSH文件傳輸協議)的示例。SFTP服務器功能默認情況下處於啟用狀態,但如果未啟用,則使其在[/ etc / ssh / sshd_config]中添加[Subsystem sftp / usr / libexec / openssh / sftp-server]行。
#sftp [選項] [用戶@主機]
[root@sshclient ~]# sftp tdops@192.168.6.58
tdops@192.168.6.58's password:
Connected to tdops@192.168.6.58.
sftp> ls
test01.txt
#顯示遠程主機上的當前目錄
sftp> pwd
Remote working directory: /home/tdops
#顯示本地主機上的當前目錄
sftp> !pwd
/root
sftp>
#顯示遠程主機上當前目錄中的文件
sftp> ls -l
-rw-r--r-- 1 tdops users 22 Dec 5 12:44 test01.txt
#顯示本地主機上當前目錄中的文件
sftp> !ls -l
total 24
-rw-------. 1 root root 1327 Sep 27 16:24 anaconda-ks.cfg
-rw-r--r--. 1 root root 1437 Sep 27 16:38 initial-setup-ks.cfg
-rw-r--r--. 1 root root 4391 Dec 4 10:18 lianglab.ovpn
-rw-r--r--. 1 root root 22 Dec 5 12:45 test01.txt
-rw-r--r--. 1 root root 20 Dec 5 12:42 test.txt
sftp> ls
dir test01.txt
#更改目錄
sftp> cd dir/
sftp> pwd
Remote working directory: /home/tdops/dir
sftp> put t
test.txt test01.txt
#將文件上傳到遠程主機
sftp> put test.txt
Uploading test.txt to /home/tdops/dir/test.txt
test.txt 100% 20 24.7KB/s 00:00
sftp> ls
test.txt
#將一些文件上傳到遠程主機
sftp> put *.txt
Uploading test.txt to /home/tdops/dir/test.txt
test.txt 100% 20 25.5KB/s 00:00
Uploading test01.txt to /home/tdops/dir/test01.txt
test01.txt 100% 22 32.2KB/s 00:00
sftp> ls
test.txt test01.txt
# 使用cd.. 切換到上一級目錄
sftp> cd ..
sftp> ls
dir getfile.txt sshserver.txt test01.txt
#從遠程主機下載文件
sftp> get getfile.txt
Fetching /home/tdops/getfile.txt to getfile.txt
#從遠程主機下載一些文件
sftp> get *.txt
Fetching /home/tdops/getfile.txt to getfile.txt
Fetching /home/tdops/sshserver.txt to sshserver.txt
Fetching /home/tdops/test01.txt to test01.txt
/home/tdops/test01.txt 100% 22 17.1KB/s 00:00
sftp> ls
dir getfile.txt sshserver.txt test01.txt
#查看已經下載到本機的文件
sftp> !ls
anaconda-ks.cfg getfile.txt initial-setup-ks.cfg lianglab.ovpn sshserver.txt test01.txt test.txt
sftp>
#在遠程主機上創建目錄
sftp> mkdir testdir
sftp> cd t
test01.txt testdir/
sftp> cd testdir/
sftp> put *.txt
Uploading test.txt to /home/tdops/testdir/test.txt
test.txt 100% 20 24.1KB/s 00:00
Uploading test01.txt to /home/tdops/testdir/test01.txt
test01.txt 100% 22 35.1KB/s 00:00
sftp> ls
test.txt test01.txt
sftp> ls -l
-rw-r--r-- 1 tdops users 20 Dec 5 12:48 test.txt
-rw-r--r-- 1 tdops users 22 Dec 5 12:48 test01.txt
sftp> cd ..
sftp> ls
dir test01.txt testdir
#刪除遠程主機上的文件
sftp> rmdir testdir/
Couldn't remove directory: Failure #刪除時有錯誤,說明目錄有文件
sftp> rmdir testdir
Couldn't remove directory: Failure
sftp> ls
dir test01.txt testdir
#進入我們要刪除的testdir目錄,並刪除里面的txt文件
sftp> cd testdir/
sftp> ls
test.txt test01.txt
sftp> rm t
test.txt test01.txt
#刪除 test.txt和test01.txt文件
sftp> rm test.txt
Removing /home/tdops/testdir/test.txt
sftp> rm test01.txt
Removing /home/tdops/testdir/test01.txt
sftp> cd ..
sftp> ls
dir test01.txt testdir
#在刪除testdir目錄
sftp> rmdir testdir/
sftp> ls -l
drwxr-xr-x 2 tdops users 40 Dec 5 12:48 dir
-rw-r--r-- 1 tdops users 22 Dec 5 12:44 test01.txt
#用![command]執行命令
sftp> !cat /etc/passwd
root:x:0:0:root:/root:/bin/bash
bin:x:1:1:bin:/bin:/sbin/nologin
daemon:x:2:2:daemon:/sbin:/sbin/nologin
adm:x:3:4:adm:/var/adm:/sbin/nologin
3、SSH密鑰對驗證
OpenSSH:SSH密鑰對認證2019/09/30
配置SSH服務器以使用密鑰對身份驗證登錄。
為客戶端創建一個私鑰,為服務器創建一個公鑰。
[1] 由每個用戶創建密鑰對,因此在SSH服務器主機上以普通用戶身份登錄並按如下方式工作。
[tdops@sshserver ~]$ ssh-keygen
Generating public/private rsa key pair.
Enter file in which to save the key (/home/tdops/.ssh/id_rsa):
Enter passphrase (empty for no passphrase): ##輸入密碼 liang123
Enter same passphrase again:
Your identification has been saved in /home/tdops/.ssh/id_rsa.
Your public key has been saved in /home/tdops/.ssh/id_rsa.pub.
The key fingerprint is:
SHA256:dGhKkO7u9OKhG2TPvxf3BCfziD81fh/r/alPiu2qsNY tdops@sshserver
The key's randomart image is:
+---[RSA 3072]----+
| .. |
| .. . |
| . . + . |
| .. + .+ . |
| o. . S. B |
| o o. o o = |
| ..= ..+ = . o |
| +o+ .+Eo = + =|
| o+o.=+ ..+o*+*=|
+----[SHA256]-----+
[tdops@sshserver ~]$ ll ~/.ssh
total 12
-rw-------. 1 tdops users 2655 Dec 5 13:34 id_rsa
-rw-r--r--. 1 tdops users 569 Dec 5 13:34 id_rsa.pub
-rw-r--r--. 1 tdops users 692 Oct 20 10:04 known_hosts
[tdops@sshserver ~]$ cp ~/.ssh/id_rsa.pub ~/.ssh/authorized_keys
[tdops@sshserver ~]$
[tdops@sshserver ~]$
[2] 將在服務器上創建的私鑰轉移到客戶端,然后可以使用Key-Pair身份驗證登錄。
[tdops@sshclient ~]$ cd ~
[tdops@sshclient ~]$ ls
[tdops@sshclient ~]$ mkdir ~/.ssh
[tdops@sshclient ~]$ chmod 700 ~/.ssh
[tdops@sshclient ~]$ scp tdops@192.168.6.58:/home/tdops/.ssh/id_r* .ssh/
The authenticity of host '192.168.6.58 (192.168.6.58)' can't be established.
ECDSA key fingerprint is SHA256:oqQ+6i8P+QVs1UD7KlWGRTbavvD9P3BPWtWCdHyQtBY.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added '192.168.6.58' (ECDSA) to the list of known hosts.
tdops@192.168.6.58's password:
id_rsa 100% 2655 1.9MB/s 00:00
id_rsa.pub 100% 569 543.6KB/s 00:00
[tdops@sshclient ~]$ ssh tdops@192.168.6.58
Enter passphrase for key '/home/tdops/.ssh/id_rsa': ##輸入密碼 liang123
Web console: https://lianglab:9090/ or https://192.168.6.58:9090/
Last login: Sat Dec 5 12:47:03 2020
[tdops@sshserver ~]$ exit
logout
[3] 如果設置[PasswordAuthentication no],則更加安全。
[root@sshserver ~]# vi /etc/ssh/sshd_config
# line 73: change to [no]
PasswordAuthentication no
[root@sshserver ~]# systemctl restart sshd
[4] 運行[Putty]中包含的[Puttygen.exe]。(也放置在[Putty.exe]文件夾中)。
如果不包括在內,請從官方網站(www.chiark.greenend.org.uk/~sgtatham/putty/)下載。
啟動[Puttygen.exe]后,在以下窗口中單擊[加載]按鈕。
ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAmV8IIRNWKiOA3xmH+harMU9M9244ryNKNUqC1tkinBTP2HiTdfgs7Jty14UJ011g3WtfGkU98acmumpH6DK0inM662fG+PpYeHgENCzgavUQ8WQuS8026yLhmghzsRQ7AnMeAIFsMmHdeUNzXkGknlUGTw3SwHihQlC7+pJZsa05mN8UNoDmE/yr4SWqYOe6MO+VLHUgpDRfvEpuBwS6KahdXeW/LM1l8PnC8gHMbAG1kc1W8IDvrZRHHFSBd1tbtPbt4DBNmn62zsn0uGHPNmqr0+oEJztNgJoqCisjDCLARL8KOmb3Glj+7cLR5s1z3rBDWbvN/1CJm4XysrTN+Q== rsa-key-20201205
Windows主機中生產的key添加到我們要登錄的centos主機上
[tdops@sshserver .ssh]$ cat /home/tdops/.ssh/authorized_keys
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQCgzX4uLLO2Pq40Qn+it+leDtICiJHAf3jZr1NHuXaMs3QDA7kRDPzcL/YyTbrIOf2Y1QR/peEnJjChNQ7VfCD200Yq3LR0XsFVSqUzAwe+S7f3PhqJG5auI5w9iiuS2o2Eywk2PIV7CCSAHxszyMrsmxNwip/SkbdAg5w/ZVR+q6Uxj6h+vVsAqndsr94TI4xK97pVW2b3p3EFMogrrRDdtE4HfIA3Kkis5YHLauEjbgynCW3NrIMD3HHEN9mkgGl4V+GDQ1CbTFBc5B0fen41dGwJxpepGLH/9iRU8lfF3ZIwdasw0qdPFykRplPFF/pGKCsLTBOdiwqYskXeLKJIMVy8PHAEqKsMGdGP3E2hW2aflqKAnWh4Q7yYssB4ZLEbq+2sHC6HYL/VDaROHGsR6ShYgUcm8TqC0OjiGGzKH2OnF4W5VUkhLRNMEXmqIoA56HSJOZTKZgsxBQ5Gu7OH9Rrm1WJ5bLd5Pw5g/ijWpU6xrSEkBfuk61JargAAAX8= tdops@sshserver
ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAmV8IIRNWKiOA3xmH+harMU9M9244ryNKNUqC1tkinBTP2HiTdfgs7Jty14UJ011g3WtfGkU98acmumpH6DK0inM662fG+PpYeHgENCzgavUQ8WQuS8026yLhmghzsRQ7AnMeAIFsMmHdeUNzXkGknlUGTw3SwHihQlC7+pJZsa05mN8UNoDmE/yr4SWqYOe6MO+VLHUgpDRfvEpuBwS6KahdXeW/LM1l8PnC8gHMbAG1kc1W8IDvrZRHHFSBd1tbtPbt4DBNmn62zsn0uGHPNmqr0+oEJztNgJoqCisjDCLARL8KOmb3Glj+7cLR5s1z3rBDWbvN/1CJm4XysrTN+Q== rsa-key-20201205
[tdops@sshserver .ssh]$
4、SFTP服務器+Chroot配置
僅配置SFTP + Chroot。
應用了此設置的某些用戶只能使用SFTP和chroot目錄進行訪問。
[1] SFTP創建一個組
# groupadd sftp
創建一個sftp用戶test並加入到穿件sftp組中,同時修改test用戶的密碼
# useradd -g sftp -s /bin/false test
-g 加入到sftp組
-s 禁止使用命令
# passwd test #密碼liang123
[2] 新建/opt/sftp目錄,並將它指定為test組用戶的home目錄
[root@sshserver ~]# mkdir -p /opt/sftp
[root@sshserver ~]# usermod -d /opt/sftp test
編輯/etc/ssh/sshd_config
[root@sshserver ~]# vi /etc/ssh/sshd_config
將如下這行用#符號注釋掉
#Subsystem sftp /usr/libexec/openssh/sftp-server
並在文后添加如下幾行內容然后保存
Subsystem sftp internal-sftp
Match Group sftp
ChrootDirectory /opt/sftp
ForceCommand internal-sftp
AllowTcpForwarding no
X11Forwarding no
ChrootDirectory 指定登錄后的根目錄,並且將用戶限制在該目錄及其子目錄下。
這里有條規則
1、由 ChrootDirectory 指定的目錄開始一直往上到系統根目錄為止的目錄擁有者都只能是 root
2、由 ChrootDirectory 指定的目錄開始一直往上到系統根目錄為止都不可以具有群組寫入權限(最大權限 755)
ChrootDirectory設置的目錄權限及其所有的上級文件夾權限,屬主和屬組必須是root;
ChrootDirectory設置的目錄權限及其所有的上級文件夾權限,只有屬主能擁有寫權限,也就是說權限最大設置只能是755。
[3] 設置Chroot目錄權限
[root@sshserver ~]# chown root:sftp /opt/sftp/
[root@sshserver ~]# chmod 755 /opt/sftp/
[4] 創建一個目錄 sftp用戶上傳目錄
mkdir /opt/sftp/upload
chown test:sftp /opt/sftp/upload/
chmod 755 /opt/sftp/upload/
[5] 重啟SSH服務
#systemctl restart sshd.service
[tdops@sshclient ~]$ sftp test@192.168.6.58
test@192.168.6.58's password:
Connected to test@192.168.6.58.
sftp> pwd
Remote working directory: /
sftp> ls
upload
sftp> cd upload/
sftp> ls
sftp> pwd
Remote working directory: /upload
sftp> !dir
sftp> !ls
sftp>
5、Sftp服務器部署案例
#1、創建sftp組
groupadd sftpadmin
#2、創建一個用戶sftpadmin
useradd -g sftpadmin -s /bin/false sftpadmin
#3、設置sftpadmin用戶的密碼
passwd sftpadmin ## 例如BhYzk4MDAwNG
#4、創建一個sftp的上傳目錄
mkdir /data/sftp
#5、修改用戶sftpadmin所在的目錄
usermod -d /data/sftp sftpadmin
#6、設定Chroot目錄權限
chown -R root:sftpadmin /data/sftp
chmod 755 /data/sftp/
#7、關閉SElinux
vi /etc/sysconfig/selinux
#找到如下這行
SELINUX=enforcing
#修改為
SELINUX=permissive或者SELINUX=disabled
#保存退出
#8、編輯sshd配置文件並重啟ssh服務
root@sec-p-050056 src]# cat /etc/ssh/sshd_config
#HostKey /etc/ssh/ssh_host_rsa_key
#HostKey /etc/ssh/ssh_host_ecdsa_key
#HostKey /etc/ssh/ssh_host_ed25519_key
SyslogFacility AUTHPRIV
AuthorizedKeysFile .ssh/authorized_keys
PasswordAuthentication yes
ChallengeResponseAuthentication no
#GSSAPIAuthentication yes
GSSAPICleanupCredentials no
UsePAM yes
X11Forwarding yes
#UsePrivilegeSeparation sandbox # Default for new installations.
AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
AcceptEnv LC_IDENTIFICATION LC_ALL LANGUAGE
AcceptEnv XMODIFIERS
LogLevel VERBOSE
#Subsystem sftp internal-sftp
#Match Group sftpadmin
# AllowTcpForwarding no
# ForceCommand internal-sftp
# ChrootDirectory %h
Subsystem sftp internal-sftp -l INFO -f LOCAL6
# add Below lines at the end of file
Match Group sftpadmin
#ChrootDirectory /home/sftp
X11Forwarding no
AllowTcpForwarding no
ChrootDirectory /data/sftp/%u
ForceCommand internal-sftp -f LOCAL6 -l INFO
#Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,cast128-cbc,aes192-cbc,aes256-cbc
systemctl restart sshd
systemctl status sshd
#9、創建存放sftp賬號目錄和文件
mkdir -p /usr/local/src/users
touch /usr/local/src/users/user.txt
#10、創建自動添加sftp賬號腳本並設置執行權限
#!/bin/bash
. /etc/init.d/functions
Path=/usr/local/src/users
Passwd=`echo $(date +%t%N)$RANDOM|md5sum|cut -c 2-12`
UserDb=$Path/user.txt
if [ -z "$1" ];then
echo "Please enter your user name: vip001"
echo "Example: sh add_sftp_uesr.sh vip001"
exit
fi
useradd -d /data/sftp/$1 -G sftpadmin -s /bin/false $1
chmod -R 755 /data/sftp/$1
chown root:sftpadmin /data/sftp/$1
mkdir /data/sftp/$1/file
chown -R root:root /data/sftp/$1/file
chmod 777 /data/sftp/$1/file
echo "$Passwd"|passwd --stdin $1 >&/dev/null
echo "User Create complete $1"
echo "Pass Create complete $Passwd"
echo -e "user:\t$1pass:$Passwd" >>$UserDb
chmod 755 /usr/local/src/add_sftp_user.sh
6、一鍵部署sftp服務環境腳本
#############################一鍵部署sftp服務環境腳本################################
#!/bin/bash
#sftp server auto scripts
#linglab 2018-10-25
groupadd sftpadmin
useradd -g sftpadmin -s /bin/false sftpadmin
mkdir /data/sftp -p
usermod -d /data/sftp sftpadmin
chown -R root:sftpadmin /data/sftp
chmod 755 /data/sftp/
echo " ">/etc/ssh/sshd_config
cat >>/etc/ssh/sshd_config<<EOF
#HostKey /etc/ssh/ssh_host_rsa_key
#HostKey /etc/ssh/ssh_host_ecdsa_key
#HostKey /etc/ssh/ssh_host_ed25519_key
SyslogFacility AUTHPRIV
AuthorizedKeysFile .ssh/authorized_keys
PasswordAuthentication yes
ChallengeResponseAuthentication no
#GSSAPIAuthentication yes
GSSAPICleanupCredentials no
UsePAM yes
X11Forwarding yes
#UsePrivilegeSeparation sandbox # Default for new installations.
AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
AcceptEnv LC_IDENTIFICATION LC_ALL LANGUAGE
AcceptEnv XMODIFIERS
LogLevel VERBOSE
#Subsystem sftp internal-sftp
#Match Group sftpadmin
# AllowTcpForwarding no
# ForceCommand internal-sftp
# ChrootDirectory %h
Subsystem sftp internal-sftp -l INFO -f LOCAL6
# add Below lines at the end of file
Match Group sftpadmin
#ChrootDirectory /home/sftp
X11Forwarding no
AllowTcpForwarding no
ChrootDirectory /data/sftp/%u
ForceCommand internal-sftp -f LOCAL6 -l INFO
#Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,cast128-cbc,aes192-cbc,aes256-cbc
EOF
mkdir -p /usr/local/src/users
touch /usr/local/src/users/user.txt
echo -n '#!/bin/bash
. /etc/init.d/functions
Path=/usr/local/src/users
Passwd=`echo $(date +%t%N)$RANDOM|md5sum|cut -c 2-12`
UserDb=$Path/user.txt
if [ -z "$1" ];then
echo "Please enter your user name: vip001"
echo "Example: sh add_sftp_uesr.sh vip001"
exit
fi
useradd -d /data/sftp/$1 -G sftpadmin -s /bin/false $1
chmod -R 755 /data/sftp/$1
chown root:sftpadmin /data/sftp/$1
mkdir /data/sftp/$1/file
chown -R root:root /data/sftp/$1/file
chmod 777 /data/sftp/$1/file
echo "$Passwd"|passwd --stdin $1 >&/dev/null
echo "User Create complete $1"
echo "Pass Create complete $Passwd"
echo -e "user:\t$1pass:$Passwd" >>$UserDb' > /usr/local/src/add_sftp_user.sh
chmod 755 /usr/local/src/add_sftp_user.sh
systemctl restart sshd
systemctl status sshd
7、使用SSHpass
使用SSHPass在密碼驗證時自動輸入密碼。
這很方便,但存在安全隱患(密碼泄漏),如果使用,請格外小心。
[1] 安裝sshpass命令
# install from EPEL
[root@sshclient ~]# dnf --enablerepo=epel -y install sshpass
[2] 使用 sshpass
# 使用-p參數指定登錄密碼
[root@sshclient ~]# sshpass -p tdops密碼 ssh tdops@192.168.6.58 hostname
sshserver
[root@sshclient ~]#
# [-f file] : from file
[root@sshclient ~]# echo 'tdops密碼' > sshpass.txt
[root@sshclient ~]# chmod 600 sshpass.txt
[root@sshclient ~]# sshpass -f sshpass.txt ssh tdops@192.168.6.58 hostname
sshserver
# [-e] : from environment variable
[root@sshclient ~]# export SSHPASS=tdops密碼
[root@sshclient ~]# sshpass -e ssh tdops@192.168.6.58 hostname
sshserver
[root@sshclient ~]#
# 通過scp上傳文件
[root@sshclient ~]# sshpass -p tdops密碼 scp local_file tdops@192.168.6.58:remote_file
# 通過scp下載文件
[root@sshclient ~]# sshpass -p tdops密碼 scp tdops@192.168.6.58:remote_file local_file
廣告時間:
- 關於我 :全國7*24高效代維服務
- 微信:lianglab
- QQ:867266199
- 淘寶店:全國7*24高效代維服務
- 全國高效代維:為中小型企業,提供雲計算咨詢代維、架構設計、降低成本。