Preface I believe that some people, including me, once thought that What is ssh ssh is a What is ssh used for? SSH strengthens remote applications. It replaces traditional remote protocols such as FTP, POP and Telnet. These protocols are inherently unsafe. They transmit data in plain text and are easily stolen by middlemen. The SSH protocol can solve these problems. It adds a layer of encryption protection to the data during remote transmission, making it difficult for attackers to crack it. This is why protocols such as How to use ssh Personally, I prefer to call it 1. Password login The command is as follows // Format ssh user@host // Example ssh [email protected] After entering the above command, ssh will prompt you to enter the remote server password. After entering the correct password, you can log in to the remote server and start interacting. In addition, since the server password needs to be entered every time the password is logged in, the second method is basically used: public key login.
2. Public Key Login The function of public key login is the so-called 1. If you have a public key, you must have a private key. They are a pair, also called secret keys. By default, they are placed in ssh-keygen -t rsa -C "your email" The generation process will prompt you to enter a password. This password can provide an additional layer of protection to prevent your key from being stolen by others. If you do not need this password, you can press Enter all the way. Enter passphrase (empty for no passphrase): After that, two files will be automatically generated in ~/.ssh: 2. Submit the private key ssh-agent ~/.ssh/id_rsa
eval `ssh-agent` 3. Upload the content of Upload method 1: Using the ssh-copy-id tool ssh-copy-id -i id_rsa user@host Upload method 2: Manual command upload $ cat ~/.ssh/id_rsa.pub | ssh user@host "mkdir -p ~/.ssh && cat >> ~/.ssh/authorized_keys" In the above command, just replace ssh re-correction ssh is not specifically used to implement password-free login, that is just the tip of the iceberg. ssh is more used for remote operations. ssh interacts with the remote server according to the commands it provides. During this interaction, it will help you encrypt the transmission. This is Well, that’s all for now. If you have any questions, please leave a message below. SummarizeThis is the end of this article about what is ssh? How to use? What are the misunderstandings? This is the end of the article. For more relevant ssh misunderstandings, please search 123WORDPRESS.COM’s previous articles or continue to browse the following related articles. I hope everyone will support 123WORDPRESS.COM in the future! You may also be interested in:
|
<<: How to use .htaccess to prohibit a certain IP from accessing the website
It is provided in the form of WeChat components. ...
Optgroup is used in the select tag to make the dro...
This article shares the installation steps and us...
Password Mode PDO::__construct(): The server requ...
In MySQL, fields of char, varchar, and text types...
What to do if VmWare cannot access the Internet w...
Angularjs loop object properties to achieve dynam...
The 404 problem occurs in the Tomcat test. The pr...
Installation & Configuration The official web...
Table of contents docker system df docker system ...
In the previous chapters, we introduced how to ch...
Common points: The DIV tag and SPAN tag treat som...
Prerequisite: nginx needs to have the ngx_http_li...
Hexadecimal code table of various colors [Part 1] ...
The cut command in Linux and Unix is used to cu...