#在用户目录创建SSH连接的公钥、私钥,其中公钥稍后上传到远程机器
[root@localhost root]# ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/root/.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/id_rsa.
Your public key has been saved in /root/.ssh/id_rsa.pub.
The key fingerprint is:
9f:eb:8c:2e:14:fd:b1:40:c5:f4:0f:55:bf:fc:3b:63 root@localhost.localdomain
#查看创建的公钥、私钥文件
[root@localhost root]# cd .ssh/
[root@localhost .ssh]# ls
id_rsa id_rsa.pub known_hosts
[root@localhost .ssh]# ll
总用量 12
-rw------- 1 root root 883 7月 12 16:49 id_rsa
-rw-r--r-- 1 root root 236 7月 12 16:49 id_rsa.pub
-rw-r--r-- 1 root root 224 7月 12 16:32 known_hosts
#远程机器建立文件
[root@localhost .ssh]# pwd
/root/.ssh
#远程机器没有文件authorized_keys,则创建,用来保存本地连接远程机器的公钥。
[root@localhost .ssh]# touch authorized_keys
#把本地公钥复制到远程机器,在还没建立SSH公钥/私钥连接前,需要输入密码建立连接。
[root@localhost .ssh]# scp -P 32200 id_rsa.pub 192.168.89.100:/root/.ssh/authorized_keys
root@192.168.89.100's password:
id_rsa.pub 100% |*********************************************************| 236 00:00
#远程机器修改文件
[root@localhost ssh]# vi sshd_config
RSAAuthentication yes
PubkeyAuthentication yes
AuthorizedKeysFile .ssh/authorized_keys
[root@localhost ssh]# /etc/init.d/sshd restart
停止 sshd: [ 确定 ]
启动 sshd [ 确定 ]
#测试SSH连接
#在本地机器,复制远程的文件过来本地
#如果远程机器的SSH端口不是默认的端口(22),端口的设置在/etc/ssh/sshd_config文件设置
#scp复制的是目录,则需要加上参数-r,表示循环地也将目录zookeeper-a下面的内容也复制过来
[root@localhost zookeeper-a]# scp -r -P 32200 root@192.168.89.100:/root/zookeeper-a /root
...