允许root用户登录是很不安全的,但是有时候为了测试的方便, 也可以允许root用户登录,但是这个方法最好不要对公网开放使用. 1.新建一个用户,用来登录 test@cloud:~> useradd test (已添加用户名test为例). 2.设置密码(需要切换到root下进行设置) test@cloud:~> cd /root test@cloud:~> ls test@cloud:~> passwd test 设置密码 3.修改SSHD配置,禁用root登录 test@clo
1.新建用户wwweee000 [root@localhost ~]# useradd wwweee000 [root@localhost ~]# passwd wwweee000 Changing password for user wwweee000. New password: BAD PASSWORD: The password is a palindrome Retype new password: passwd: all authentication tokens updated s
生成PublicKey Linux:ssh-keygen -t rsa[私钥 (id_rsa) 与公钥 (id_rsa.pub)]Windows:SecurCRT/Xshell/PuTTY[SSH-2 RSA 2048] #生成SSH密钥对 ssh-keygen -t rsa Generating public/private rsa key pair. #建议直接回车使用默认路径 Enter file in which to save the key (/root/.ssh/id_rsa):
1.root用户登陆后,运行以下第一句指令,其他根据提示进行输入: ssh-keygen -t rsaGenerating public/private rsa key pair.Enter file in which to save the key (/root/.ssh/id_rsa): 建议直接回车使用默认路径Created directory '/root/.ssh'Enter passphrase (empty for no passphrase):
vim /etc/ssh/sshd_config PermitRootLogin yes => PermitRootLogin no systemctl restart sshd.service netstat -tulnp|grep sshd vim /etc/ssh/sshd_config Port => Port systemctl restart sshd.service netstat -tulnp|grep sshd vim /etc/ssh/sshd_config #Client