²©¿ÍÈÕÀú |
« August 2025 » |
ÈÕ |
Ò» |
¶þ |
Èý |
ËÄ |
Îå |
Áù |
|
|
|
|
|
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 |
28 |
29 |
30 |
31 |
|
|
|
|
|
|
|
|
|
ÈÕÖ¾¹éµµ |
ÈýÔÂ, 2006
ËÄÔÂ, 2006
ÎåÔÂ, 2006
ÁùÔÂ, 2006
ÆßÔÂ, 2006
Ê®ÔÂ, 2006
ʮһÔÂ, 2006
Ê®¶þÔÂ, 2006
Ò»ÔÂ, 2007
¶þÔÂ, 2007
ÈýÔÂ, 2007
ËÄÔÂ, 2007
È«²¿...
|
|
²©¿Íͳ¼Æ |
·ÖÀà: 9
ÎÄÕÂ: 204
ÆÀÂÛ: 0
±êÇ©: 3
¸½¼þ: 103
ÒýÓÃ: 0
½ñÈÕ·ÃÎÊ: 9026
×Ü·ÃÎÊÁ¿: 25848404 |
|
|
SSH¼àÌý¶à¶Ë¿Ú |
ÔÚÔ¶³Ìά»¤Linux»òUnixϵͳʱ£¬Ê¹ÓÃ×î¶àµÄ¿ÖžÍÊÇsshÁË£¬µ«ÊÇ×î½ü·¢ÏÖ²¿·ÖµØ·½µÄISPÔËÓªÉ̲»ÖªÊ²Ã´ÔÒòÆÁ±ÎµôÁËSSHĬÈÏʹÓõÄ22¶Ë¿Ú£¬µ¼Ö¼¸¸öµØ·½µÄ·þÎñÆ÷ÎÞ·¨µÇ½ÁË£¬ÄÜ·ñÈÃSSH¼àÌýÔÚ¶à¸ö¶Ë¿ÚÄØ£¬·ÀÖ¹ÔÚÒ»¸ö±»ÆÁ±ÎºóÎÞ·¨µÇ½£¬¾¹ý¼¸´ÎÊÔÑéÖÕÓÚÕÒµ½ÁË·½·¨¡£
ÔÚĬÈÏÇé¿öÏ£¬SSH·þÎñµÄÅäÖÃÎļþ´æ·ÅÔÚ/etc/sshĿ¼Ï£¬·þÎñÆ÷ÅäÖÃÎļþΪsshd_config¡£ÄÚÈÝÈçÏ£º
# $OpenBSD: sshd_config,v 1.48 2002/02/19 02:50:59 deraadt Exp $ # This is the sshd server system-wide configuration file. See sshd(8) # for more information. # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin # The strategy used for options in the default sshd_config shipped with # OpenSSH is to specify options with their default value where # possible, but leave them commented. Uncommented options change a # default value. Port 2222 Port 2223 #Protocol 2,1 #ListenAddress 0.0.0.0 #ListenAddress :: # HostKey for protocol version 1 #HostKey /etc/ssh/ssh_host_key # HostKeys for protocol version 2 #HostKey /etc/ssh/ssh_host_rsa_key #HostKey /etc/ssh/ssh_host_dsa_key # Lifetime and size of ephemeral version 1 server key #KeyRegenerationInterval 3600 #ServerKeyBits 768 # Logging #obsoletes QuietMode and FascistLogging #SyslogFacility AUTH SyslogFacility AUTHPRIV #LogLevel INFO # Authentication: #LoginGraceTime 600 #PermitRootLogin yes #StrictModes yes #RSAAuthentication yes #PubkeyAuthentication yes #AuthorizedKeysFile .ssh/authorized_keys # rhosts authentication should not be used #RhostsAuthentication no # Don't read the user's ~/.rhosts and ~/.shosts files #IgnoreRhosts yes # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts #RhostsRSAAuthentication no # similar for protocol version 2 #HostbasedAuthentication no # Change to yes if you don't trust ~/.ssh/known_hosts for # RhostsRSAAuthentication and HostbasedAuthentication #IgnoreUserKnownHosts no # To disable tunneled clear text passwords, change to no here! #PasswordAuthentication yes #PermitEmptyPasswords no # Change to no to disable s/key passwords #ChallengeResponseAuthentication yes # Kerberos options # KerberosAuthentication automatically enabled if keyfile exists #KerberosAuthentication yes #KerberosOrLocalPasswd yes #KerberosTicketCleanup yes # AFSTokenPassing automatically enabled if k_hasafs() is true #AFSTokenPassing yes # Kerberos TGT Passing only works with the AFS kaserver #KerberosTgtPassing no # Set this to 'yes' to enable PAM keyboard-interactive authentication # Warning: enabling this may bypass the setting of 'PasswordAuthentication' #PAMAuthenticationViaKbdInt yes #X11Forwarding no X11Forwarding yes #X11DisplayOffset 10 #X11UseLocalhost yes #PrintMotd yes #PrintLastLog yes #KeepAlive yes #UseLogin no #MaxStartups 10 # no default banner path #Banner /some/path #VerifyReverseMapping no # override default of no subsystems Subsystem sftp /usr/libexec/openssh/sftp-server
Ö»ÐèÒª½«ÅäÖÃÎļþÖеÄPORTµÄ×¢ÊÍÈ¡Ïû£¬Ã¿Ò»Ðбíʾ¼àÌýµÄÒ»¸ö¶Ë¿Ú£¬ÕâÑùSSH·þÎñ¾Í¿ÉÒÔ¼àÌýÔÚÈÎÒâ¶àÖ¸¶¨µÄ¶Ë¿ÚÁË¡£ÎªÁ˰²È«£¬»¹¿ÉÒÔ½«ºìÉ«±ê¼Ç³öµÄÔÊÐírootÕʺŵǽ¸ÄΪNO£¬²»¹ýÐÞ¸Ä֮ǰһ¶¨Òª¼ÇµÃÔÙÔö¼ÓÒ»¸öÕʺţ¬·ñÔò×Ô¼º¶¼ÎÞ·¨µÇ½À²¡£¾¹ý²âÊÔ£¬Ô¶³Ì²Ù×÷ºÍÎļþ´«Ê䶼ûÓÐÓöµ½ÎÊÌ⣬ºÇºÇ¡£ |
|
|
Submitted
by ¶àÇéÀË×Ó on 2006, June 24, 2:41 PM |
«
ÉÏһƪ
|
ÏÂһƪ
»
·Ã¿ÍÆÀÂÛ |
|
µ±Ç°BlogÎÞÈÎºÎÆÀÂÛ
|
Post by
System on 2025, August 31, 11:56 PM |
# 0 |
|
|
»¹Ã»ÓÐÈ˲ÎÓëÆÀÂÛ, Äã˵Á½¾ä°É |
|
Ìí¼ÓÆÀÂÛ
|
|
|