ÔÚÔ¶³Ìά»¤Linux»òUnixϵͳʱ£¬Ê¹ÓÃ×î¶àµÄ¿ÖžÍÊÇsshÁË£¬µ«ÊÇ×î½ü·¢ÏÖ²¿·ÖµØ·½µÄISPÔËÓªÉ̲»ÖªÊ²Ã´ÔÒòÆÁ±ÎµôÁËSSHĬÈÏʹÓõÄ22¶Ë¿Ú£¬µ¼Ö¼¸¸öµØ·½µÄ·þÎñÆ÷ÎÞ·¨µÇ½ÁË£¬ÄÜ·ñÈÃSSH¼àÌýÔÚ¶à¸ö¶Ë¿ÚÄØ£¬·ÀÖ¹ÔÚÒ»¸ö±»ÆÁ±ÎºóÎÞ·¨µÇ½£¬¾¹ý¼¸´ÎÊÔÑéÖÕÓÚÕÒµ½ÁË·½·¨¡£
ÔÚĬÈÏÇé¿öÏ£¬SSH·þÎñµÄÅäÖÃÎļþ´æ·ÅÔÚ/etc/sshĿ¼Ï£¬·þÎñÆ÷ÅäÖÃÎļþΪsshd_config¡£ÄÚÈÝÈçÏ£º
# $OpenBSD: sshd_config,v 1.48 2002/02/19 02:50:59 deraadt Exp $ # This is the sshd server system-wide configuration file. See sshd(8) # for more information. # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin # The strategy used for options in the default sshd_config shipped with # OpenSSH is to specify options with their default value where # possible, but leave them commented. Uncommented options change a # default value. Port 2222 Port 2223 #Protocol 2,1 #ListenAddress 0.0.0.0 #ListenAddress :: # HostKey for protocol version 1 #HostKey /etc/ssh/ssh_host_key # HostKeys for protocol version 2 #HostKey /etc/ssh/ssh_host_rsa_key #HostKey /etc/ssh/ssh_host_dsa_key # Lifetime and size of ephemeral version 1 server key #KeyRegenerationInterval 3600 #ServerKeyBits 768 # Logging #obsoletes QuietMode and FascistLogging #SyslogFacility AUTH SyslogFacility AUTHPRIV #LogLevel INFO # Authentication: #LoginGraceTime 600 #PermitRootLogin yes #StrictModes yes #RSAAuthentication yes #PubkeyAuthentication yes #AuthorizedKeysFile .ssh/authorized_keys # rhosts authentication should not be used #RhostsAuthentication no # Don't read the user's ~/.rhosts and ~/.shosts files #IgnoreRhosts yes # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts #RhostsRSAAuthentication no # similar for protocol version 2 #HostbasedAuthentication no # Change to yes if you don't trust ~/.ssh/known_hosts for # RhostsRSAAuthentication and HostbasedAuthentication #IgnoreUserKnownHosts no # To disable tunneled clear text passwords, change to no here! #PasswordAuthentication yes #PermitEmptyPasswords no # Change to no to disable s/key passwords #ChallengeResponseAuthentication yes # Kerberos options # KerberosAuthentication automatically enabled if keyfile exists #KerberosAuthentication yes #KerberosOrLocalPasswd yes #KerberosTicketCleanup yes # AFSTokenPassing automatically enabled if k_hasafs() is true #AFSTokenPassing yes # Kerberos TGT Passing only works with the AFS kaserver #KerberosTgtPassing no # Set this to 'yes' to enable PAM keyboard-interactive authentication # Warning: enabling this may bypass the setting of 'PasswordAuthentication' #PAMAuthenticationViaKbdInt yes #X11Forwarding no X11Forwarding yes #X11DisplayOffset 10 #X11UseLocalhost yes #PrintMotd yes #PrintLastLog yes #KeepAlive yes #UseLogin no #MaxStartups 10 # no default banner path #Banner /some/path #VerifyReverseMapping no # override default of no subsystems Subsystem sftp /usr/libexec/openssh/sftp-server
Ö»ÐèÒª½«ÅäÖÃÎļþÖеÄPORTµÄ×¢ÊÍÈ¡Ïû£¬Ã¿Ò»Ðбíʾ¼àÌýµÄÒ»¸ö¶Ë¿Ú£¬ÕâÑùSSH·þÎñ¾Í¿ÉÒÔ¼àÌýÔÚÈÎÒâ¶àÖ¸¶¨µÄ¶Ë¿ÚÁË¡£ÎªÁ˰²È«£¬»¹¿ÉÒÔ½«ºìÉ«±ê¼Ç³öµÄÔÊÐírootÕʺŵǽ¸ÄΪNO£¬²»¹ýÐÞ¸Ä֮ǰһ¶¨Òª¼ÇµÃÔÙÔö¼ÓÒ»¸öÕʺţ¬·ñÔò×Ô¼º¶¼ÎÞ·¨µÇ½À²¡£¾¹ý²âÊÔ£¬Ô¶³Ì²Ù×÷ºÍÎļþ´«Ê䶼ûÓÐÓöµ½ÎÊÌ⣬ºÇºÇ¡£ |