zoukankan      html  css  js  c++  java
  • Linux命令:sshpass

    sshpass介绍

      sshpass是一款凡是为凡是使用ssl方式访问的操作提供一个免输入密码的非交互式操作,以便于在脚本中执行ssl操作,如ssh,scp等。sshpass是一家以色列公司Lingnu开发的,由于软件还处于初期,bug还是很有可能出现的。所以使用这个软件时要慎重。

    sshpass安装

    源码安装

    curl -O -L http://downloads.sourceforge.net/project/sshpass/sshpass/1.06/sshpass-1.06.tar.gz && tar xvzf sshpass-1.06.tar.gz && cd sshpass-1.06 && ./configure && make && sudo make install

    自己安装软件包

    rpm -ivh $BaseDir/tools/sshpass/sshpass-1.06-1.el6.x86_64.rpm

    自动安装软件包

    # yum -y install sshpass

    sshpass用法

    sshpass [-ffilename|-dnum|-ppassword|-e] [options] command arguments

    -p 直接在命令行给出密码

    sshpass   -p   '123'    ssh   root@192.168.1.1   'ls -l'  

    -f 文件首行给出密码。

    sshpass   -f   file.txt    ssh    root@192.168.1.1 'ls -l'   

    -e 由环境变量SSHPASS给出密码。

    export     SSHPASS='123'

    sshpass   -e   ssh    root@192.168.1.1 'ls -l'   

     -d 由文件描述符给出密码。

     sshpass   -d 51671   ssh    root@192.168.1.1 'ls -l'   

      对于ssh的第一次登陆,会提示:“Are you sure you want to continue connecting (yes/no)”,这时用sshpass会不好使,可以在ssh命令后面加上 -o StrictHostKeyChecking=no来解决。比如说上面的命令,就可以写作ssh -p efghi scp abc@192.168.0.5:/home/xxx/test /root -o StrictHostKeyChecking=no。

    sshpass帮助

    Usage: sshpass [-f|-d|-p|-e] [-hV] command parameters
       -f filename   Take password to use from file
       -d number     Use number as file descriptor for getting password
       -p password   Provide password as argument (security unwise)
       -e            Password is passed as env-var "SSHPASS"
       With no parameters - password will be taken from stdin
    
       -P prompt     Which string should sshpass search for to detect a password prompt
       -v            Be verbose about what you're doing
       -h            Show help (this screen)
       -V            Print version information
    At most one of -f, -d, -p or -e should be used
    View Code
    SSHPASS(1)                                                                        Sshpass User Manual                                                                        SSHPASS(1)
    
    
    
    NAME
           sshpass - noninteractive ssh password provider
    
    SYNOPSIS
           sshpass [-ffilename|-dnum|-ppassword|-e] [options] command arguments
    
    DESCRIPTION
           This manual page documents the sshpass command.
    
           sshpass is a utility designed for running ssh using the mode referred to as "keyboard-interactive" password authentication, but in non-interactive mode.
    
           ssh  uses direct TTY access to make sure that the password is indeed issued by an interactive keyboard user. Sshpass runs ssh in a dedicated tty, fooling it into thinking it is
           getting the password from an interactive user.
    
           The command to run is specified after sshpass' own options. Typically it will be "ssh" with arguments, but it can just as well be any other command. The password prompt used by
           ssh is, however, currently hardcoded into sshpass.
    
    Options
           If no option is given, sshpass reads the password from the standard input. The user may give at most one alternative source for the password:
    
           -ppassword
                  The password is given on the command line. Please note the section titled "SECURITY CONSIDERATIONS".
    
           -ffilename
                  The password is the first line of the file filename.
    
           -dnumber
                  number is a file descriptor inherited by sshpass from the runner. The password is read from the open file descriptor.
    
           -e     The password is taken from the environment variable "SSHPASS".
    
           -P     Set the password prompt. Sshpass searched for this prompt in the program's output to the TTY as an indication when to send the password. By default sshpass looks for the
                  string "password:" (which matches both "Password:" and "password:"). If your client's prompt does not fall under either of these, you can override the default  with  this
                  option.
    
           -v     Be verbose. sshpass will output to stderr information that should help debug cases where the connection hangs, seemingly for no good reason.
    
    SECURITY CONSIDERATIONS
           First  and  foremost,  users  of  sshpass  should  realize  that ssh's insistance on only getting the password interactively is not without reason. It is close to impossible to
           securely store the password, and users of sshpass should consider whether ssh's public key authentication provides the same end-user experience, while involving less hassle and
           being more secure.
    
           The  -p option should be considered the least secure of all of sshpass's options.  All system users can see the password in the command line with a simple "ps" command. Sshpass
           makes a minimal attempt to hide the password, but such attempts are doomed to create race conditions without actually solving the problem. Users of sshpass  are  encouraged  to
           use one of the other password passing techniques, which are all more secure.
    
           In  particular,  people  writing  programs that are meant to communicate the password programatically are encouraged to use an anonymous pipe and pass the pipe's reading end to
           sshpass using the -d option.
    
    RETURN VALUES
           As with any other program, sshpass returns 0 on success. In case of failure, the following return codes are used:
    
           1      Invalid command line argument
    
           2      Conflicting arguments given
    
           3      General runtime error
    
           4      Unrecognized response from ssh (parse error)
    
           5      Invalid/incorrect password
    
           6      Host public key is unknown. sshpass exits without confirming the new key.
    
           In addition, ssh might be complaining about a man in the middle attack. This complaint does not go to the tty. In other words, even with sshpass, the error message from ssh  is
           printed to standard error. In such a case ssh's return code is reported back. This is typically an unimaginative (and non-informative) "255" for all error cases.
    
    EXAMPLES
           Run rsync over SSH using password authentication, passing the password on the command line:
    
           rsync --rsh='sshpass -p 12345 ssh -l test' host.example.com:path .
    
           To do the same from a bourne shell script in a marginally less exposed way:
    
           SSHPASS=12345 rsync --rsh='sshpass -e ssh -l test' host.example.com:path .
    
    BUGS
           Sshpass  is  in its infancy at the moment. As such, bugs are highly possible. In particular, if the password is read from stdin (no password option at all), it is possible that
           some of the input aimed to be passed to ssh will be read by sshpass and lost.
    
           Sshpass utilizes the pty(7) interface to control the TTY for ssh. This interface, at least on Linux, has a misfeature where if no slave file descriptors are  open,  the  master
           pty  returns  EIO.  This is the normal behavior, except a slave pty may be born at any point by a program opening /dev/tty. This makes it impossible to reliably wait for events
           without consuming 100% of the CPU.
    
           Over the various versions different approaches were attempted at solving this problem.  Any given version of sshpass is released with the belief that it is working, but experi‐
           ence has shown that these things do, occasionally, break. This happened with OpenSSH version 5.6.  As of this writing, it is believed that sshpass is, again, working properly.
    
    
    
    Lingnu Open Source Consulting                                                        April 25, 2015                                                                          SSHPASS(1)
    

      

    本篇文章出自“国民时代”,转载请注明转载出处。
  • 相关阅读:
    prototype属性
    mui 结束时间不能大于开始时间
    DOM方式操作元素属性
    用户输入数字,自动生成钱值
    isNaN函数,判断其参数是否为数字类型
    switch 循环
    淘宝下单高并发解决方案(转)
    NLog文章系列——如何配置NLog(转)
    使用Nlog记录日志到数据库
    NLog文章系列——如何配置NLog
  • 原文地址:https://www.cnblogs.com/ChinaGo/p/10535958.html
Copyright © 2011-2022 走看看