zoukankan      html  css  js  c++  java
  • Linux ssh/scp连接时避免输入yes(公钥验证)并防止出现POSSIBLE BREAK-IN ATTEM

    方法一:连接时加入StrictHostKeyChecking=no

    ssh -o StrictHostKeyChecking=no root@192.168.1.100

    方法二:修改/etc/ssh/ssh_config配置文件,添加:

    StrictHostKeyChecking no

    此外,为防止出现这类警告:POSSIBLE BREAK-IN ATTEMPT!

    Address 192.168.0.101 maps to localhost, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!

    可以将/etc/ssh/ssh_config配置文件中的

    GSSAPIAuthentication yes

    改为:

    GSSAPIAuthentication no

    可以使用sed流编辑器来完成修改:

    sed -i 's/#   StrictHostKeyChecking ask/StrictHostKeyChecking no/' /etc/ssh/ssh_config
    sed -i 's/GSSAPIAuthentication yes/GSSAPIAuthentication no/' /etc/ssh/ssh_config
    service sshd restart
  • 相关阅读:
    DAY56
    DAY55
    DAY54
    DAY53
    DAY52
    DAY51
    DAY50
    spark1.1.0部署standalone分布式集群
    Storm流分组介绍
    Storm拓扑的并行度(parallelism)介绍
  • 原文地址:https://www.cnblogs.com/fiberhome/p/7279899.html
Copyright © 2011-2022 走看看