zoukankan      html  css  js  c++  java
  • 利用shell脚本实现免密认证

    ssh免密认证脚本

    脚本内容

    #安装expect
    [root@localhost ~]# yum -y install expect
    
    #脚本
    [root@localhost ~]# cat ssh_config.sh 
    #!/bin/bash
    echo "-------------------"
    echo "作者:leidazhuang"
    echo "时间:2021/3/31"
    echo "本脚本用于免密认证"
    echo "-------------------"
    sleep 1s
    
    #定义变量
    IP="192.168.110.40"
    USERNAME="root"
    PWD="1"
    
    #删除
    rm -rf .ssh/* &>/dev/null
    
    #创建一个交互模式进程,作为密钥生成
    expect << EOF
         set timeout 10s
         spawn ssh-keygen -t rsa
         expect "(/root/.ssh/id_rsa):"  {send "
    "}
         expect "passphrase):"          {send "
    "}
         expect "again: "               {send "
    "}
         expect "#"                     {send "
    "}
    EOF
    
    #创建一个交互模式进程,作为免密认证
    expect << EOF
         set timeout 10s
         spawn ssh-copy-id ${USERNAME}@${IP}
         expect "yes/no"               {send "yes
    "}
         expect "password:"            {send "${PWD}
    "}
         expect "#"                    {send "
    "}
    EOF
    
    #测试连接
    #创建一个文件
    echo "使用IP命令测试是否能够免密登录..."
    sleep 1s
    ssh ${USERNAME}@${IP} ip a
    
    if [[ $? -eq 0 ]];then
    	echo "可以使用IP命令,说明连接成功"
    	echo "正在免密登录..."
    	echo "接下来是${IP}主机"
    	ssh ${USERNAME}@${IP}
    else
    	echo "连接失败"
    fi
    

    执行脚本

    [root@localhost ~]# ./ssh_config.sh 
    -------------------
    作者:leidazhuang
    时间:2021/3/31
    本脚本用于免密认证
    -------------------
    spawn ssh-keygen -t rsa
    Generating public/private rsa key pair.
    Enter file in which to save the key (/root/.ssh/id_rsa): 
    Enter passphrase (empty for no passphrase): 
    Enter same passphrase again: 
    Your identification has been saved in /root/.ssh/id_rsa.
    Your public key has been saved in /root/.ssh/id_rsa.pub.
    The key fingerprint is:
    SHA256:8aSSkkH0jLsTc6keP9CyapdbBY2/y0LoKCUw/d015/k root@localhost.localdomain
    The key's randomart image is:
    +---[RSA 3072]----+
    |   .o            |
    |   . + o         |
    | .  o = o .      |
    |o .  + = =o .    |
    |.. .*+=.S..+ .   |
    |. . =B+o..  o    |
    | o o=*. .    .   |
    |. o.==o. .    E  |
    | o.oo..oo        |
    +----[SHA256]-----+
    spawn ssh-copy-id root@192.168.110.40
    /usr/bin/ssh-copy-id: INFO: Source of key(s) to be installed: "/root/.ssh/id_rsa.pub"
    The authenticity of host '192.168.110.40 (192.168.110.40)' can't be established.
    ECDSA key fingerprint is SHA256:6BH7PNs5Uqc0ytCHwiDIUL6GkDuIA28Jyutg4DX8zhM.
    Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
    /usr/bin/ssh-copy-id: INFO: attempting to log in with the new key(s), to filter out any that are already installed
    /usr/bin/ssh-copy-id: INFO: 1 key(s) remain to be installed -- if you are prompted now it is to install the new keys
    root@192.168.110.40's password: 
    
    Number of key(s) added: 1
    
    Now try logging into the machine, with:   "ssh 'root@192.168.110.40'"
    and check to make sure that only the key(s) you wanted were added.
    
    使用IP命令测试是否能够免密登录...
    1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
        link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
        inet 127.0.0.1/8 scope host lo
           valid_lft forever preferred_lft forever
        inet6 ::1/128 scope host 
           valid_lft forever preferred_lft forever
    2: ens160: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
        link/ether 00:0c:29:52:cd:03 brd ff:ff:ff:ff:ff:ff
        inet 192.168.110.40/24 brd 192.168.110.255 scope global noprefixroute ens160
           valid_lft forever preferred_lft forever
    可以使用IP命令,说明连接成功
    正在免密登录...
    接下来是192.168.110.40主机
    Last login: Thu Apr  1 09:01:47 2021 from 192.168.110.30
    [root@localhost ~]# ip a
    1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
        link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
        inet 127.0.0.1/8 scope host lo
           valid_lft forever preferred_lft forever
        inet6 ::1/128 scope host 
           valid_lft forever preferred_lft forever
    2: ens160: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
        link/ether 00:0c:29:52:cd:03 brd ff:ff:ff:ff:ff:ff
        inet 192.168.110.40/24 brd 192.168.110.255 scope global noprefixroute ens160
           valid_lft forever preferred_lft forever
    
  • 相关阅读:
    DHCP服务器搭建
    Nginx Web服务器
    ansible批量管理工具
    同网段存活IP公钥分发脚本
    inotify事件监控工具
    搭建云yum仓库和本地定时yum仓库
    NFS网络文件共享系统
    shell 脚本的讲解 与应用
    awk 命令精讲
    ACL权限控制 及特殊权限
  • 原文地址:https://www.cnblogs.com/leixixi/p/14611313.html
Copyright © 2011-2022 走看看