zoukankan      html  css  js  c++  java
  • 批量改主机名报错:Address 192.168.43.117 maps to bogon, but this does not map back to the address

    ssh连接批量修改主机名报出以下提示:

    [root@bqh-nfs-123 ~]# vim modfilyhostname.sh
    [root@bqh-nfs-123 ~]# sh modfilyhostname.sh 
    Address 192.168.43.117 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.118 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.119 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.120 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.121 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.122 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.123 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.124 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!

    一般是在配置无密码登录时导致,解决方法如下:

    修改本机ssh_config文件GSSAPIAuthentication yse 改为:GSSAPIAuthentication no

    [root@bqh-117 ~]# sed -i 's#GSSAPIAuthentication yes#GSSAPIAuthentication no#g' /etc/ssh/ssh_config 
    [root@bqh-117 ~]# sed -n 50p /etc/ssh/ssh_config
        GSSAPIAuthentication no

    GSSAPIAuthentication的作用:是否允许使用基于GSSAPI的用户认证

  • 相关阅读:
    数据库索引的作用和长处缺点
    iOS安全攻防(三):使用Reveal分析他人app
    SVN server的搭建
    腾讯2014年实习生招聘笔试面试经历
    JAVA数组的定义及用法
    一年成为Emacs高手(像神一样使用编辑器)
    给想上MIT的牛学生说几句
    四个好看的CSS样式表格
    dede 留言簿 多个
    破解中国电信华为无线猫路由(HG522-C)自己主动拨号+不限电脑数+iTV
  • 原文地址:https://www.cnblogs.com/su-root/p/11261671.html
Copyright © 2011-2022 走看看