zoukankan      html  css  js  c++  java
  • 批量改主机名报错:Address 192.168.43.117 maps to bogon, but this does not map back to the address

    ssh连接批量修改主机名报出以下提示:

    [root@bqh-nfs-123 ~]# vim modfilyhostname.sh
    [root@bqh-nfs-123 ~]# sh modfilyhostname.sh 
    Address 192.168.43.117 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.118 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.119 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.120 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.121 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.122 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.123 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.124 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!

    一般是在配置无密码登录时导致,解决方法如下:

    修改本机ssh_config文件GSSAPIAuthentication yse 改为:GSSAPIAuthentication no

    [root@bqh-117 ~]# sed -i 's#GSSAPIAuthentication yes#GSSAPIAuthentication no#g' /etc/ssh/ssh_config 
    [root@bqh-117 ~]# sed -n 50p /etc/ssh/ssh_config
        GSSAPIAuthentication no

    GSSAPIAuthentication的作用:是否允许使用基于GSSAPI的用户认证

  • 相关阅读:
    sizeof和strlen区别
    Reverse Words in a String
    删除字符串中重复的字符
    Reverse String
    数组中一个数字出现的次数超过了数组长度的一半,请找出这个数
    输出数组中大于等于左边所有数且小于等于右边所有数的元素
    java获取数据库里表的名字
    [转]C++编写Config类读取配置文件
    c# App.Config详解
    pitch yaw roll是什么
  • 原文地址:https://www.cnblogs.com/su-root/p/11261671.html
Copyright © 2011-2022 走看看