zoukankan      html  css  js  c++  java
  • 批量改主机名报错:Address 192.168.43.117 maps to bogon, but this does not map back to the address

    ssh连接批量修改主机名报出以下提示:

    [root@bqh-nfs-123 ~]# vim modfilyhostname.sh
    [root@bqh-nfs-123 ~]# sh modfilyhostname.sh 
    Address 192.168.43.117 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.118 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.119 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.120 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.121 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.122 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.123 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
    to the address - POSSIBLE BREAK-IN ATTEMPT!
    Address 192.168.43.124 maps to bogon, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!

    一般是在配置无密码登录时导致,解决方法如下:

    修改本机ssh_config文件GSSAPIAuthentication yse 改为:GSSAPIAuthentication no

    [root@bqh-117 ~]# sed -i 's#GSSAPIAuthentication yes#GSSAPIAuthentication no#g' /etc/ssh/ssh_config 
    [root@bqh-117 ~]# sed -n 50p /etc/ssh/ssh_config
        GSSAPIAuthentication no

    GSSAPIAuthentication的作用:是否允许使用基于GSSAPI的用户认证

  • 相关阅读:
    SIFT四部曲之——高斯滤波
    Opencv模块功能介绍
    颜色空间那些事儿
    libSVM笔记之(一)在matlab环境下安装配置libSVM
    Debian7安装后的配置(英文环境chromium浏览器中汉字变成方块的问题)
    JAVA的编码转换测试
    Ubuntu普通用户使用串口设备
    RTSP流和USB摄像头转MJPEG使用VLC
    ubuntu 14.04安装右键打开终端功能
    学习的目的和方法论(实战主义)
  • 原文地址:https://www.cnblogs.com/su-root/p/11261671.html
Copyright © 2011-2022 走看看