实验环境:
服务端:10.10.20.101
客户端:10.10.20.102至10.10.20.107
服务端:
ssh -keygen #生成密钥
Generating public/private rsa key pair.
Enter file in which to save the key (/root/.ssh/id_rsa): #回车
Created directory '/root/.ssh'.
Enter passphrase (empty for no passphrase): #回车
Enter same passphrase again: #回车
Your identification has been saved in /root/.ssh/id_rsa.
Your public key has been saved in /root/.ssh/id_rsa.pub.
The key fingerprint is: #回车
SHA256:+k+TeTQ3moYj3Uh3+gc3TiLb4isZgD8wPa0zUX1wlw4 root@linux1.skills.com
The key's randomart image is: #回车
+---[RSA 3072]----+
| .... ..|
| . ..E.. |
| o o . o |
| + = . . |
| + S . + + |
| B + X O.+.|
| . = % @ +o.|
| . = B o ..|
| ..+oo .. |
+----[SHA256]-----+
ssh-copy-id 10.10.20.102 #将生成的密钥推送给第二台机器(客户端的任意一台都可)
Are you sure you want to continue connecting (yes/no/[fingerprint])? #输入yes
root@10.10.20.102's password: #输入第二台机器的登录密码(SecureCRT环境)
客户端(第二台,10.10.20.102):
cd /etc/root/.ssh #进入到根目录下root目录下的.ssh下
ls #查看
会出现名为authorized_keys的文件
vi authorized_keys #编辑配置文件
yy #复制内容
p #粘贴内容(有几台客户端就复制几次。有7台客户端,这里输入7次“p”)
从最后一行的root@后面开始改写为各个客户端的ip地址
为了方便查看,这里再给大家单独挑出来两条看:
(更改前)
(更改后)
scp authorized_keys 10.10.20.101:/root/.ssh #将authorized_keys发送到服务端的根目录下root目录下的.ssh下
Are you sure you want to continue connecting (yes/no/[fingerprint])? #输入yes
root@10.10.20.101's password: #输入第一台机器的登录密码(SecureCRT环境)
发送成功
回到服务端:
cd /root/.ssh #进入root下.ssh
ls #查看
有没有很眼熟?没错,就是我们现刚刚发送的authorized_keys
剩下3台就省略了,同上。
接着7台客户端就可以互相免密登录了。
CentOS8—ssh配置结束,有不足的地方还请指正,感谢大家浏览!



