• 企业400电话
  • 微网小程序
  • AI电话机器人
  • 电商代运营
  • 全 部 栏 目

    企业400电话 网络优化推广 AI电话机器人 呼叫中心 网站建设 商标✡知产 微网小程序 电商运营 彩铃•短信 增值拓展业务
    FreeBSD系统SSH配置详解

    修改freebsd可以用sshd权限用户登录ssh 但不能用root用户登录的方法

    在/etc/ssh/sshd_config最后中加入 

    PermitRootLogin yes #允许root登录
    PermitEmptyPasswords no #不允许空密码登录
    PasswordAuthentication yes # 设置是否使用口令验证。
    就可以了

    FreeBSD SSH配置详解

    首先vi编辑/etc/inetd.conf,去掉ssh前的#,保存退出 (开启****ssh服务)
    编辑/etc/rc.conf
    最后加入:sshd_enable="yes"即可
    激活sshd服务:
    techo#/etc/rc.d/sshd start
    用下面命令检查服务是否启动,在22端口应该有****。
    #netstat -an ## check port number 22
    最后
    vi /etc/ssh/sshd_config,
    下面是我的配置文件:(/etc/ssh/sshd_config)
    ####################################################

    # $OpenBSD: sshd_config,v 1.72 2005/07/25 11:59:40 markus Exp $
    # $FreeBSD: src/crypto/openssh/sshd_config,v 1.42.2.1 2005/09/11 16:50:35 des Exp $

    # This is the sshd server system-wide configuration file. See
    # sshd_config(5) for more information.

    # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin

    # The strategy used for options in the default sshd_config shipped with
    # OpenSSH is to specify options with their default value where
    # possible, but leave them commented. Uncommented options change a
    # default value.

    # Note that some of FreeBSD's defaults differ from OpenBSD's, and
    # FreeBSD has a few additional options.

    #VersionAddendum FreeBSD-20050903

    #Port 22
    #Protocol 2
    #AddressFamily any
    #ListenAddress 10.1.10.196
    #ListenAddress ::

    # HostKey for protocol version 1
    #HostKey /etc/ssh/ssh_host_key
    # HostKeys for protocol version 2
    #HostKey /etc/ssh/ssh_host_dsa_key

    # Lifetime and size of ephemeral version 1 server key
    #KeyRegenerationInterval 1h
    #ServerKeyBits 768

    # Logging
    # obsoletes QuietMode and FascistLogging
    #SyslogFacility AUTH
    #LogLevel INFO

    # Authentication:

    #LoginGraceTime 2m
    #PermitRootLogin no
    #StrictModes yes
    #MaxAuthTries 6

    #RSAAuthentication yes
    #PubkeyAuthentication yes
    #AuthorizedKey .ssh/authorized_keys
    # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
    #RhostsRSAAuthentication no
    # similar for protocol version 2
    #HostbasedAuthentication no
    # Change to yes if you don't trust ~/.ssh/known_hosts for
    # RhostsRSAAuthentication and HostbasedAuthentication
    #IgnoreUserKnownHosts no
    # Don't read the user's ~/.rhosts and ~/.shosts files
    #IgnoreRhosts yes

    # Change to yes to enable built-in password authentication.
    PasswordAuthentication yes
    #PermitEmptyPasswords no

    # Change to no to disable PAM authentication
    #ChallengeResponseAuthentication yes

    # Kerberos options
    #KerberosAuthentication no
    #KerberosOrLocalPasswd yes
    #KerberosTicketCleanup yes
    #KerberosGetAFSToken no

    # GSSAPI options
    #GSSAPIAuthentication no
    #GSSAPICleanupCredentials yes

    # Set this to 'no' to disable PAM authentication, account processing,
    # and session processing. If this is enabled, PAM authentication will
    # be allowed through the ChallengeResponseAuthentication mechanism.
    # Depending on your PAM configuration, this may bypass the setting of
    # PasswordAuthentication, PermitEmptyPasswords, and
    # "PermitRootLogin without-password". If you just want the PAM account and
    # session checks to run without PAM authentication, then enable this but set
    # ChallengeResponseAuthentication=no
    #UsePAM yes

    #AllowTcpForwarding yes
    #GatewayPorts no
    #X11Forwarding yes
    #X11DisplayOffset 10
    #X11UseLocalhost yes
    #PrintMotd yes
    #PrintLastLog yes
    #TCPKeepAlive yes
    #UseLogin no
    #UsePrivilegeSeparation yes
    #PermitUserEnvironment no
    #Compression delayed
    #ClientAliveInterval 0
    #ClientAliveCountMax 3
    #UseDNS no
    #PidFile /var/run/sshd.pid
    #MaxStartups 10

    # no default banner path
    #Banner /some/path

    # override default of no subsystems
    Subsystem sftp /usr/libexec/sftp-server

    IgnoreRhosts yes
    IgnoreUserKnownHosts yes
    PrintMotd yes
    StrictModes no
    RSAAuthentication yes
    PermitRootLogin yes #允许root登录
    PermitEmptyPasswords no #不允许空密码登录
    PasswordAuthentication yes # 设置是否使用口令验证。

    ##############################################

    记得修改完配置文件后,重新启动sshd服务器(/etc/rc.d/sshd restart)即可。
    几点补充说明
    1,如果重启后还是不行请重新载入sshd_config 文件
    /etc/rc.d/sshd reload
    2,如果出现using keyboard-interactive authentication
    password:
    请确认PasswordAuthentication是否已经改成yes
    另外如果客户端是putty那么请确认"尝试'智能键盘'认证(SSH-2)"的勾是否有去掉
    3,如果是使用root帐号登陆
    请确认密码是否为空
    空密码无法登陆
    4请确认是否有安装SSH
    sysinstall>>>configure>>>networking>>>sshd是否的勾是否有打上

    上一篇:OPENBSD-3.8上快速安装和配置apache+mysql+php+ssl
    下一篇:FreeBSD 6.2用freebsd-update升级过程
  • 相关文章
  • 

    © 2016-2020 巨人网络通讯 版权所有

    《增值电信业务经营许可证》 苏ICP备15040257号-8

    FreeBSD系统SSH配置详解 FreeBSD,系统,SSH,配置,详解,