赞
踩
OpenSSH Server Configuration (Windows Host)
1.download the zipped file from the link below:
[link]:https://github.com/PowerShell/OpenSSH-Portable
2.install the openssh
unziped OpenSSH-Win64.zip to “C:\Program Files” then run
install-sshd.ps1 to install the sshd(use Bypass or set-executionpolicy remotesigned to get the permission if needs)
3.firewall setting.
powershell command(windows 10 only)
New-NetFirewallRule -Name sshd -DisplayName 'OpenSSH Server (sshd)' -Enabled True -Direction Inbound -Protocol TCP -Action Allow -LocalPort 22
or under (Windows Defender Firewall with Advanced Security)
4. start the sshd
Start-service sshd
Start-service ssh-agent
check Task Manager to make sure the service is started.
# This is the sshd server system-wide configuration file. See # sshd_config(5) for more information. # The strategy used for options in the default sshd_config shipped with # OpenSSH is to specify options with their default value where # possible, but leave them commented. Uncommented options override the # default value. Port 22 #AddressFamily any #ListenAddress 0.0.0.0 #ListenAddress :: #HostKey __PROGRAMDATA__/ssh/ssh_host_rsa_key #HostKey __PROGRAMDATA__/ssh/ssh_host_dsa_key #HostKey __PROGRAMDATA__/ssh/ssh_host_ecdsa_key #HostKey __PROGRAMDATA__/ssh/ssh_host_ed25519_key # Ciphers and keying #RekeyLimit default none # Logging SyslogFacility LOCAL0 LogLevel DEBUG3 # Authentication: #LoginGraceTime 2m PermitRootLogin yes #StrictModes yes StrictModes no #MaxAuthTries 6 #MaxSessions 10 PubkeyAuthentication yes RSAAuthentication yes # The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2 # but this is overridden so installations will only check .ssh/authorized_keys #AuthorizedKeysFile .ssh\authorized_keys #AuthorizedPrincipalsFile none # For this to work you will also need host keys in %programData%/ssh/ssh_known_hosts HostbasedAuthentication no # Change to yes if you don't trust ~/.ssh/known_hosts for # HostbasedAuthentication #IgnoreUserKnownHosts no # Don't read the user's ~/.rhosts and ~/.shosts files #IgnoreRhosts yes # To disable tunneled clear text passwords, change to no here! PasswordAuthentication no PermitEmptyPasswords no # GSSAPI options #GSSAPIAuthentication no #AllowAgentForwarding yes #AllowTcpForwarding yes #GatewayPorts no #PermitTTY yes #PrintMotd yes #PrintLastLog yes #TCPKeepAlive yes #UseLogin no #PermitUserEnvironment no #ClientAliveInterval 0 #ClientAliveCountMax 3 #UseDNS no #PidFile /var/run/sshd.pid #MaxStartups 10:30:100 #PermitTunnel no #ChrootDirectory none #VersionAddendum none # no default banner path #Banner none # override default of no subsystems Subsystem sftp sftp-server.exe # Example of overriding settings on a per-user basis #Match User anoncvs # AllowTcpForwarding no # PermitTTY no # ForceCommand cvs server #Match Group administrators # AuthorizedKeysFile __PROGRAMDATA__/ssh/administrators_authorized_keys
comment
Match Group administrators
AuthorizedKeysFile __PROGRAMDATA__/ssh/administrators_authorized_keys
set
"PubkeyAuthentication yes"
(enable debug info if needs)
SyslogFacility LOCAL0
LogLevel DEBUG3
copy the public key to C:\USERS"username".ssh\authorized_keys
(change the name of pub key file into authorized_keys instead of creating a folder name authorized_keys )
restart the service then you can have access to ssh server without password.
ssh username@ip_address -i $(path_of_priviate_key)
Copyright © 2003-2013 www.wpsshop.cn 版权所有,并保留所有权利。