首页 / 词典 / good

sshd

  • 网络远程连接
sshdsshd
  1. Typical output of starting sshd in debug mode could be

    在调试模式下启动sshd的典型输出如下

  2. Make sure sshd is running on each node .

    确保每个节点上都在运行sshd。

  3. The big new feature is chroot support for sshd ( 8 ) .

    一个较重大的新特性是对sshd(8)的chroot支持。

  4. Let 's extract all IP addresses mentioned in the sshd log messages .

    让我们抽取sshd日志消息中所提及的所有IP地址。

  5. Finally , you need to start the sshd process and configure it to execute at boot time .

    最后,您需要启动sshd过程,并对其进行配置,以便在启动时执行。

  6. From the server side , stop the sshd service and start it up with the debug option .

    在服务器端,停止sshd服务,然后带调试选项启动它。

  7. Enable debug for sshd and check if any failures .

    为sshd启用调试,检查是否有任何错误。

  8. Any changes made to the file sshd_config will not take effect until sshd is restarted , like so

    对sshdconfig文件的任何修改要到重新启动sshd之后才会生效,如下所示

  9. Confine SFTP users to their own home directories by using Chroot SSHD

    使用ChrootSSHD将SFTP用户局限于其自己的主目录

  10. The ssh command ( you did leave sshd running , right ?) can forward X11 requests .

    ssh命令(sshd仍然在运行,对吗?)可以转发X11请求。

  11. Start the subsystem by running startsrc – s sshd .

    通过运行startsrc–ssshd启动子系统。

  12. This version of sshd was built with wrapper support and lives in / usr / sbin .

    此版本的sshd带有wrapper支持,存放在/usr/sbin中。

  13. Naturally , the host , which is still a completely generic sshd server rather than anything Twisted specific , starts sending some data back .

    这时主机依旧完全是一个一般的sshd服务器,而不具有任何Twisted特征,它自然而然地会开始发送回一些数据。

  14. After modifying the configuration options in the sshd_config file , stop and start the ssh daemon ( sshd )

    修改sshdconfig文件中的配置选项之后,停止并重新启动ssh守护进程(sshd)

  15. Adding pam_access.so to the sshd PAM file lets you easily define who can use SSH to connect to your machine .

    在sshdPAM文件中添加pamaccess.so,就可以轻松地定义谁可以使用SSH连接您的计算机。

  16. Add a UsePAM yes line to the file , restart the sshd daemon , and that 's all !

    在此文件中添加UsePAMyes行,重新启动sshd守护进程,这样就行了!

  17. For example , the standard Linux boot service sshd requires the network to be started , and so sshd has a dependency on the " network " service .

    例如,标准的Linux启动服务sshd需要启动网络,所以,sshd对“network”服务存在依赖关系。

  18. If sshd is started in debug mode , any errors found in sshd_conf by sshd will be reported to standard ouput .

    如果在调试模式下启动sshd,会在标准输出中报告sshd在sshdconf中找到的错误。

  19. The repository option to copy : just tells cfengine where to put the old sshd script , if it had to be overwritten .

    的repository选项只是告诉cfengine放置旧sshd脚本的位置(如果必须覆盖它)。

  20. With-pid-dir = DIR & This option specifies the location of the PID file that stores the process ID for the sshd daemon .

    with-pid-dir=DIR&此选项指定PID文件的位置,该文件为sshd守护进程存储进程ID。

  21. For headless systems , be sure to install and configure VNC and / or sshd so that you can log in to the system remotely .

    对于无外设系统,确保安装并配置了VNC和/或sshd,以便您能够远程登录系统。

  22. To / etc / pam.d/login and / etc / pam . d / sshd . Finally , for some user USER , create a private tmp .

    最后,为用户USER创建一个私有的tmp目录。

  23. The real_daemon informs wrappers where the real daemons live like ftpd , telnetd , and sshd .

    realdaemon通知wrappers实际的守护进程,如ftpd、telnetd和sshd在哪里。

  24. Tcpdchk reports that in the first rule entry output the sshd service is not ran from / etc / inetd . conf , which is OK .

    Tcpdchk在第一条规则条目输出中报告,sshd服务并不是从/etc/inetd.conf中运行,这是对的。

  25. With AK , sshd will open the user 's private part of the user 's keystore and call the EFS kernel extension to push this opened keystore into the kernel and associate it with the user 's log on process .

    sshd用AK打开用户密钥存储库的私有部分,通过调用EFS内核扩展把这个打开的密钥存储库放到内核中并与用户的登录进程相关联。

  26. For other OpenSSH types , typically the configuration files are located in / usr / local / etc and the SSH ( sshd ) daemon is located in / usr / local / sbin / sshd .

    对于其他OpenSSH类型,配置文件通常在/usr/local/etc中,SSH(sshd)守护进程在/usr/local/sbin/sshd中。

  27. On receiving the ACK from the ssh client , the sshd opens the user 's efs keystore in / var / efs / user / / keystore and reads the public key cookie SSHPub ( AK ) and sends it to ssh client .

    从ssh客户机收到ACK之后,sshd打开/var/efs/user//keystore中的用户efs密钥存储库,读取公共密钥cookieSSHPub(AK)并把它发送给ssh客户机。