Você está na página 1de 7

UNIVERSIDAD POLITÉCNICA SALESIANA

CARRERA DE INGENIERÍA EN SISTEMAS


SISTEMAS OPERATIVOS II

Laboratorio # 07

Nombre: David Barros Nivel: 5º G1 Fecha: 29-06-2017

1. Descripción

Aprender a conectarse de manera remota a equipos con sistema UNIX-Linux usando el protocolo
SSH.

2. Solución

CUESTIONARIO

1. Dar una solución para cada literal de las actividades planteadas, indicando la línea que debe
ejecutar para obtener el resultado, las cuales serán presentadas mediante una captura de pantalla.
2. Profundizar los conocimientos mediante el uso de internet como herramienta de investigación.
3. Realizar cada uno de los ejercicios presentados las actividades de la práctica.
4. El desarrollo de la práctica de laboratorio tiene un valor de 2 puntos.

• Se requiere montar el sistema ArchLinuxARM en el dispositivo, tanto el boot como el root


deben estar presentes, mediante el uso de “bsdtar” se procede a descomprimirlo.
• Se descarga el archivo de la página oficial de ArchLinux ARM
https://archlinuxarm.org/about/downloads el archivo a usar se llama ARMv5 AT91 Arietta.

1. Verificar que el servicio esté instalado


service sshd status

Entramos como superusuario


[dbarrosv@localhost ~]$ su
Contraseña:
[root@localhost dbarrosv]# service sshd status
Redirecting to /bin/systemctl status sshd.service
● sshd.service - OpenSSH server daemon
Loaded: loaded (/usr/lib/systemd/system/sshd.service; enabled; vendor preset:
enabled)
Active: active (running) since mié 2017-06-28 17:50:26 ECT; 2min 30s ago
Docs: man:sshd(8)
man:sshd_config(5)
Main PID: 1612 (sshd)
CGroup: /system.slice/sshd.service
└─1612 /usr/sbin/sshd -D

jun 28 17:50:26 localhost.localdomain systemd[1]: Starting OpenSSH server dae...


jun 28 17:50:26 localhost.localdomain sshd[1612]: Server listening on 0.0.0.0...
jun 28 17:50:26 localhost.localdomain sshd[1612]: Server listening on :: port...
jun 28 17:50:26 localhost.localdomain systemd[1]: Started OpenSSH server daemon.
Hint: Some lines were ellipsized, use -l to show in full.

2. Si no se encuentra instalado, proceder con la instalación e iniciarlo.


yum -y install openssh-server openssh-client

service sshd start


service sshd status

3. Iniciar una conexión con SSH de manera local.


ssh localhost

[dbarrosv@localhost ~]$ ssh localhost


The authenticity of host 'localhost (::1)' can't be established.
ECDSA key fingerprint is d1:05:f0:c7:08:72:d7:d9:9e:8f:3d:1e:c6:5e:ec:e4.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added 'localhost' (ECDSA) to the list of known hosts.
root@localhost's password:
Last login: Wed Jun 28 17:52:26 2017

Cerramos la conexion
[dbarrosv@localhost ~]$ exit
logout
Connection to localhost closed.

4. Conéctese a un equipo usando SSH de manera remota, se debe especificar la IP y el


nombre del HOST a los que se va a conectar, por ejemplo.
ssh usuariomaquinaremota@123.456.789.25

Revisamos la ip de la maquina

[dbarrosv@localhost ~]$ifconfig
enp0s25: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.1.4 netmask 255.255.255.192 broadcast 192.168.1.63
inet6 fe80::21c:c0ff:feae:5aab prefixlen 64 scopeid 0x20<link>
ether 00:1c:c0:ae:5a:ab txqueuelen 1000 (Ethernet)
RX packets 144 bytes 13350 (13.0 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 144 bytes 15078 (14.7 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
device interrupt 20 memory 0xe0300000-e0320000
lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 0 (Local Loopback)
RX packets 60 bytes 10402 (10.1 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 60 bytes 10402 (10.1 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

[dbarrosv@localhost ~]$ ping 192.168.1.4


PING 192.168.1.4 (192.168.1.4) 56(84) bytes of data.
64 bytes from 192.168.1.4: icmp_seq=1 ttl=64 time=0.066 ms
64 bytes from 192.168.1.4: icmp_seq=2 ttl=64 time=0.058 ms
64 bytes from 192.168.1.4: icmp_seq=3 ttl=64 time=0.053 ms
64 bytes from 192.168.1.4: icmp_seq=4 ttl=64 time=0.044 ms
64 bytes from 192.168.1.4: icmp_seq=5 ttl=64 time=0.046 ms
64 bytes from 192.168.1.4: icmp_seq=6 ttl=64 time=0.051 ms
64 bytes from 192.168.1.4: icmp_seq=7 ttl=64 time=0.045 ms
64 bytes from 192.168.1.4: icmp_seq=8 ttl=64 time=0.057 ms
64 bytes from 192.168.1.4: icmp_seq=9 ttl=64 time=0.059 ms
64 bytes from 192.168.1.4: icmp_seq=10 ttl=64 time=0.050 ms
64 bytes from 192.168.1.4: icmp_seq=11 ttl=64 time=0.059 ms
64 bytes from 192.168.1.4: icmp_seq=12 ttl=64 time=0.060 ms
64 bytes from 192.168.1.4: icmp_seq=13 ttl=64 time=0.057 ms
64 bytes from 192.168.1.4: icmp_seq=14 ttl=64 time=0.056 ms
64 bytes from 192.168.1.4: icmp_seq=15 ttl=64 time=0.059 ms
64 bytes from 192.168.1.4: icmp_seq=16 ttl=64 time=0.062 ms
64 bytes from 192.168.1.4: icmp_seq=17 ttl=64 time=0.058 ms
64 bytes from 192.168.1.4: icmp_seq=18 ttl=64 time=0.058 ms
64 bytes from 192.168.1.4: icmp_seq=19 ttl=64 time=0.059 ms
64 bytes from 192.168.1.4: icmp_seq=20 ttl=64 time=0.058 ms
64 bytes from 192.168.1.4: icmp_seq=21 ttl=64 time=0.054 ms
64 bytes from 192.168.1.4: icmp_seq=22 ttl=64 time=0.050 ms
64 bytes from 192.168.1.4: icmp_seq=23 ttl=64 time=0.047 ms
64 bytes from 192.168.1.4: icmp_seq=24 ttl=64 time=0.028 ms
64 bytes from 192.168.1.4: icmp_seq=25 ttl=64 time=0.027 ms
64 bytes from 192.168.1.4: icmp_seq=26 ttl=64 time=0.058 ms
64 bytes from 192.168.1.4: icmp_seq=27 ttl=64 time=0.043 ms

[dbarrosv@localhost ~]$ ssh dbarrosv@192.168.1.4


The authenticity of host '192.168.1.4 (192.168.1.4)' can't be established.
ECDSA key fingerprint is d1:05:f0:c7:08:72:d7:d9:9e:8f:3d:1e:c6:5e:ec:e4.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.1.4' (ECDSA) to the list of known hosts.
dbarrosv@192.168.1.4's password:
Last login: Wed Jun 28 17:50:28 2017
[dbarrosv@localhost ~]$ ifconfig
enp0s25: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.1.4 netmask 255.255.255.192 broadcast 192.168.1.63
inet6 fe80::21c:c0ff:feae:5aab prefixlen 64 scopeid 0x20<link>
ether 00:1c:c0:ae:5a:ab txqueuelen 1000 (Ethernet)
RX packets 318 bytes 26580 (25.9 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 202 bytes 20146 (19.6 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
device interrupt 20 memory 0xe0300000-e0320000

lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536


inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 0 (Local Loopback)
RX packets 772 bytes 74592 (72.8 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 772 bytes 74592 (72.8 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

[dbarrosv@localhost ~]$ exit


logout
Connection to 192.168.1.4 closed.

5. SSH permite crear claves públicas y privadas de autenticación:


 Cree una clave pública en la máquina cliente.
 Usando SCP copie (envíe) dicha clave al servidor.
 Proceda a conectarse desde el cliente al servidor, éste ya no le deberá pedir que
ingrese la contraseña.

En algunos casos en el SSH del cliente se debe modificar algunos directorios y ficheros
ocultos, cuando se crea una clave.
chmod 700 ~/.ssh
chmod 600 ~/.ssh/authorized_keys

[dbarrosv@localhost ~]$ ssh-keygen -t rsa


Generating public/private rsa key pair.
Enter file in which to save the key (/root/.ssh/id_rsa): dbarrosv
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in dbarrosv.
Your public key has been saved in dbarrosv.pub.
The key fingerprint is:
1b:f1:05:a4:21:17:3c:4d:3e:3a:15:06:b4:3e:45:26 root@localhost.localdomain
The key's randomart image is:
+--[ RSA 2048]----+
| .oE*O |
| ooX.o |
| +.= . |
| . * o |
| S . |
| = |
| . |
| |
| |
+-----------------+

[dbarrosv@localhost ~]$ ls -lath .ssh/


total 24K
-rw-------. 1 dbarrosv dbarrosv 1,7K jun 28 19:11 dbarrosv_rsa
-rw-r--r--. 1 dbarrosv dbarrosv 417 jun 28 19:16 dbarros_rsa.pub
-rw-r--r--. 1 dbarrosv dbarrosv 834 jun 28 17:59 authorized_keys
drwx------. 2 dbarrosv dbarrosv 98 jun 28 17:59 .
-rw-r--r--. 1 dbarrosv dbarrosv 417 jun 28 18:35 contra.pub
drwx------. 32 dbarrosv dbarrosv 4,0K jun 28 18:12 ..
-rw-r--r--. 1 dbarrosv dbarrosv 345 jun 28 18:22 known_hosts

[dbarrosv@localhost ~]$ chmod 600 ~/ .shh/dbarrosv_rsa.pub


[dbarrosv@localhost ~]$ ls
authorized_keys Descargas ejer8.sh letras.txt Plantillas
caracteres.sh Documentos ejer9.sh maymin.sh Público
dbarrosv ejer10.sh Escritorio Música respaldo.txt
dbarrosv.pub ejer5.sh Imágenes owner.sh Vídeos

[dbarrosv@localhost ~]$ scp .ssh/dbarrosv_rsa.pub


dbarrosv@192.168.1.4:.ssh/nueva
dbarrosv@192.168.1.4's password:
dbarrosv_rsa.pu 100% 417 0.4KB/s 00:00
Last login: Wed Jun 28 18:04:26 2017

[dbarrosv@localhost ~]$ cd .ssh/


[dbarrosv@localhost .ssh]$ cat nueva >> authorized_keys
[dbarrosv@localhost .ssh]$ rm nueva
[dbarrosv@localhost .ssh]$ exit
logout
Connection to 192.168.1.4 closed.

[dbarrosv@localhost ~]$ chmod 600 ~/.ssh/authorized_keys


[dbarrosv@localhost ~]$ ls -lath .ssh/
total 24K
-rw-------. 1 dbarrosv dbarrosv 1,7K jun 28 19:11 dbarrosv_rsa
-rw-------. 1 dbarrosv dbarrosv 417 jun 28 19:11 nueva
-rw-------. 1 dbarrosv dbarrosv 417 jun 28 19:16 dbarros_rsa.pub
-rw-r--r--. 1 dbarrosv dbarrosv 834 jun 28 17:59 authorized_keys
drwx------. 2 dbarrosv dbarrosv 98 jun 28 17:59 .
-rw-r--r--. 1 dbarrosv dbarrosv 417 jun 28 18:35 contra.pub
drwx------. 32 dbarrosv dbarrosv 4,0K jun 28 18:12 ..
-rw-r--r--. 1 dbarrosv dbarrosv 345 jun 28 18:22 known_hosts
6. Usando PUTTY en Windows, conectarse por SSH a Centos7.

3. Ejecución
Conclusiones

 Logramos conectarnos de manera remota utilizando el protocolo .ssh siendo una poderosa
herramienta para la administración de sistemas sustituyendo a telnet, rsh entre otros.
 Utilizamos correctamente los comandos con esto permite acceder a recursos locales, realizar
transferencia de ficheros y copias de seguridad de manera segura.

Bibliografía

Carretero, J. (2001). Sistemas Operativos una Visión Aplicada. Aravaca: McGraw Hill.

Sánchez, S., & García, O. (2009). Unix y Linux: Guía práctica. Madrid: Alfaomega.

Tanenbaum, A. (2009). Sistemas Operativos Modernos. Buenos Aires: Pearson.

Você também pode gostar