Paramiko

领先的原生Python SSHv2协议库。(The leading native Python SSHv2 protocol library. )

  • 所有者: paramiko/paramiko
  • 平台:
  • 許可證: GNU Lesser General Public License v2.1
  • 分類:
  • 主題:
  • 喜歡:
    0
      比較:

Github星跟蹤圖

Paramiko是SSHv2协议的Python(2.6+,3.3+)实现,提供客户端和服务器功能。 虽然它利用了Python C扩展为低级加密(Cryptography),Paramiko本身是一个纯粹的Python接口,围绕SSH网络概念。

“Paramiko”是“偏执狂”和“朋友”的世界语词汇的组合。 它是一个用于Python 2.6+/3.3+的模块,它实现了SSH2协议,用于与远程机器的安全(加密和验证)连接。 与SSL(又称TLS)不同,SSH2协议不需要由强大的中央管理机构签名的分层证书。 您可能知道SSH2作为替代Telnet和rsh以安全访问远程shell的协议,但该协议还包括通过加密隧道向远程服务打开任意通道的功能(例如,SFTP的工作原理)。
它完全以Python编写(虽然它取决于低级别加密的第三方C包装程序,这些通常可以预编译),并根据GNU Lesser通用公共许可证(LGPL)发布。
该软件包及其API在docs文件夹中已有相当明确的记录,该文件夹应该与该存储库一起提供。

Paramiko主要支持具有标准OpenSSH实现的POSIX平台,并且经常在Linux和OS X上进行测试。Windows也受支持,尽管它可能并不直接。

概覽

名稱與所有者paramiko/paramiko
主編程語言Python
編程語言Python (語言數: 1)
平台
許可證GNU Lesser General Public License v2.1
發布數186
最新版本名稱3.4.0 (發布於 2023-12-18 14:34:19)
第一版名稱release-1.7.4 (發布於 )
創建於2009-02-02 03:41:08
推送於2024-04-26 13:13:16
最后一次提交
星數8.8k
關注者數317
派生數2k
提交數4k
已啟用問題?
問題數1601
打開的問題數810
拉請求數137
打開的拉請求數235
關閉的拉請求數412
已啟用Wiki?
已存檔?
是復刻?
已鎖定?
是鏡像?
是私有?

========
Paramiko

.. Continuous integration and code coverage badges

.. image:: https://travis-ci.org/paramiko/paramiko.svg?branch=master
:target: https://travis-ci.org/paramiko/paramiko
.. image:: https://codecov.io/gh/paramiko/paramiko/branch/master/graph/badge.svg
:target: https://codecov.io/gh/paramiko/paramiko

:Paramiko: Python SSH module
:Copyright: Copyright (c) 2009 Robey Pointer robeypointer@gmail.com
:Copyright: Copyright (c) 2020 Jeff Forcier jeff@bitprophet.org
:License: LGPL <https://www.gnu.org/copyleft/lesser.html>_
:Homepage: http://www.paramiko.org/
:API docs: http://docs.paramiko.org
:Development: https://github.com/paramiko/paramiko

What

"Paramiko" is a combination of the Esperanto words for "paranoid" and
"friend". It's a module for Python 2.7/3.4+ that implements the SSH2 protocol
for secure (encrypted and authenticated) connections to remote machines. Unlike
SSL (aka TLS), SSH2 protocol does not require hierarchical certificates signed
by a powerful central authority. You may know SSH2 as the protocol that
replaced Telnet and rsh for secure access to remote shells, but the protocol
also includes the ability to open arbitrary channels to remote services across
the encrypted tunnel (this is how SFTP works, for example).

It is written entirely in Python (though it depends on third-party C wrappers
for low level crypto; these are often available precompiled) and is released
under the GNU Lesser General Public License (LGPL <https://www.gnu.org/copyleft/lesser.html>_).

The package and its API is fairly well documented in the docs folder that
should have come with this repository.

Installation

For most users, the recommended method to install is via pip::

pip install paramiko

For more detailed instructions, see the Installing <http://www.paramiko.org/installing.html>_ page on the main Paramiko website.

Portability Issues

Paramiko primarily supports POSIX platforms with standard OpenSSH
implementations, and is most frequently tested on Linux and OS X. Windows is
supported as well, though it may not be as straightforward.

Bugs & Support

:Bug Reports: Github <https://github.com/paramiko/paramiko/issues/>_
:Mailing List: paramiko@librelist.com (see the LibreList website <http://librelist.com/>_ for usage details).
:IRC: #paramiko on Freenode

Kerberos Support

Paramiko ships with optional Kerberos/GSSAPI support; for info on the extra
dependencies for this, see the GSS-API section <http://www.paramiko.org/installing.html#gssapi>_
on the main Paramiko website.

Demo

Several demo scripts come with Paramiko to demonstrate how to use it.
Probably the simplest demo is this::

import base64
import paramiko
key = paramiko.RSAKey(data=base64.b64decode(b'AAA...'))
client = paramiko.SSHClient()
client.get_host_keys().add('ssh.example.com', 'ssh-rsa', key)
client.connect('ssh.example.com', username='strongbad', password='thecheat')
stdin, stdout, stderr = client.exec_command('ls')
for line in stdout:
    print('... ' + line.strip('\n'))
client.close()

This prints out the results of executing ls on a remote server. The host
key b'AAA...' should of course be replaced by the actual base64 encoding of the
host key. If you skip host key verification, the connection is not secure!

The following example scripts (in demos/) get progressively more detailed:

:demo_simple.py:
Calls invoke_shell() and emulates a terminal/TTY through which you can
execute commands interactively on a remote server. Think of it as a
poor man's SSH command-line client.

:demo.py:
Same as demo_simple.py, but allows you to authenticate using a private
key, attempts to use an SSH agent if present, and uses the long form of
some of the API calls.

:forward.py:
Command-line script to set up port-forwarding across an SSH transport.

:demo_sftp.py:
Opens an SFTP session and does a few simple file operations.

:demo_server.py:
An SSH server that listens on port 2200 and accepts a login for
'robey' (password 'foo'), and pretends to be a BBS. Meant to be a
very simple demo of writing an SSH server.

:demo_keygen.py:
A key generator similar to OpenSSH ssh-keygen(1) program with
Paramiko keys generation and progress functions.

Use

The demo scripts are probably the best example of how to use this package.
Also a lot of documentation is generated by Sphinx autodoc, in the
doc/ folder.

There are also unit tests here::

$ pip install -r dev-requirements.txt
$ pytest

Which will verify that most of the core components are working correctly.

To test Kerberos/GSSAPI, you need a Kerberos environment. On UNIX you can
use the package k5test to setup a Kerberos environment on the fly::

$ pip install -r dev-requirements.txt
$ pip install k5test gssapi pyasn1
$ pytest
去到頂部