SSH

From DiLab
Revision as of 22:14, 27 April 2012 by Leo (talk | contribs) (Removing a key from the known hosts file)
Jump to: navigation, search

Tunneling to socks proxy

From here: ssh-tunnel-socks-proxy

In short:

ssh -D 9999 username@ip-address-of-ssh-server
# Then set in Firefox to use a SOCKS proxy: “localhost", port 9999


Tunneling between any two ports

Say, you want to read a remote server web page, but there is only ssh port open on the server. If you have a valid user account to the server, then you can create a tunnel, like this:

ssh -f user@server.com -L 8080:server.com:80 -N

Now you can enter the following in your browser: http://server.com:8080

Or in general, -f means sit in background and -N menas do not execute any command:

ssh -f user@server.com -L my-local-port:server.com:server-port -N


Removing a key from the known hosts file

Note, you may run this for the hostname of the "old" computer and for the IP address.

ssh-keygen -R hostname


Using ssh with a private/public key

If you are using svn+ssh or just want automatic login without typing the password whenever using ssh, you may want to consider setting up public-private key authentication between the client and server machine. The server will have the public key, and the client will have the private key. This is how to set it up:

On the client: generate the public/private key pair

 cd ~/.ssh
 ssh-keygen -t dsa 

Copy the public key to your server, and add to ~/.ssh/authorized_keys file, like this:

 ssh-copy-id remote-machine

...or:

 ssh remote-machine 'cat >> .ssh/authorized_keys' < .ssh/id_dsa.pub

...or, if you prefer the long way (smile), do it like this:

 scp ./id_dsa.pub user@myserver.com:
 ssh user@myserver.com
 myserver>  cat id_dsa.pub >> .ssh/authorized_keys
 myserver>  rm id_dsa.pub
 myserver>  logout

Remember to check that your .ssh/ directory and files in there are not public readable, otherwise someone may steal your private key and get access to your server!

Done!

Turning the keys and identities on and off

You may want to use the following commands or even define aliases as below. Note, ssh -t <seconds> sets timeout for the open key. In the example below 10800 = 3 hours.

alias keyon="ssh-add -t 10800"
alias keyoff='ssh-add -D'
alias keylist='ssh-add -l'

Other links and info