4337 links
  • Arnaud's links
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
page 1 / 1
69 results tagged ssh x
  • Note: fingerprint ssh pub key

    Pour générer le fingerprint (md5 ou sha256) de votre clé ssh publique
    Vous pouvez faire :

    ssh-keygen -lf ~/.ssh/id_ed25519.pub
    ou
    ssh-keygen -l -E md5 -f ~/.ssh/id_ed25519.pub

    C’est pratique pour faire la correspondance entre clé publique en local sur son poste et le fingerprint dans l’interface de Github ((https://github.com/settings/keys)

    January 9, 2023 at 2:29:58 PM GMT+1 - permalink - archive.org - https://links.infomee.fr/?DnYicw
    fingerprint github pub ssh
  • thumbnail
    Smallstep SSH — Single Sign-On SSH With Zero Key Management
    November 26, 2020 at 8:06:38 AM GMT+1 - permalink - archive.org - https://smallstep.com/sso-ssh/?utm_campaign=Cronweekly
    ssh
  • thumbnail
    avsm/docker-ssh-agent-forward: Forward SSH agent socket into a container
    July 30, 2019 at 8:26:21 AM GMT+2 - permalink - archive.org - https://github.com/avsm/docker-ssh-agent-forward
    docker mac mount ssh
  • AWS Systems Manager Session Manager - AWS Systems Manager

    interessant

    June 28, 2019 at 10:44:14 AM GMT+2 - permalink - archive.org - https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager.html
    aws ssh ssm
  • Frequently Asked Questions — Ansible Documentation
    June 27, 2019 at 5:28:27 PM GMT+2 - permalink - archive.org - https://docs.ansible.com/ansible/latest/reference_appendices/faq.html#how-do-i-configure-a-jump-host-to-access-servers-that-i-have-no-direct-access-to
    ansible bastion jump ssh
  • thumbnail
    Secure your instances with multi-factor authentication | AWS Startups Blog
    June 12, 2019 at 6:18:16 PM GMT+2 - permalink - archive.org - https://aws.amazon.com/fr/blogs/startups/securing-ssh-to-amazon-ec2-linux-hosts/
    aws mfa ssh
  • clush — clustershell 1.8.1 documentation
    May 14, 2019 at 1:30:22 PM GMT+2 - permalink - archive.org - https://clustershell.readthedocs.io/en/latest/tools/clush.html
    cluster ssh
  • thumbnail
    Scalable and secure access with SSH - Facebook Code

    j'avais perdu cet article, il est là!

    November 21, 2018 at 4:41:07 PM GMT+1 - permalink - archive.org - https://code.fb.com/security/scalable-and-secure-access-with-ssh/
    bastion ssh
  • Docker Tips : access the Docker daemon via ssh – @lucjuggery – Medium

    not bad! better than unprotected socket access ;)

    October 25, 2018 at 8:50:54 AM GMT+2 - permalink - archive.org - https://medium.com/lucjuggery/docker-tips-access-the-docker-daemon-via-ssh-97cd6b44a53?mkt_tok=eyJpIjoiTmpZNE5HWXdOVFJtWkRWbCIsInQiOiI1b0Zsb1RkNk4rXC9qSWtyajFCN3RsSERRQytkSk0wRzZkQ3dRU3g0eXM0YUV3R3RWM1dpb3dqNXpYVjc4MUlNMmpcL1ZIeGdLbk1yQjZYZjNIbjczOTBLOUY4YlBsSUVQRVZwMUg5bGZnNlRHOXpTaFdhdkIydnhmTFd1V0JyRE50In0%3D
    docker remote ssh
  • thumbnail
    GitHub - jirsbek/SSH-keys-in-macOS-Sierra-keychain: Saving SSH keys in macOS Sierra keychain

    Solution 1 (recommended)

    Apple updated its Technical Notes to indicate that since 10.12.2, macOS includes version 7.3p1 of OpenSSH and its new behaviors.

    In ~/.ssh create config file with the following content:

    Host * (asterisk for all hosts or add specific host)
    AddKeysToAgent yes
    UseKeychain yes
    IdentityFile <key> (e.g. ~/.ssh/userKey)

    June 11, 2018 at 10:09:42 PM GMT+2 - permalink - archive.org - https://github.com/jirsbek/SSH-keys-in-macOS-Sierra-keychain
    mac ssh
  • thumbnail
    How can I permanently add my SSH private key to Keychain so it is automatically available to ssh? - Ask Different
    June 3, 2018 at 2:04:56 PM GMT+2 - permalink - archive.org - https://apple.stackexchange.com/questions/48502/how-can-i-permanently-add-my-ssh-private-key-to-keychain-so-it-is-automatically
    mac ssh
  • Creating a persistent ssh tunnel in Ubuntu |

    autossh

    November 15, 2017 at 9:06:12 AM GMT+1 - permalink - archive.org - https://erik.torgesta.com/2013/12/creating-a-persistent-ssh-tunnel-in-ubuntu/
    ssh tunnel
  • thumbnail
    Kryptonite - The new way to protect your private key.
    April 25, 2017 at 7:15:15 AM GMT+2 - permalink - archive.org - https://krypt.co/
    mobile ssh
  • SSH Blamer

    Encore un exemple d'utilisation de env= dans le authorized keys

    via skunnyk

    August 1, 2016 at 5:09:11 PM GMT+2 - permalink - archive.org - http://damiengustave.fr/ssh-blamer/
    blame log ssh
  • Note: ssh-agent trick

    cat agentmanagement.sh

    variables=~/.ssh/variables

    sshadd() {
    source "$variables" > /dev/null
    ssh-add -l > /dev/null 2>&1
    case "$?" in
    1)
    ssh-add /root/.ssh/key > /dev/null 2>&1
    ;;
    2)
    rm "$variables"
    sshagent
    ;;
    esac
    }

    sshagent() {
    if [ -f "$variables" ] ; then
    sshadd
    else
    ssh-agent -s > $variables
    sshadd
    fi
    }

    sshagent

    tail .bashrc

    source /root/agentmanagement.sh

    July 21, 2016 at 12:07:15 PM GMT+2 - permalink - archive.org - https://links.infomee.fr/?F4oSMA
    agent ssh
  • Carrying your Git settings around

    .ssh/authorized_keys

    environment="GIT_AUTHOR_NAME=Arnaud M",environment="GIT_AUTHOR_EMAIL=arnaud@foo.bar",environment="GIT_COMMITTER_NAME=Arnaud M",environment="GIT_COMMITTER_EMAIL=arnaud@foo.bar" ssh-rsa .....

    Peut être pratique quand plusieurs personnes commit depuis le même serveur (pour avoir un historique git avec les noms..)

    June 22, 2016 at 4:11:50 PM GMT+2 - permalink - archive.org - http://cweiske.de/tagebuch/carry-git-settings.htm
    git ssh
  • new openssh key format and bcrypt pbkdf
    January 18, 2016 at 10:27:29 AM GMT+1 - permalink - archive.org - http://www.tedunangst.com/flak/post/new-openssh-key-format-and-bcrypt-pbkdf
    ecdsa key ssh
  • thumbnail
    ccontavalli/ssh-ident

    To manage multiple identities

    November 12, 2015 at 5:29:35 PM GMT+1 - permalink - archive.org - https://github.com/ccontavalli/ssh-ident
    agent ssh
  • Using rsync from cron with ssh keys that have a passphrase | Me in IT

    It took me some time to figure this one out, as everybody is using rsync and ssh-keys without passphrases, but I insist that an ssh-key should have a passphrase.

    In my first attemts I got this error messages mailed to me by crontab:
    Permission denied (gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive).

    Here are the steps to automate a backup initiated from crontab using rsync, SSH and ssh-keys with a passphrase:

    Make a set of SSH keys.
    Setup SSH to use the agent automatically.
    Login once as the user who's cron will run the backup script. You will be asked for a passphrase. When the machine reboots, you will need to login once more, to enter the passphrase again.
    Make a backup script that includes some SSH variables.
    This script could be as simple as this:
    . /home/username/.ssh/variables
    rsync -avz --delete /data/ example.com:data
    
    N.B. This variables file only contains these lines:
    SSH_AUTH_SOCK=/tmp/ssh-DmFcb18036/agent.18036; export SSH_AUTH_SOCK;
    SSH_AGENT_PID=18037; export SSH_AGENT_PID;
    echo Agent pid 18037;
    Put that script in crontab.

    That should do it for you, as it works like a charm for me!

    November 12, 2015 at 5:24:01 PM GMT+1 - permalink - archive.org - https://meinit.nl/using-rsync-from-cron-with-ssh-keys-that-have-a-passphrase
    ssh
  • Enter your ssh-passphrase once, use it many times, even from crontab | Me in IT

    variables=~/.ssh/variables

    sshadd() {
    source "$variables" > /dev/null
    ssh-add -l > /dev/null 2>&1
    case "$?" in
    1)
    ssh-add > /dev/null 2>&1
    ;;
    2)
    rm "$variables"
    sshagent
    ;;
    esac
    }

    sshagent() {
    if [ -f "$variables" ] ; then
    sshadd
    else
    ssh-agent -s > $variables
    sshadd
    fi
    }

    sshagent

    November 12, 2015 at 5:23:46 PM GMT+1 - permalink - archive.org - https://meinit.nl/enter-your-ssh-passphrase-once-use-it-many-times-even-from-crontab
    ssh
  • thumbnail
    How to get exit status with Ruby's Net::SSH library? - Stack Overflow
    May 28, 2015 at 3:47:43 PM GMT+2 - permalink - archive.org - http://stackoverflow.com/questions/3386233/how-to-get-exit-status-with-rubys-netssh-library
    rake ruby ssh
  • Linux / UNIX: ssh command prompt

    <CR>
    tilde
    <key>

    April 24, 2015 at 10:20:13 AM GMT+2 - permalink - archive.org - http://www.cyberciti.biz/faq/openssh-linux-unix-osx-kill-hung-ssh-session/
    command prompt ssh
  • thumbnail
    ip - How to make ssh tunnel open to public? - Super User

    -R [bind_address:]port:host:hostport

    ssh -R *:8080:localhost:80 -N root@website.com
    or
    ssh -R 0.0.0.0:8080:localhost:80 -N root@website.com
    or
    ssh -R [::]:8080:localhost:80 -N root@website.com

    Note that if you use OpenSSH sshd server, the server's GatewayPorts option needs to be enabled (set to yes or clientspecified) for this to work (check file /etc/ssh/sshd_config on the server). Otherwise (default value for this option is no), the server will always force port bound on the loopback interface only.

    April 16, 2015 at 11:40:11 AM GMT+2 - permalink - archive.org - http://superuser.com/questions/588591/how-to-make-ssh-tunnel-open-to-public
    remote ssh tunnel
  • 'Re: exception in thread? in Net::SSH::Multi' - MARC

    errs = []
    def test_server(errs, server)
    lambda do |options|
    begin
    server =~ /(.+)@(.+)/
    server_name, user = $2, $1
    puts server_name
    s = Net::SSH.start(server_name, user)
    s.close
    s = server
    rescue Errno::EHOSTUNREACH, SocketError
    puts "echec connexion #{server} : #{$!}"
    errs << server
    s = nil
    end

        return s
    end

    end

    Net::SSH::Multi.start(:on_error => :warn) do |session|

    define the servers we want to use

    session.use &test_server(errs, 'root@srv-04')
    session.use &test_server(errs, 'root@srv-07')
    session.use &test_server(errs, 'root@srv-08')
    session.use &test_server(errs, 'root@fail-08.local')

    execute commands on all servers

    session.exec( "hostname" )

    run the aggregated event loop

    session.loop
    end

    unless errs.empty?
    puts "The command failed on #{errs.size} hosts"
    end

    January 23, 2015 at 3:05:30 PM GMT+1 - permalink - archive.org - http://marc.info/?l=ruby-talk&m=122278906522776&w=2
    multissh ruby ssh
  • thumbnail
    Why aren’t we using SSH for everything? — Medium
    January 18, 2015 at 2:47:54 PM GMT+1 - permalink - archive.org - https://medium.com/@shazow/ssh-how-does-it-even-9e43586e4ffc
    ssh
  • Mosh: the mobile shell
    January 18, 2015 at 2:47:04 PM GMT+1 - permalink - archive.org - https://mosh.mit.edu/
    client lag mobile ssh
  • thumbnail
    What is a SSH key fingerprint and how is it generated? - Super User

    Dans les logs d'accès ssh (/var/log/auth.log), si vous avez passé le loglevel de SSH à VERBOSE, vous pouvez voir pour chaque accès la clé qui a été utilisé.
    Le format est différent de celui dans authorized_keys pour des raisons de lisibilité j'imagine.. Pour faire la conversion depuis authorized_keys vers ce format :

    echo key | base64 | md5
    ou
    ssh-keygen -lf key.pub

    January 18, 2015 at 2:38:57 PM GMT+1 - permalink - archive.org - http://superuser.com/questions/421997/what-is-a-ssh-key-fingerprint-and-how-is-it-generated
    fingerprint key ssh
  • Using an ssh-agent, or how to type your ssh password once, safely.
    January 18, 2015 at 2:29:15 PM GMT+1 - permalink - archive.org - http://rabexc.org/posts/using-ssh-agent
    agent ssh
  • Sessions ssh en cours

    Trouver tous les pid des sessions ssh en cours :
    ss -tnp|grep ':22'
    ss -tp|grep ':22'|grep -Eo ',[0-9]+,'|grep -Eo '[0-9]+'

    Trouver depuis quand ces process sont démarrés :

    ps -eo pid,etimes|grep 26205

    26205 329840

    echo "$(date +%s) - 329743"|bc

    1419103787

    date -d@$(echo "$(date +%s) - 329743"|bc)

    Sat Dec 20 20:31:42 CET 2014

    One liner :

    start time

    for pid in $(ss -tp|grep ':22'|grep -Eo ',[0-9]+,'|grep -Eo '[0-9]+'); do date -d@$(echo "$(date +%s) - $(ps -o etimes -p $pid --no-headers)"|bc); done

    pid + start time

    for pid in $(ss -tp|grep ':22'|grep -Eo ',[0-9]+,'|grep -Eo '[0-9]+'); do echo -n "$pid : " && date -d@$(echo "$(date +%s) - $(ps -o etimes -p $pid --no-headers)"|bc); done

    Si le log level de ssh est en VERBOSE, on peut chercher dans auth.log le fingerprint de la clé publique correspondant à la date à laquelle une session ssh a démarré :

    zgrep sshd /var/log/auth.log*|grep Accepted|grep 'Dec 20'

    January 8, 2015 at 6:20:33 PM GMT+1 - permalink - archive.org - https://links.infomee.fr/?9HRSiQ
    ssh
  • Tyblog | SSH Kung Fu
    January 1, 2015 at 3:12:34 PM GMT+1 - permalink - archive.org - http://blog.tjll.net/ssh-kung-fu/
    ssh
  • The pitfalls of using ssh-agent, or how to use an agent safely
    January 1, 2015 at 3:12:14 PM GMT+1 - permalink - archive.org - http://rabexc.org/posts/pitfalls-of-ssh-agents
    security ssh
  • Exploitability: Attaquer ssh avec ssh-agent.
    January 1, 2015 at 2:41:38 PM GMT+1 - permalink - archive.org - http://exploitability.blogspot.fr/2011/10/attaquer-ssh-avec-ssh-agent.html
    security ssh
  • linux - Is it possible to get OpenSSH to log the public key that was used in authentication? - Server Fault

    Je préfère cette solution, à savoir passer sshd en VERBOSE.

    L'autre solution consiste à utiliser environment dans le fichier authorized_keys puis à écrire dans un fichier (à l'aide de .bashrc par exemple). Mais l'utilisateur peut modifier ce fichier..

    ssh-keygen -lf /path/to/public_key_file

    December 23, 2014 at 5:15:21 PM GMT+1 - permalink - archive.org - http://serverfault.com/questions/291763/is-it-possible-to-get-openssh-to-log-the-public-key-that-was-used-in-authenticat
    audit ssh
  • Russell91/sshrc · GitHub

    wow could be useful

    via skunnyk

    September 19, 2014 at 10:26:30 AM GMT+2 - permalink - archive.org - https://github.com/Russell91/sshrc
    dotconf dotrc linux rc ssh
  • SSH Cheat Sheet | pentestmonkey

    petit rappel
    cheatsheet bien faite

    September 3, 2014 at 10:30:31 AM GMT+2 - permalink - archive.org - http://pentestmonkey.net/cheat-sheet/ssh-cheat-sheet
    ssh
  • thumbnail
    https://github.com/NetSPI/sshkey-grab

    Bon ce code n'a pas marché chez moi... mais il faut bien garder en tête qu'une clé chargée avec un agent va résider en mémoire de manière non chiffrée ;)

    Et de la même manière, elle va résider en mémoire sur un hôte distant si on se connecte en 'ssh -A'. Donc potentiellement, quelqu'un qui a un accès root sur cette machine distante peut récupérer les clés privés des gens qui s'y connectent (en -A)

    github link via skunnyk

    July 21, 2014 at 4:16:55 PM GMT+2 - permalink - archive.org - https://github.com/NetSPI/sshkey-grab
    key security ssh
  • If you run SSHD in your Docker containers, you're doing it wrong!

    via skunnyk

    June 25, 2014 at 10:21:50 AM GMT+2 - permalink - archive.org - http://jpetazzo.github.io/2014/06/23/docker-ssh-considered-evil/
    docker ssh
  • SSHFS inversé (rsshfs) – ®om's blog
    June 16, 2014 at 8:19:24 PM GMT+2 - permalink - archive.org - http://blog.rom1v.com/2014/06/sshfs-inverse-rsshfs/
    ssh sshfs
  • Keep an Eye on SSH Forwarding! | /dev/random

    Quelques pistes pour monitorer le TCPforwarding

    June 3, 2014 at 3:03:36 PM GMT+2 - permalink - archive.org - http://blog.rootshell.be/2009/03/01/keep-an-eye-on-ssh-forwarding/
    forwarding ssh tcp tunnel
  • Performing UDP tunneling through an SSH connection
    • http://www.dest-unreach.org/socat/
    • http://superuser.com/questions/53103/udp-traffic-through-ssh-tunnel
    June 3, 2014 at 9:54:03 AM GMT+2 - permalink - archive.org - http://zarb.org/~gc/html/udp-in-ssh-tunneling.html
    dns networking ssh udp
  • Things I've found useful » Blog Archive » Bash SSH known_hosts tab completion

    This morning a discussion with a friend about various shells lead me to think it would be nice if my bash shell could tab complete hostnames from .ssh/known_hosts when I type ‘ssh <tab>’. I soon found this blog post which nicely documents how to do it. I made a directory in $HOME called .bash.completion and then added this to my .profile, which loops round any files in there, sourcing them individually:

    if [ -d ${HOME}/.bash.completion ]; then
    for file in ${HOME}/.bash.completion/* ; do
    source $file
    done
    fi

    All sorted. However, it wasn’t long before I discovered that ‘ssh user@<tab>’ doesnt work, I tend to use this quite a lot so wanted to see if I could fix up the bash function to support that use case. Bit of hacking around and I’ve got it working, the replacement ssh-completion file is shown below:

    Add bash completion for ssh: it tries to complete the host to which you

    want to connect from the list of the ones contained in ~/.ssh/known_hosts

    __ssh_known_hosts() {
    if [[ -f ~/.ssh/known_hosts ]]; then
    cut -d " " -f1 ~/.ssh/known_hosts | cut -d "," -f1
    fi
    }
    _ssh() {
    local cur known_hosts
    COMPREPLY=()
    cur="${COMP_WORDS[COMP_CWORD]}"
    known_hosts="$(__ssh_known_hosts)"
    if [[ ! ${cur} == - ]] ; then
    if [[ ${cur} ==
    @ ]] ; then
    COMPREPLY=( $(compgen -W "${known_hosts}" -P ${cur/@
    /}@ -- ${cur/*@/}) )
    else
    COMPREPLY=( $(compgen -W "${known_hosts}" -- ${cur}) )
    fi
    fi
    return 0
    }
    complete -o bashdefault -o default -o nospace -F _ssh ssh 2>/dev/null \
    || complete -o default -o nospace -F _ssh ssh

    May 26, 2014 at 10:06:39 AM GMT+2 - permalink - archive.org - http://usefulthings.org.uk/2013/04/bash-ssh-known_hosts-tab-completion/
    autocomplete ssh
  • How to log history and logins from multiple ssh-keys under one user account | Screenage

    Une astuce utile pour faire un audit des connexions par clé sur un compte (quand on a plusieurs personnes avec des clés différentes qui accèdent au meme user)

    Implémentation rapide :

    !/bin/bash

    #On convertit le authorized_keys pour ajouter la variable d'env

    cp ~/.ssh/authorized_keyz ~/.ssh/authorized_keyz.ORIGINAL

    IFS=$'\n'
    for line in $(cat .ssh/authorized_keys)
    do
    comment=$(echo $line|cut -d' ' -f3)
    echo "environment=\"SSH_USER=$comment\" $line" >> ~/.ssh/authorized_keyz.COMMENT
    done

    cp ~/.ssh/authorized_keyz.COMMENT ~/.ssh/authorized_keyz

    Puis dans le bashrc de l'user, ajouter ça :

    if [ "$SSHUSER" != "" ]; then
    now=$(date +%Y-%m-%d
    %H-%M-%S)
    echo $now : User $SSH_USER logged in >> ~/ssh-audit.log
    fi

    May 14, 2014 at 5:22:59 PM GMT+2 - permalink - archive.org - http://www.screenage.de/blog/2012/02/10/how-to-log-history-and-logins-from-multiple-ssh-keys-under-one-user-account-with-puppet/
    audit ssh
  • Twitter / climagic: Confuse people SSHing to your host with a redirect back to theirs - @jeekajoo ~/µblog https://fralef.me/links/?eGhuHQ

    Ahah a tester

    April 8, 2014 at 10:32:44 PM GMT+2 - permalink - archive.org - http://Twitter / climagic: Confuse people SSHing to your host with a redirect back to theirs - @jeekajoo ~/µblog https://fralef.me/links/?eGhuHQ
    ssh
  • AuthorizedKeysCommand : quand OpenSSH devient CloudSSH. Nan j'déconne. / GLMF-161 / GNU/Linux Magazine / Connect - Edition Diamond

    alternatives à authorized_keys

    via Skunnyk

    March 31, 2014 at 11:19:48 AM GMT+2 - permalink - archive.org - http://connect.ed-diamond.com/GNU-Linux-Magazine/GLMF-161/AuthorizedKeysCommand-quand-OpenSSH-devient-CloudSSH.-Nan-j-deconne
    ssh sys
  • Execute local script remotly and get ouput into a local log file

    Cool stuff :

    ssh user@server 'bash -s' < local_script.sh > local_script.log 2>&1

    January 31, 2014 at 3:53:51 PM GMT+1 - permalink - archive.org - https://links.infomee.fr/?ORnmyQ
    bash ssh
  • OpenSSH Tip: Check Syntax Errors before Restarting Server

    not bad
    $ sudo /usr/sbin/sshd -t
    $ echo $?

    January 8, 2014 at 4:14:58 PM GMT+1 - permalink - archive.org - http://www.cyberciti.biz/tips/checking-openssh-sshd-configuration-syntax-errors.html
    check config server ssh
  • Mosh: the mobile shell
    January 6, 2014 at 6:24:34 PM GMT+1 - permalink - archive.org - http://mosh.mit.edu/
    mobile serveur ssh
  • How to tunnel everything through SSH - fooninja.net

    In Firefox, the solution is easy. Simply type about:config in the address bar and set network.proxy.socks_remote_dns to true. This will have the remote end (i.e., the machine you are SSH’ing to) handle the DNS lookups.

    October 20, 2013 at 8:16:44 PM GMT+2 - permalink - archive.org - http://fooninja.net/2010/09/06/how-to-tunnel-everything-through-ssh/
    dns lookup ssh tunnel
  • Portknocking in bash

    Un serveur, mais surtout un client pour faire du port knocking

    October 15, 2013 at 10:32:22 AM GMT+2 - permalink - archive.org - http://www.prometheus-group.com/labs/unbounded/46-web-security/135-bash-pk.html
    bash knocking port portknocking serveur ssh
  • ssh config file : proxy

    Pour utiliser machinerebond pour accéder aux *.vm automatiquement :

    $ cat .ssh/config
    Host=machinerebond
    Hostname=machinerebond.fqdn.com
    User=root

    Host=*.distant
    User=root
    ProxyCommand=ssh -W %h:22 machinerebond

    Alternative :
    D'abord se co sur la machine rebond avec un -A pour ramener sa key dans l'agent distant
    Ensuite on peut se co sur les autres machines, mais plus long.

    Autres directives possibles :
    ServerAliveInterval 30
    ServerAliveCountMax 120

    Port 22000
    User fooey
    IdentityFile ~/.ssh/github.key
    LocalForward 9906 127.0.0.1:3306
    more : http://www.openbsd.org/cgi-bin/man.cgi?query=ssh_config&apropos=0&sektion=0&manpath=OpenBSD+Current&arch=i386&format=html

    October 10, 2013 at 11:36:42 AM GMT+2 - permalink - archive.org - https://links.infomee.fr/?0hyAJQ
    config memo proxy ssh
  • Tunnel SSH avec l'option -R - Yop

    Un exemple d'utilisation de -R

    September 26, 2013 at 9:31:23 PM GMT+2 - permalink - archive.org - http://blog.uggy.org/post/2006/02/17/76-ssh-r-ou-comment-monter-une-connexion-ssh-dans-le-sens-inverse
    ssh tunnel
  • Tynsoe projects
    September 26, 2013 at 9:11:09 PM GMT+2 - permalink - archive.org - http://projects.tynsoe.org/fr/stm/doc.php
    ssh tunnel
  • Configurer un serveur SFTP (FTP sur SSH) | Halpanet

    Donner un acces sftp chrooté

    July 23, 2013 at 10:18:14 PM GMT+2 - permalink - archive.org - http://www.halpanet.org/?q=content/configurer-un-serveur-sftp-ftp-sur-ssh
    chroot sftp ssh
  • Top 20 OpenSSH Server Best Security Practices
    May 8, 2013 at 6:21:58 PM GMT+2 - permalink - archive.org - http://www.cyberciti.biz/tips/linux-unix-bsd-openssh-server-best-practices.html
    debian knocking port secure ssh
  • http://artisan.karma-lab.net/faire-passer-trafic-tunnel-ssh
    April 4, 2013 at 11:12:16 PM GMT+2 - permalink - archive.org - http://artisan.karma-lab.net/faire-passer-trafic-tunnel-ssh
    socks ssh tunnel
  • Tunnel ssh : ssh -L (local) et ssh -R (remote) en bref - Bienvenue sur Think-Underground.com
    November 26, 2012 at 4:21:19 PM GMT+1 - permalink - archive.org - http://www.think-underground.com/post/2007/02/24/398-tunnel-ssh-ssh-l-local-et-ssh-r-remote-en-bref
    ssh tunnel
  • SSHFS : montage de systèmes de fichiers via SSH - Wiki Fedora-Fr
    October 17, 2012 at 4:16:19 PM GMT+2 - permalink - archive.org - http://doc.fedora-fr.org/wiki/SSHFS_:_montage_de_syst%C3%A8mes_de_fichiers_via_SSH
    montage mount ssh sshfs
  • Tester le débit réseau entre deux machines Linux - Tux-planet
    September 22, 2012 at 9:23:18 PM GMT+2 - permalink - archive.org - http://www.tux-planet.fr/tester-le-debit-reseau-entre-deux-machines-linux/
    debit network scp ssh test
  • How to Install AjaxTerm Tutorial
    August 30, 2012 at 6:15:34 PM GMT+2 - permalink - archive.org - http://mewbies.com/how_to_install_ajaxterm_tutorial.htm
    base client ssh web
  • Ajaxterm- A web based terminal that help you use ssh from a web browser | Unixmen
    August 30, 2012 at 5:12:05 PM GMT+2 - permalink - archive.org - http://www.unixmen.com/ajaxterm-a-web-based-terminal-that-help-you-use-ssh-from-a-web-browser/
    base client ssh web
  • Remmina - The GTK+ Remote Desktop Client
    July 26, 2012 at 2:13:49 PM GMT+2 - permalink - archive.org - http://remmina.sourceforge.net/
    linux ssh
  • PAC Manager | Free software downloads at SourceForge.net
    July 26, 2012 at 2:13:38 PM GMT+2 - permalink - archive.org - http://sourceforge.net/projects/pacmanager/
    linux ssh
  • How to enable IP Forwarding in Linux | MDLog:/sysadmin
    May 24, 2012 at 8:49:15 PM GMT+2 - permalink - archive.org - http://www.ducea.com/2006/08/01/how-to-enable-ip-forwarding-in-linux/
    ssh
  • Run an ssh tunnel in the background | | Life and ScienceLife and Science

    lancer un tunnel ssh en background

    March 5, 2012 at 1:32:48 PM GMT+1 - permalink - archive.org - http://justinratner.com/2011/04/run-an-ssh-tunnel-in-the-background/
    ssh tunnel
  • Protéger son serveur en utilisant Fail2Ban
    February 24, 2012 at 6:57:23 PM GMT+1 - permalink - archive.org - http://blog.nicolargo.com/2012/02/proteger-son-serveur-en-utilisant-fail2ban.html
    fail2ban linux security ssh
  • Configurer et utiliser SSH

    Generation de clé ssh, keygen ssh

    January 11, 2012 at 4:49:32 PM GMT+1 - permalink - archive.org - http://www.linux-france.org/prj/edu/archinet/systeme/ch13s03.html
    ssh
  • Sécurisation du serveur (SSH, firewall iptables, fail2ban...) - Alsacreations
    September 20, 2011 at 2:44:54 PM GMT+2 - permalink - archive.org - http://www.alsacreations.com/tuto/lire/622-Securite-firewall-iptables.html
    security ssh
  • Pilotez votre PC à distance avec SSH et VNC à travers un proxy
    September 13, 2011 at 11:51:28 AM GMT+2 - permalink - archive.org - http://dmesg.fr/categorie-reseau/42-acces-pc-distance-ssh-vnc-a-travers-proxy
    ssh tunnel
  • Trucs:Connection SSH sans mot de passe - Lea Linux
    April 24, 2011 at 8:31:03 PM GMT+2 - permalink - archive.org - http://www.lea-linux.org/documentations/index.php/Trucs:Connection_SSH_sans_mot_de_passe
    ssh
Links per page: 20 50 100
page 1 / 1
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Help/documentation