to run ssh type:
ssh -X user@hostnameThe -X allows X traffic to go back through the ssh connection.
To forward X11 connections use the -X flag
To forward a port, so that on the client machine you can use localhost:1234 to get to <server>:111 (so the server will see the connection coming locally, as if from inside the server) do
To forward a port, so that on the client machine you can use localhost:1234 to get to <other-server>:111 (where <other-server> will see the connection coming from <server>) do
To forward a port, so that on the server machine you can use localhost:1234 to get to <client>:111 (so the client will see the connection coming locally, as if from the client) do
To forward a port, so that on the server machine you can use localhost:1234 to get to <other-server>:111 (where <other-server> will see the connection coming from <server>) do
If you want the connection to actually come from any source (instead of just the client (-L) or the server (-R)), specify *: as a prefix to the above addresses. For example:
NOTE: try ssh_install_key script.
On the machine you want to login FROM, do the following:
ssh-keygen -t dsa -N "" -f $HOME/.ssh/id_dsa
ssh-keygen -t rsa -N "" -f $HOME/.ssh/id_rsa
This creates
~/.ssh/id_dsa
~/.ssh/id_dsa.pub
~/.ssh/id_rsa
~/.ssh/id_rsa.pub
Now scp the id_dsa.pub files to the target machine (the machine you will be logging in TO) and cat it into ~/.ssh/authorized_keys2 as follows:
On the FROM machine
scp ~/.ssh/id_*.pub user@remotehost:
ssh user@remotehost
(you will need a password)
On remotehost:
mkdir ~/.ssh
chmod 700 ~/.ssh
touch ~/.ssh/authorized_keys
ln ~/.ssh/authorized_keys ~/.ssh/authorized_keys2
chmod 600 ~/.ssh/authorized_keys
cat ~/id_dsa.pub >> ~/.ssh/authorized_keys
rm ~/id_*sa.pub
exit
Now you will be able to use ssh to login from the FROM machine to the TO machine without having to supply a password.
This will mention a line in the known_hosts file. Edit the file and delete the offending lines. Then try again. You will be prompted to be sure you want to connect to the unknown host. If you are sure you are not being spoofed, say yes.
On client, do the following to remove the old host key for the server <server-hostname> :
ssh-keygen -R <server-hostname>
chmod 700 ~/.ssh
chmod go-w ~ # may make ssh happy
ssh-vulnkeys # will show if any keys are vulnerable
This info is from http://www.noah.org/ssh/cygwin-sshd.html
Install the following Cygwin packages (rerun setup if necessary -- you can add packages after you have already installed Cygwin).
Admin --> cygrunsrv
Net --> openssh
Open a new bash shell window and run the SSH configure stuff.
ssh-host-config -y
This step will create necessary configuration files, a priviledge separation user and necessary directories.
When prompted with "CYGWIN=" type for following:
tty ntsec
Now you are ready to start the service.
cygrunsrv -S sshd
Finished
Note: sshd will now be started automatically on reboot. To start by hand use one of
cygrunsrv --start sshd
cygrunsrv -S sshd
net start sshd
and to stop use one of
cygrunsrv --stop sshd cygrunsrv -E sshd
On the machine you want to login FROM, do the following:
ssh-keygen -t rsa
ssh-keygen -t dsa
This creates
~/.ssh/id_rsa
~/.ssh/id_rsa.pub
~/.ssh/id_dsa
~/.ssh/id_dsa.pub
Now scp the id_rsa.pub and id_dsa.pub files to the target machine (the machine you will be logging in TO) and cat them into ~/.ssh/authorized_keys2 as follows:
On the FROM machine
scp ~/.ssh/id_*.pub user@remotehost:
ssh user@remotehost
(you will need a password)
On remotehost:
touch ~/.ssh/authorized_keys2
chmod 600 ~/.ssh/authorized_keys2
cat ~/id_rsa.pub >> ~/.ssh/authorized_keys2
cat ~/id_dsa.pub >> ~/.ssh/authorized_keys2
rm ~/id_*sa.pub
exit
Now you will be able to use ssh to login from the FROM machine to the TO machine without having to supply a password.