to run ssh type:
ssh -X user@hostnameThe -X allows X traffic to go back through the ssh connection.
To forward X11 connections use the -X flag
To forward a port, so that on the client machine you can use localhost:1234 to get to <server>:111 (so the server will see the connection coming locally, as if from inside the server) do
To forward a port, so that on the client machine you can use localhost:1234 to get to <other-server>:111 (where <other-server> will see the connection coming from <server>) do
To forward a port, so that on the server machine you can use localhost:1234 to get to <client>:111 (so the client will see the connection coming locally, as if from the client) do
To forward a port, so that on the server machine you can use localhost:1234 to get to <other-server>:111 (where <other-server> will see the connection coming from <server>) do
If you want the connection to actually come from any source (instead of just the client (-L) or the server (-R)), specify *: as a prefix to the above addresses. For example:
NOTE: try ssh_install_key script.
On the machine you want to login FROM, do the following:
ssh-keygen -t dsa -N "" -f $HOME/.ssh/id_dsa ssh-keygen -t rsa -N "" -f $HOME/.ssh/id_rsaThis creates
~/.ssh/id_dsa ~/.ssh/id_dsa.pub ~/.ssh/id_rsa ~/.ssh/id_rsa.pub
Now scp the id_dsa.pub files to the target machine (the machine you will be logging in TO) and cat it into ~/.ssh/authorized_keys2 as follows:
On the FROM machine scp ~/.ssh/id_*.pub user@remotehost: ssh user@remotehost (you will need a password) On remotehost: mkdir ~/.ssh chmod 700 ~/.ssh touch ~/.ssh/authorized_keys ln ~/.ssh/authorized_keys ~/.ssh/authorized_keys2 chmod 600 ~/.ssh/authorized_keys cat ~/id_dsa.pub >> ~/.ssh/authorized_keys rm ~/id_*sa.pub exit
Now you will be able to use ssh to login from the FROM machine to the TO machine without having to supply a password.
This will mention a line in the known_hosts file. Edit the file and delete the offending lines. Then try again. You will be prompted to be sure you want to connect to the unknown host. If you are sure you are not being spoofed, say yes.
On client, do the following to remove the old host key for the server <server-hostname> :
ssh-keygen -R <server-hostname>
chmod 700 ~/.ssh chmod go-w ~ # may make ssh happy ssh-vulnkeys # will show if any keys are vulnerable
This info is from http://www.noah.org/ssh/cygwin-sshd.html
Install the following Cygwin packages (rerun setup if necessary -- you can add packages after you have already installed Cygwin).
Admin --> cygrunsrv Net --> openssh
Open a new bash shell window and run the SSH configure stuff.
ssh-host-config -y
This step will create necessary configuration files, a priviledge separation user and necessary directories.
When prompted with "CYGWIN=" type for following:
tty ntsec
Now you are ready to start the service.
cygrunsrv -S sshd
Finished
Note: sshd will now be started automatically on reboot. To start by hand use one of
cygrunsrv --start sshd cygrunsrv -S sshd net start sshdand to stop use one of
cygrunsrv --stop sshd cygrunsrv -E sshd
On the machine you want to login FROM, do the following:
ssh-keygen -t rsa ssh-keygen -t dsaThis creates
~/.ssh/id_rsa ~/.ssh/id_rsa.pub ~/.ssh/id_dsa ~/.ssh/id_dsa.pub
Now scp the id_rsa.pub and id_dsa.pub files to the target machine (the machine you will be logging in TO) and cat them into ~/.ssh/authorized_keys2 as follows:
On the FROM machine scp ~/.ssh/id_*.pub user@remotehost: ssh user@remotehost (you will need a password) On remotehost: touch ~/.ssh/authorized_keys2 chmod 600 ~/.ssh/authorized_keys2 cat ~/id_rsa.pub >> ~/.ssh/authorized_keys2 cat ~/id_dsa.pub >> ~/.ssh/authorized_keys2 rm ~/id_*sa.pub exit
Now you will be able to use ssh to login from the FROM machine to the TO machine without having to supply a password.