Then you can establish a secure tunnel with a command like this from the client machine: ssh -L 3333:foo.com:5432 [email protected] The first number in the -L argument, 3333, is the port number of your end of the tunnel; it can be chosen freely. The second number, 5432, is the remote end of the tunnel: the port number your server is using.
We have a 'jumpbox' that has to be used to make connections to all other servers. I currently have SCRT setup to tunnel through a port on my local computer to the jumpbox, which in turn is setup with port forwarding to many other servers. I am currently using passwords as authentication to those other servers, and everything works fine.
From the jumpbox I also have public keys on all the servers I touch, so if I need to ssh from the jumpbox command line, or run a script on the jumpbox that needs access to one of the other servers, I don't have to provide a password. That too is working fine.
Now, for the question...
I would now like to use keys vs. passwords to connect to the servers from SCRT. Reason being, because of SOX the passwords constantly change, and it is becoming a nightmare to keep up with. From what I'm reading on google it appears that SCRT is able to do this, but I wasn't able to figure it out. I generated a key from within SCRT but it failed when trying to upload. Also, I'm not sure if I need to just generate a key for the jumpbox, or do I need to do this for each server I connect to through the jumpbox? I just need some direction on how I can do this.
One more thing.. we have a mixture of openssh and tectia ssh on our servers, and it was a pain to setup the keys for all those servers. If there is anyway I can just create a key between SCRT and the jumpbox, and then let the existing keys between the jumpbox and servers be used, I would prefer to use that method.
I hope this makes sense..please let me know if this is possible and provide direction on how to make it happen.
Ssh Tunnel Iphone
Ssh Tunnel Socks Proxy
- Has hinted at by Jari Laamanen, the solution lies in this buffalo.nas-central.org thread. I have added root to a new group, which happend to be blocked from ssh access in the file /etc/sftponly.As pointed out in that thread, changing this file is only permanent if the line nasconfiggen -c sftp is commented out in /etc/init.d/sshd.sh.
- Need help with the reverse tunnel, here is my setup: Internal Network A and B - no internet access Internal Network C - internet.
- SUMMARY: SSH isn't doing anything. ssh [email protected]@.yserver.com ssh oshdfojsfsdof -psd sdfisdfjdsf (does nothing no matter what you pass to the commandline. No output, no errors, nothing) FULLY STORY: I recently installed Cygwin so that I could run some rsyncs utilizing SSH keys without having to figure out how to set this up on Windows.