Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # Tunnel
- ssh -2 -N -f -L 0.0.0.0:3389:10.24.5.3:3389 flycat@zzz.zzzz.zz
- # Reverse tunnel (from NATed computer)
- ssh user@server -2 -N -R 0.0.0.0:5544:localhost:22
- # SOCKS server to private net
- ssh -D
- # Make public key from private
- ssh-keygen -y -f ~/.ssh/id_rsa > ~/.ssh/id_rsa.pub
- # Copy public key to server
- ssh-copy-id -i ~/.ssh/id_rsa.pub flycat@zzz.zzzz.zz
- # Openssh change key password
- ssh-keygen -f id_rsa -p
- # Generate DNS records for SSH key's fingerprint:
- # https://simon.butcher.name/archives/2011/01/16/SSH-key-fingerprints-in-DNS
- for key in /etc/ssh/ssh_host_*_key.pub; do \
- ssh-keygen -r `hostname` -f $key; \
- done
- # In /etc/ssh/ssh_config
- VerifyHostKeyDNS yes
- # SSHFS fstab:
- sshfs#user@8.8.8.8:/dir /home/localdir fuse user,auto,port=22992,_netdev,reconnect,uid=1000,gid=1000,idmap=user,allow_other,IdentityFile=/home/user/.ssh/id_rsa 0 0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement