Advertisement
flycat

SSH (keys, tunnels etc)

Oct 6th, 2011 (edited)
236
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 0.88 KB | None | 0 0
  1. # Tunnel
  2. ssh -2 -N -f -L 0.0.0.0:3389:10.24.5.3:3389 flycat@zzz.zzzz.zz
  3.  
  4. # Reverse tunnel (from NATed computer)
  5. ssh user@server -2 -N -R 0.0.0.0:5544:localhost:22
  6.  
  7. # SOCKS server to private net
  8. ssh -D
  9.  
  10. # Make public key from private
  11. ssh-keygen -y -f ~/.ssh/id_rsa > ~/.ssh/id_rsa.pub
  12.  
  13. # Copy public key to server
  14. ssh-copy-id -i ~/.ssh/id_rsa.pub flycat@zzz.zzzz.zz
  15.  
  16. # Openssh change key password
  17. ssh-keygen -f id_rsa -p
  18.  
  19. # Generate DNS records for SSH key's fingerprint:
  20. # https://simon.butcher.name/archives/2011/01/16/SSH-key-fingerprints-in-DNS
  21.     for key in /etc/ssh/ssh_host_*_key.pub; do \
  22.         ssh-keygen -r `hostname` -f $key; \
  23.     done
  24. # In /etc/ssh/ssh_config
  25. VerifyHostKeyDNS yes
  26.  
  27. # SSHFS fstab:
  28. sshfs#user@8.8.8.8:/dir /home/localdir fuse user,auto,port=22992,_netdev,reconnect,uid=1000,gid=1000,idmap=user,allow_other,IdentityFile=/home/user/.ssh/id_rsa 0 0
  29.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement