diff options
| author | Vito Graffagnino <vito@graffagnino.xyz> | 2020-09-08 18:10:49 +0100 |
|---|---|---|
| committer | Vito Graffagnino <vito@graffagnino.xyz> | 2020-09-08 18:10:49 +0100 |
| commit | 3b0142cedcde39e4c2097ecd916a870a3ced5ec6 (patch) | |
| tree | 2116c49a845dfc0945778f2aa3e2118d72be428b /.cheat/cheat/ssh | |
| parent | 8cc927e930d5b6aafe3e9862a61e81705479a1b4 (diff) | |
Added the relevent parts of the .config directory. Alss add ssh config
Diffstat (limited to '.cheat/cheat/ssh')
| -rw-r--r-- | .cheat/cheat/ssh | 53 |
1 files changed, 53 insertions, 0 deletions
diff --git a/.cheat/cheat/ssh b/.cheat/cheat/ssh new file mode 100644 index 0000000..e4087a9 --- /dev/null +++ b/.cheat/cheat/ssh @@ -0,0 +1,53 @@ +# To ssh via pem file (which normally needs 0600 permissions): +ssh -i /path/to/file.pem user@example.com + +# To connect on an non-standard port: +ssh -p 2222 user@example.com + +# To connect and forward the authentication agent +ssh -A user@example.com + +# To execute a command on a remote server: +ssh -t user@example.com 'the-remote-command' + +# To tunnel an x session over SSH: +ssh -X user@example.com + +# Redirect traffic with a tunnel between local host (port 8080) and a remote +# host (remote.example.com:5000) through a proxy (personal.server.com): +ssh -f -L 8080:remote.example.com:5000 user@personal.server.com -N + +# To launch a specific x application over SSH: +ssh -X -t user@example.com 'chromium-browser' + +# To create a SOCKS proxy on localhost and port 9999 +ssh -D 9999 user@example.com + +# -X use an xsession, -C compress data, "-c blowfish" use the encryption blowfish +ssh user@example.com -C -c blowfish -X + +# For more information, see: +# http://unix.stackexchange.com/q/12755/44856 + +# Copy files and folders through ssh from remote host to pwd with tar.gz compression +# when there is no rsync command available +ssh user@example.com "cd /var/www/Shared/; tar zcf - asset1 asset2" | tar zxf - + +# Set up SSH Passwordless login using ssh keygen +# +# 1. On client, generate public/private keys + +ssh-keygen -t rsa + +# 2. Login to server and make sure that a .ssh directory exists in user's home directory. Create it otherwise. +# +# 3. Use ssh from client to upload the public key to the server, and place it in the users's .ssh directory and call it authorized_keys + +[user@client]$ cat .ssh/id_rsa.pub | ssh user@server 'cat >> .ssh/authorized_keys' + +# 4. Set Permissions on server + +[user@client]$ ssh user@server 'chmod 700 .ssh; chmod 640 .ssh/authorized_keys' + +# 5. Can now login to server with the use of password. + |
