Librenix
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

ssh: Use Linux as a SOCKS5 proxy

Up
vote
Down

Did you know you could use ssh to create a SOCKS5 server?

This article explains how to create a SOCKS5 server in 1 command and how to add ip-based access control to it via iptables and tcp forwarder. read more...
permapage | score:9559 | -pkrumins, May 7, 2010

ZShaolin: vim, nmap, git, rsync, ssh for Android

Up
vote
Down

Remember ZShaolin? Yep, it’s that Android ninja tool that gives you zsh and a whole bunch of command-line applications on your Android device, minus the need to root it. read more...
permapage | score:9304 | -finid, November 9, 2012

Protect SSH from dictionary attacks with pam_abl

Up
vote
Down

Use pam_abl module to stop brute force attacks against your SSH server...
Practically all Unix and Linux servers run an SSH service to let administrators connect securely from remote locations. Unfortunately for security administrators, attacks on SSH services are popular today. In this article I'll show you how can you protect machines running SSH services from brute force attacks using the pam_abl plugin for SSH pluggable authentication modules (PAM).
read more...
permapage | score:9160 | -Ray, March 28, 2007

SSH over Tor

Up
vote
Down

How to encrypt your traffic with SSH and tunnel it through Tor for privacy and security...
For communicating anonymously on the Internet you use Tor. For secure communications, so that nobody can read your private information you use SSH. Combine both, and you have a secure and anonymous communication. In this hack, we’ll show you how to use Tor to anonymize your SSH connections.
read more...
permapage | score:8764 | -Ray, June 4, 2007

GDB and SSH Tunneling

Up
vote
Down

This article explains how to use GDB and ssh to debug remote processes on embedded systems. The same technique could be used to debug processes running behind firewalls.
Ever debugged a program remotely and felt like telling your computer where to go and how to get there? Hopelessly adding calls to printf() and recompiling as a steady string of explectatives flow from your over-caffeinated brain waves.

Fear not! Help is on the way.
(here are some wave prints) read more...
mail this link | permapage | score:8632 | -Curt Brune, June 13, 2006 (Updated: April 24, 2012)

sslh – ssl/ssh multiplexer

Up
vote
Down

sslh accepts connections on specified ports, and forwards them further based on tests performed on the first data packet sent by the remote client.Probes for HTTP, SSL, SSH, OpenVPN, tinc, XMPP are implemented, and any other protocol that can be tested using a regular expression, can be recognised. A typical use case is to allow serving several services on port 443 (e.g. to connect to ssh from inside a corporate firewall, which almost never block port 443) while still serving HTTPS on that port. read more...
permapage | score:8626 | -gg234, January 9, 2013

Anyterm: Remote access without SSH

Up
vote
Down

Browser-based secure terminal access to remote systems...
Anyterm allows you to have secure terminal access to a server without needing any special software on a client machine beyond a Web browser. For example, with Anyterm you can open a terminal into your server from an Internet cafe. Because Anyterm uses a pseudo-terminal for communication with the shell, you can run most command-line tools from an Anyterm terminal running inside a Web browser.
read more...
permapage | score:8601 | -Ray, March 19, 2008

Tutorial: Set up chrooted SSH/SFTP

Up
vote
Down

This tutorial describes how to give users chrooted SSH and/or chrooted SFTP access on Debian Squeeze. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of. I will also show how to restrict users to SFTP so that they cannot use SSH (this part is independent from the chroot part of this tutorial). read more...
permapage | score:8560 | -falko, September 6, 2011

Secure NFS: Tunneling NFS over SSH

Up
vote
Down

The goal of this howto is building an NFS server that works on an SSH tunnel. This way all traffic between your hosts and the file server is encrypted and thus more secure. Normally you should enter a password every time you try to establish an SSH connection but since we could be mounting at bootup we will use ssh-keygen to create a keypair so we can login without entering a password. We will, however, limit that login session to executing just one command. read more...
permapage | score:8552 | -falko, September 28, 2006

Tutorial: Set up RAID1 on a remote Linux system vis SSH

Up
vote
Down

RAID-1 allows to create an exact copy of the original drive. Thus, it results into the increased fault tolerance and easy data recovery option for single server. It is true that the best and easy way to setup a RAID 1 is during installation. But if you forget to setup RAID – 1 during installation or if you have added new hard disk after installation, then this how-to covers setting up a RAID-1 mirroring on a running remote Linux system over ssh session. read more...
permapage | score:8493 | -nixcraft, June 21, 2006

Tutorial: Kippo SSH Honeypot (CentOS 5.5)

Up
vote
Down

Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker. Kippo is inspired, but not based on Kojoney. This tutorial shows how you can compile and install Kippo on a CentOS 5.5 server. read more...
permapage | score:8410 | -falko, April 3, 2011

Tutorial: SFTP chroot user jail with OpenSSH 5.x

Up
vote
Down

The OpenSSH 4.9-5.x updates now include built in jailing. It is still a little confusing, so I have written an update to my former 4.x tutorial.

This tutorial shows how to set up a safe chroot for your users. It offers chroot only and will deny all SSH access. It should only take about thirty minutes from start to finish including package download times if you don't already have them.

This method is safer because it doesn't allow the users access to any commands such as a compiler or the perl interpreter.
You will not need to install any extensive libraries or copy hundreds of files for functional use.

The user will be 'jailed' to any directory you choose which will mean that they will see "/home/username/" as just "/" disabling them from seeing your entire server or others users files while still using SECURE FTP. read more...
mail this link | permapage | score:8382 | -GO ILLINI, May 6, 2008

Parallel SSH Sessions

Up
vote
Down

Centrally control multiple SSH sessions to multiple remote hosts simultaneously..
If you want to increase your productivity with SSH, you can try a tool that lets you run commands on more than one remote machine at the same time. Parallel ssh, Cluster SSH, and ClusterIt let you specify commands in a single terminal window and send them to a collection of remote machines where they can be executed.

Why you would need a utility like this when, using openSSH, you can create a file containing your commands and use a bash for loop to run it on a list of remote hosts, one at a time? One advantage of a parallel SSH utility is that commands can be run on several hosts at the same time.
read more...
mail this link | permapage | score:8379 | -Ray, November 11, 2008

SSHerminator: Split screen terminal and SSH client

Up
vote
Down

SSHerminator is a terminal emulator based on Terminator, with extra SSH features.The aim of this project is not to provide a standard, general use Terminal emulator, but an emulator that provides as rich an experience as possible while using SSH (that can also be used as a standard terminal).SSHerminator is a semi-fork of Terminator. We sync up with the Terminator code as often as possible, to get the best Terminator features, but include our SSH hacks. read more...
permapage | score:8354 | -gg234, February 20, 2009

Tutorial: Secure Chat with YTalk and SSH

Up
vote
Down

Encrypting your chat sessions with SSH.
Under normal conditions, when everybody trusts everybody else, YTalk, talk, ntalk, et cetera will work without any problems. Alas, I found the real world a little more difficult and disappointing. It turned out my buddies couldn't reach me because of firewalls. Either their firewall rules would block the UDP connection or my firewall rules would stop it. Then there was the issue of corporate firewalls and even the ISP who sometimes played the big brother by blocking certain ports for the protection of our Windows brethren. Rather than taking the time to reset my firewall to better rules and hoping my buddies could take the same effort for theirs, I opted for another approach: remote logging with SSH and using guest accounts expressly setup for the purpose.
read more...
mail this link | permapage | score:8345 | -Ray, February 19, 2003

OpenWRT SSH

Up
vote
Down

Build an OpenWRT SSH server on a cheap, diskless, fanless, noiseless and very power-efficient home router...
Now I can tunnel my traffic through SSH using a home router with Linux. It was easy to set up and cheap. And I needed a router at home anyway. I have a basic Linux-like system, and the most interesting for me: OpenSSH. Also, it is small, quiet, power effective and reliable.

There are two popular Linux-based firmware projects for routers: OpenWrt and DD-WRT. The first thing you have to do is to pick the one you want. Check supported hardware before you decide.
read more...
mail this link | permapage | score:8290 | -Ray, December 20, 2010

Set up SSH with Public-Key Authentication

Up
vote
Down

This guide explains how to set up an SSH server on Debian Etch with public-key authorization (and optionally with disabled password logins). SSH is a great tool to control Linux-based computers remotely. It is safe and secure. read more...
permapage | score:8247 | -falko, March 30, 2008

Tutorial: Set up Kojoney SSH Honeypot on CentOS 5.5

Up
vote
Down

Kojoney is a low level interaction honeypot that emulates an SSH server. The daemon is written in Python using the Twisted Conch libraries. In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated, (un)protected, and monitored, and which seems to contain information or a resource of value to attackers. This tutorial shows how you can compile and install an updated version of Kojoney on a CentOS 5.5 server. read more...
mail this link | permapage | score:8194 | -falko, October 4, 2010

HPN-SSH: Multithreaded SSH

Up
vote
Down

This performance-enhanced SSH/SCP variant also dynamically allocates and sizes the receive buffers for substantial performance inprovement.
This cipher mode introduces multi-threading into the OpenSSH application in order to allow it to make full use of CPU resources available on multi-core systems. As the canonical distribution of OpenSSH is unable to make use of more than one core, high performance transfers can be bottlenecked by the cryptographic overhead.
read more...
permapage | score:8177 | -Ray, February 13, 2008

SSHFS Tutorial: How to use the SSH filesystem

Up
vote
Down

This short and sweet article has the steps you need to set up and use sshfs.
SSHFS is a really nice piece of software, because it just makes your life just a bit easier. It can 'mount' a directory of a remote SSH server and you can use it as a normal directory.
read more...
permapage | score:8148 | -Ray, August 23, 2006 (Updated: March 24, 2007)
More articles...
Abstract Art Prints by Ray Yeargin

Recent headlines

PC-BSD 9.1 preview

10 basic examples of Linux ps command

Stella: RH/CentOS 6.3 based Desktop OS

Tutorial: Install Debian 7 (testing) with debootstrap from a Grml live Linux

Upgrade Fedora 18 to 19 With FedUp

LinSSID – Graphical wireless scanning for Linux

Pre-release Ubuntu 12.10 has partial support for manual LVM and disk encryption

HowTo: HTTP Status: 206 Partial Content and Range Requests Using Curl

StartOS 6 GNOME 3 and KDE preview

How to install Ajenti on Ubuntu 13.04 server

webOS: The latest Linux distribution

Debian 6, Squid, Kerberos/LDAP authentication, Active Directory integration, Cyfin Reporter

LG 8-inch G Pad 8.3 Android tablet

Nuvola Player: Enjoy all your Cloud music services from one interface

Tutorial: Webcam streaming your desktop plus audio with ffmpeg, crtmpserver, Flowplayer

I quit using Linux because…

Tahoe Least-Authority File System for secure, distributed data storage

Epoptes – Open source computer lab management and monitoring tool

Ubuntu Edge: Is there life after an unsuccessful crowd-funding campaign?

Setup Nginx + php-FPM + apc + MariaDB on Debian: The perfect LEMP server

ROSA Desktop Fresh R1: For advanced users, but even better for new users

Tutorial: Replace Windows with Ubuntu 13.04

Virtual Users/Domains with Postfix/Courier/MySQL/SquirrelMail (Debian 7)

Giada – Audio tool for DJs, live performers and electronic musicians

Usability, user-friendliness and the Linux desktop

Linux mail command examples: send mails from command line

Plasma Media Center 1.1 and digiKam 3.3

Unix: Shell Script Wrapper Examples

Sagemath in the Cloud and Sagemath 5.11

Install Cinnamon on Fedora 19

Tutorial: Running CS-Cart on Nginx on Debian 7/Ubuntu 13.04

Dual-boot Ubuntu 12.04 and Windows 7 on a computer with 2 hard drives

How to install postgresql 9.2 on Ubuntu 13.04 Server

ATA over Ethernet (AoE) (Ubuntu 12.04)

4 third-party repositories for Fedora 19

Pipelight – Using Silverlight in Linux browsers

PC-BSD 8.2 review

OpenShift Online: a non-developer guide

OpenBSD Tutorial: Configure Ralink USB Wireless Adapter

Install openQRM 5.1 on Debian 7

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin