Librenix
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

ssh: Use Linux as a SOCKS5 proxy

Up
vote
Down

Did you know you could use ssh to create a SOCKS5 server?

This article explains how to create a SOCKS5 server in 1 command and how to add ip-based access control to it via iptables and tcp forwarder. read more...
permapage | score:9284 | -pkrumins, May 7, 2010

ZShaolin: vim, nmap, git, rsync, ssh for Android

Up
vote
Down

Remember ZShaolin? Yep, it’s that Android ninja tool that gives you zsh and a whole bunch of command-line applications on your Android device, minus the need to root it. read more...
permapage | score:8996 | -finid, November 9, 2012

Anyterm: Remote access without SSH

Up
vote
Down

Browser-based secure terminal access to remote systems...
Anyterm allows you to have secure terminal access to a server without needing any special software on a client machine beyond a Web browser. For example, with Anyterm you can open a terminal into your server from an Internet cafe. Because Anyterm uses a pseudo-terminal for communication with the shell, you can run most command-line tools from an Anyterm terminal running inside a Web browser.
read more...
permapage | score:8768 | -Ray, March 19, 2008

WiFi Hotspot Privacy with SSH Tunnelling

Up
vote
Down

Wish you had some privacy while working from a wireless hotspot?
The problem is that for it to be a good hotspot anyone needs to be able to use it. Now you are really “socializing” with the others around you since they can read your email, instant messaging and see what you are web browsing. To use SSH to protect your traffic you use the concept of port-forwarding. Use an encrypted SSH tunnel to a destination you reasonably trust and direct your activities through it. This encrypts your easy to read traffic over the exposed link of the wireless until it comes out of the SSH server and looks like normal traffic originating from there. Now our friends in the coffee shop cannot read our email, instant messaging or web pages
read more...
mail this link | permapage | score:8559 | -Ray, December 13, 2005

Parallel SSH Sessions

Up
vote
Down

Centrally control multiple SSH sessions to multiple remote hosts simultaneously..
If you want to increase your productivity with SSH, you can try a tool that lets you run commands on more than one remote machine at the same time. Parallel ssh, Cluster SSH, and ClusterIt let you specify commands in a single terminal window and send them to a collection of remote machines where they can be executed.

Why you would need a utility like this when, using openSSH, you can create a file containing your commands and use a bash for loop to run it on a list of remote hosts, one at a time? One advantage of a parallel SSH utility is that commands can be run on several hosts at the same time.
read more...
mail this link | permapage | score:8538 | -Ray, November 11, 2008

Tutorial: Mount remote directories with SSHFS on Ubuntu 11.10

Up
vote
Down

This tutorial explains how you can mount a directory from a remote server on the local server securely using SSHFS. SSHFS (Secure SHell FileSystem) is a filesystem that serves files/directories securely over SSH, and local users can use them just as if the were local files/directories. On the local computer, the remote share is mounted via FUSE (Filesystem in Userspace). I will use Ubuntu 11.10 for both the local and the remote server. read more...
permapage | score:8452 | -falko, December 6, 2011

GDB and SSH Tunneling

Up
vote
Down

This article explains how to use GDB and ssh to debug remote processes on embedded systems. The same technique could be used to debug processes running behind firewalls.
Ever debugged a program remotely and felt like telling your computer where to go and how to get there? Hopelessly adding calls to printf() and recompiling as a steady string of explectatives flow from your over-caffeinated brain waves.

Fear not! Help is on the way.
(here are some wave prints) read more...
mail this link | permapage | score:8397 | -Curt Brune, June 13, 2006 (Updated: April 24, 2012)

FreeBSD remote install over Linux via SSH

Up
vote
Down

From the not-intended-for-mass-usage dept., the depenguinator will let you turn your Linux box into a FreeBSD box remotely. Imagine the possibilities for insecure Linux systems turning into FreeBSD systems overnight, much to the surprise of the (original) owners...
Many computer systems around the world have been possessed by penguins; some have even been possessed by dead rats. In light of this, it is desireable to exorcize these evil spirits, and replace them with a nice, friendly daemon.

I've put together some code for building a FreeBSD disk image which will boot into memory, configure the network, set a root password, and enable SSH. This can be used to "depenguinate" a Linux box, without requiring any access beyond a network connection.
read more...
mail this link | permapage | score:8287 | -Ray, January 2, 2004

sslh – ssl/ssh multiplexer

Up
vote
Down

sslh accepts connections on specified ports, and forwards them further based on tests performed on the first data packet sent by the remote client.Probes for HTTP, SSL, SSH, OpenVPN, tinc, XMPP are implemented, and any other protocol that can be tested using a regular expression, can be recognised. A typical use case is to allow serving several services on port 443 (e.g. to connect to ssh from inside a corporate firewall, which almost never block port 443) while still serving HTTPS on that port. read more...
permapage | score:8190 | -gg234, January 9, 2013

Tutorial: Chroot SSH/SFTP on Debian

Up
vote
Down

This tutorial describes two ways how to give users chrooted SSH access. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of. The users will also be able to use SFTP in their chroot jails. read more...
permapage | score:8123 | -falko, September 9, 2007

SSH over Tor

Up
vote
Down

How to encrypt your traffic with SSH and tunnel it through Tor for privacy and security...
For communicating anonymously on the Internet you use Tor. For secure communications, so that nobody can read your private information you use SSH. Combine both, and you have a secure and anonymous communication. In this hack, we’ll show you how to use Tor to anonymize your SSH connections.
read more...
permapage | score:8113 | -Ray, June 4, 2007

Tutorial: Secure Chat with YTalk and SSH

Up
vote
Down

Encrypting your chat sessions with SSH.
Under normal conditions, when everybody trusts everybody else, YTalk, talk, ntalk, et cetera will work without any problems. Alas, I found the real world a little more difficult and disappointing. It turned out my buddies couldn't reach me because of firewalls. Either their firewall rules would block the UDP connection or my firewall rules would stop it. Then there was the issue of corporate firewalls and even the ISP who sometimes played the big brother by blocking certain ports for the protection of our Windows brethren. Rather than taking the time to reset my firewall to better rules and hoping my buddies could take the same effort for theirs, I opted for another approach: remote logging with SSH and using guest accounts expressly setup for the purpose.
read more...
mail this link | permapage | score:8099 | -Ray, February 19, 2003

Tutorial: Kippo SSH Honeypot (CentOS 5.5)

Up
vote
Down

Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker. Kippo is inspired, but not based on Kojoney. This tutorial shows how you can compile and install Kippo on a CentOS 5.5 server. read more...
permapage | score:8094 | -falko, April 3, 2011

Protect SSH from dictionary attacks with pam_abl

Up
vote
Down

Use pam_abl module to stop brute force attacks against your SSH server...
Practically all Unix and Linux servers run an SSH service to let administrators connect securely from remote locations. Unfortunately for security administrators, attacks on SSH services are popular today. In this article I'll show you how can you protect machines running SSH services from brute force attacks using the pam_abl plugin for SSH pluggable authentication modules (PAM).
read more...
permapage | score:8090 | -Ray, March 28, 2007

Secure NFS: Tunneling NFS over SSH

Up
vote
Down

The goal of this howto is building an NFS server that works on an SSH tunnel. This way all traffic between your hosts and the file server is encrypted and thus more secure. Normally you should enter a password every time you try to establish an SSH connection but since we could be mounting at bootup we will use ssh-keygen to create a keypair so we can login without entering a password. We will, however, limit that login session to executing just one command. read more...
permapage | score:8062 | -falko, September 28, 2006

sshguard: Security for OpenSSH

Up
vote
Down

Stop dictionary attacks against OpenSSH with sshguard...
OpenSSH provides a secure alternative to clear-text logins used by first-generation network protocols like Telnet and FTP. But it's not enough simply to use SSH instead of Telnet -- you have to use it wisely. If you use weak passwords with SSH, a brute force dictionary attack will reveal your secrets as easily as if your password were sent in clear text.
read more...
permapage | score:8031 | -Ray, March 9, 2007

Linux SSH Tutorial

Up
vote
Down

Learn the in's and out's of using SSH on your Linux box from this newly-rewritten tutorial.
This tutorial isn't going to cover how to install SSH, but will cover how to use it for a variety of tasks. Consult your Linux distribution's document for information on how to setup OpenSSH.

Chances are that if you are using a version of Linux that was installed within the last 4 or 5 years that you already have OpenSSH installed. The version of SSH that you will want to use on Linux is called OpenSSH. As of this writing (January 2006), the latest version available is 4.2, but you may encounter versions from 3.6 on up. If you are using anything lower than version 3.9, you should upgrade it.
read more...
mail this link | permapage | score:8006 | -Ray, March 4, 2006

Tutorial: No password SSH login

Up
vote
Down

Open SSH is the most widely used SSH server on Linux. Using SSH, one can connect to a remote host and gain a shell access on it in a secure manner as all traffic is encrypted.

A neat feature of open SSH is to authenticate a user using a public/private key pair to log into the remote host. By doing so, you won't be prompted for the remote user's password.

This tutorial will describe how to create a SSH public/private key pair, how to enable key based authentication and finally how to disable password authentication. read more...
mail this link | permapage | score:8000 | -chantra, February 1, 2007

sshpass: Automate ssh password authentication

Up
vote
Down

SSH’s (secure shell) most common authentication mode is called “interactive keyboard password authentication”, so called both because it is typically done via keyboard, and because openssh takes active measures to make sure that the password is, indeed, typed interactively by the keyboard.

Sometimes, however, it is necessary to fool ssh into accepting an interactive password non-interactively. This is where sshpass comes in. read more...
permapage | score:7999 | -gg234, May 5, 2008

Tutorial: SFTP chroot user jail with OpenSSH 5.x

Up
vote
Down

The OpenSSH 4.9-5.x updates now include built in jailing. It is still a little confusing, so I have written an update to my former 4.x tutorial.

This tutorial shows how to set up a safe chroot for your users. It offers chroot only and will deny all SSH access. It should only take about thirty minutes from start to finish including package download times if you don't already have them.

This method is safer because it doesn't allow the users access to any commands such as a compiler or the perl interpreter.
You will not need to install any extensive libraries or copy hundreds of files for functional use.

The user will be 'jailed' to any directory you choose which will mean that they will see "/home/username/" as just "/" disabling them from seeing your entire server or others users files while still using SECURE FTP. read more...
mail this link | permapage | score:7987 | -GO ILLINI, May 6, 2008
More articles...
Buy Abstract Art Canvas Prints

Recent headlines

Tahoe Least-Authority File System for secure, distributed data storage

Dual-boot Windows 7 and Ubuntu 12.04 on a PC with UEFI board, SSD and HDD

Ubuntu Edge: Is there life after an unsuccessful crowd-funding campaign?

vsftpd: Local, Virtual users with bash script maintainance

Tutorial: Install SugarCRM CE on Fedora 10

LinSSID – Graphical wireless scanning for Linux

How to install Ajenti on Ubuntu 13.04 server

Tutorial: Fedora 19 Samba server with tdbsam

Encrypt mail with SSL certificates

Plasma Media Center 1.1 and digiKam 3.3

OpenShift Online: a non-developer guide

Tutorial: Automatically add a disclaimer to emails with alterMIME (Postfix on Debian 6)

Linux Iptables Examples

How to replace Ufw with Firewalld in Linux Mint 15

LG 8-inch G Pad 8.3 Android tablet

Install Apache2, PHP5, MySQL on CentOS 5.7

Tutorial: Debian 7 Samba Server with tdbsam

webOS: The latest Linux distribution

Debian 6, Squid, Kerberos/LDAP authentication, Active Directory integration, Cyfin Reporter

Set up Ubuntu PV DomU via xen-image-create at Xen 3.3 Ubuntu Dom0 with Novell kernel 2.6.27

Hand of Thief trojan and your favorite Linux distribution

Does disk encryption really protect your data?

StartOS 6 GNOME 3 and KDE preview

Tutorial: Webcam streaming your desktop plus audio with ffmpeg, crtmpserver, Flowplayer

Tutorial: Run Joomla 1.7 on Nginx on Debian 6, Ubuntu 11.10

PDNSD HowTo: A DNS Caching Personal Server

Linpus Lite 1.9 review

GhostBSD 2.5 review

4 third-party repositories for Fedora 19

Run Unity desktop on Linux Mint 12

Tutorial: Replace Windows with Pinguy OS 11.10

Virtual Users/Domains with Postfix/Courier/MySQL/SquirrelMail (Debian 7)

Giada – Audio tool for DJs, live performers and electronic musicians

Tutorial: USB-Over-IP server, Client on Ubuntu 10.04

The Coming HTML 5 Revolution in Linux

Tutorial: Install Lighttpd, PHP5, MySQL on CentOS 6.0

How to install postgresql 9.2 on Ubuntu 13.04 Server

Using Multiple PHP Versions (PHP-FPM FastCGI) With ISPConfig 3 (Ubuntu 12.04)

Reviewing Kali Linux - the distro for security geeks

Python Client/Server Tutorial

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin