Librenix
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

Tutorial: Mount remote directories with SSHFS on Ubuntu 11.10

Up
vote
Down

This tutorial explains how you can mount a directory from a remote server on the local server securely using SSHFS. SSHFS (Secure SHell FileSystem) is a filesystem that serves files/directories securely over SSH, and local users can use them just as if the were local files/directories. On the local computer, the remote share is mounted via FUSE (Filesystem in Userspace). I will use Ubuntu 11.10 for both the local and the remote server. read more...
permapage | score:8164 | -falko, December 6, 2011

Tutorial: Set up chrooted SSH/SFTP

Up
vote
Down

This tutorial describes how to give users chrooted SSH and/or chrooted SFTP access on Debian Squeeze. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of. I will also show how to restrict users to SFTP so that they cannot use SSH (this part is independent from the chroot part of this tutorial). read more...
permapage | score:8136 | -falko, September 6, 2011

Tutorial: Set up RAID1 on a remote Linux system vis SSH

Up
vote
Down

RAID-1 allows to create an exact copy of the original drive. Thus, it results into the increased fault tolerance and easy data recovery option for single server. It is true that the best and easy way to setup a RAID 1 is during installation. But if you forget to setup RAID – 1 during installation or if you have added new hard disk after installation, then this how-to covers setting up a RAID-1 mirroring on a running remote Linux system over ssh session. read more...
permapage | score:8069 | -nixcraft, June 21, 2006

sshpass: Automate ssh password authentication

Up
vote
Down

SSH’s (secure shell) most common authentication mode is called “interactive keyboard password authentication”, so called both because it is typically done via keyboard, and because openssh takes active measures to make sure that the password is, indeed, typed interactively by the keyboard.

Sometimes, however, it is necessary to fool ssh into accepting an interactive password non-interactively. This is where sshpass comes in. read more...
permapage | score:8059 | -gg234, May 5, 2008

Tutorial: SFTP chroot user jail with OpenSSH 5.x

Up
vote
Down

The OpenSSH 4.9-5.x updates now include built in jailing. It is still a little confusing, so I have written an update to my former 4.x tutorial.

This tutorial shows how to set up a safe chroot for your users. It offers chroot only and will deny all SSH access. It should only take about thirty minutes from start to finish including package download times if you don't already have them.

This method is safer because it doesn't allow the users access to any commands such as a compiler or the perl interpreter.
You will not need to install any extensive libraries or copy hundreds of files for functional use.

The user will be 'jailed' to any directory you choose which will mean that they will see "/home/username/" as just "/" disabling them from seeing your entire server or others users files while still using SECURE FTP. read more...
mail this link | permapage | score:8056 | -GO ILLINI, May 6, 2008

OpenWRT SSH

Up
vote
Down

Build an OpenWRT SSH server on a cheap, diskless, fanless, noiseless and very power-efficient home router...
Now I can tunnel my traffic through SSH using a home router with Linux. It was easy to set up and cheap. And I needed a router at home anyway. I have a basic Linux-like system, and the most interesting for me: OpenSSH. Also, it is small, quiet, power effective and reliable.

There are two popular Linux-based firmware projects for routers: OpenWrt and DD-WRT. The first thing you have to do is to pick the one you want. Check supported hardware before you decide.
read more...
mail this link | permapage | score:8025 | -Ray, December 20, 2010

Tutorial: SMTP over an SSH tunnel

Up
vote
Down

Make your email a little bit more private with the Secure Shell.
It is widely known that POP3 is a very insecure protocol, since it is a plain text protocol that transmits passwords and usernames with no protection. Anyone on a private network can quickly sniff packets and determine all the passwords used on the network. Although advances in POP3 authentication have surfaced (APOP, SSL, etc.) many servers still use the old plain text format.

SSH tunneling is the process of establishing a secure, encrypted tunnel between you and the mail host. This tunnel can be used for anything, but by using the Precommand feature of KMail, I will show you how to use a tunnel for POP3 and SMTP.
read more...
mail this link | permapage | score:8018 | -Ray, May 20, 2001 (Updated: June 8, 2003)

SSHFS: Securely Mount Remote Filesystem in RHEL

Up
vote
Down

It is possible to mount your remote filesystem as a local filesystem on your Red hat/CentOS Linux system using sshfs.

FUSE is a Linux kernel module also available for FreeBSD, OpenSolaris and Mac OS X that allows non-privileged users to create their own file systems without the need to write any kernel code. SSHFS command utilizes FUSE to mount a file system using ssh.

This tutorial will describe installing FUSE, and using sshfs to mount your remote filesystem as a local mount point on your Linux system. read more...
mail this link | permapage | score:8012 | -nixcraft, May 10, 2007

Tutorial: Set up Kojoney SSH Honeypot on CentOS 5.5

Up
vote
Down

Kojoney is a low level interaction honeypot that emulates an SSH server. The daemon is written in Python using the Twisted Conch libraries. In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated, (un)protected, and monitored, and which seems to contain information or a resource of value to attackers. This tutorial shows how you can compile and install an updated version of Kojoney on a CentOS 5.5 server. read more...
mail this link | permapage | score:7958 | -falko, October 4, 2010

Secure your VNC connection with SSH

Up
vote
Down

VNC stands for Virtual Network Computing. It is remote control software which allows you to view and fully interact with one computer desktop using a VNC viewer on another computer desktop anywhere on the LAN or Internet. The two computers don't even have to be the same type, so for example you can use VNC to view a Windows XP desktop at the office on a Linux or Mac computer at home.

Once you are connected, traffic between the viewer and the server is unencrypted, and could be sniffed by someone with access to the intervening network. Is security imported to you, we recommend tunneling the VNC protocol through some more secure channel such as SSH. This workshop describes how to connect from a Windows XP client to a Linux (OpenSuse 10.3) server via VNC and to tunnel this connection using SSH. read more...
mail this link | permapage | score:7939 | -fn-eagle, December 12, 2007

FreeBSD remote install over Linux via SSH

Up
vote
Down

From the not-intended-for-mass-usage dept., the depenguinator will let you turn your Linux box into a FreeBSD box remotely. Imagine the possibilities for insecure Linux systems turning into FreeBSD systems overnight, much to the surprise of the (original) owners...
Many computer systems around the world have been possessed by penguins; some have even been possessed by dead rats. In light of this, it is desireable to exorcize these evil spirits, and replace them with a nice, friendly daemon.

I've put together some code for building a FreeBSD disk image which will boot into memory, configure the network, set a root password, and enable SSH. This can be used to "depenguinate" a Linux box, without requiring any access beyond a network connection.
read more...
mail this link | permapage | score:7908 | -Ray, January 2, 2004

Tutorial: SSH Port forwarding

Up
vote
Down

This guide will get you up and tunneling your sessions over encrypted network connections.
SSH stands for Secure SHell, and it works very similar to the other login programs (it's based on Rsh, actually) with one important difference - it encrypts the entire communication session. When you enter your login and password they are encrypted before being sent. Likewise, everything you type and everything that comes back to you is encrypted as long as you're within that SSH session. The concept is very similar to how the military scrambles their radio communications to keep them from being intercepted by the enemy.
[If you still have problems in forwarding sessions over encrypted tunnels after reading the guide in the [read more] link below, try alternate SSH tunneling tutorial. -Ed] read more...
mail this link | permapage | score:7902 | -BluNereid, March 18, 2001 (Updated: April 1, 2005)

Tutorial: Disable SSH, use scponly for file transfer (Debian 6)

Up
vote
Down

scponly is an alternate shell that restricts users to SCP and SFTP logins, but disallows SSH logins. It is a wrapper to the OpenSSH suite of applications. With the help of scponly, you can allow your users to use clients such as WinSCP or FileZilla to upload/download files, but you refuse SSH logins (e.g. with PuTTY) so that your users cannot execute files/programs. This tutorial shows how to install and use scponly on Debian Squeeze. read more...
permapage | score:7811 | -falko, August 24, 2011

Securing SSH

Up
vote
Down

Yes, even OpenSSH is vulnerable...
Apart from past flaws in the OpenSSH daemon itself that have allowed remote compromise (very rare), most break-ins result from successful brute-force attacks. You can see them in your firewall, system or auth logs, they are an extremely common form of attack. Here is an excerpt from the /var/log/messages file on a CentOS Linux box (the attacking hostname has been obfuscated). You can see multiple attempts to login as users root and ftp. Also note the time between repeated attempts - one second or less, much too quick to be a human. This is an automated attack.
read more...
mail this link | permapage | score:7792 | -Ray, April 25, 2006

Tutorial: No password SSH login

Up
vote
Down

Open SSH is the most widely used SSH server on Linux. Using SSH, one can connect to a remote host and gain a shell access on it in a secure manner as all traffic is encrypted.

A neat feature of open SSH is to authenticate a user using a public/private key pair to log into the remote host. By doing so, you won't be prompted for the remote user's password.

This tutorial will describe how to create a SSH public/private key pair, how to enable key based authentication and finally how to disable password authentication. read more...
mail this link | permapage | score:7784 | -chantra, February 1, 2007

OpenSSH Cryptography Tutorial

Up
vote
Down

An introduction to OpenSSH on Unix / Linux...
OpenSSH, an OpenBSD project, is an incredibly secure implementation of the SSH protocol, a way of logging into a remote machine. For users of outdated protocols such as RSH, rlogin, and Telnet, it's an updated, secure replacement. For those who have never used anything like it, SSH can become a very valuable tool.

SSH is usually used to access a remote machine's shell, although there are other uses, such as:
read more...
permapage | score:7695 | -Ray, October 16, 2006

SSH Tricks

Up
vote
Down

Useful ssh tips and tricks...
SSH (secure shell) is a program enabling secure access to remote filesystems. Not everyone is aware of other powerful SSH capabilities, such as passwordless login, automatic execution of commands on a remote system or even mounting a remote folder using SSH! In this article we’ll cover these features and much more.
read more...
permapage | score:7692 | -Ray, July 6, 2006

Set up SFTP with OpenSSH

Up
vote
Down

Secure file transfer gets too little attention, perhaps because it is too easy. For secure file transfer without the need of special programs or clients, nothing more is needed than to have the OpenSSH server installed and running. It has a built-in SFTP subsystem that is available to any account that can log in. In other words, for basic SFTP access, nothing needs to be done other than have an account accessible via SSH. read more...
permapage | score:7628 | -falko, March 23, 2011

Compiling OpenSSH on Ubuntu Server

Up
vote
Down

Find out how to compile OpenSSH on the latest version of Ubuntu, Ubuntu 7.04 Feisty Fawn Server, to get safely connected to your remote servers.
Installing the OpenSSH client and server on Ubuntu is as easy as typing "sudo apt-get install openssh" at a terminal prompt. However, this will install Portable OpenSSH version 4.3p2[-8ubuntu1]. Unfortunately for users, this version of Portable OpenSSH does not include the "Match" functionality added to the SSH server in version 4.4p1, that "allows some configuration options to be selectively overridden if specific criteria (based on user, group, hostname and/or address) are met."
read more...
mail this link | permapage | score:7627 | -estride, May 31, 2007

Linux SSH Tutorial

Up
vote
Down

Learn the in's and out's of using SSH on your Linux box from this newly-rewritten tutorial.
This tutorial isn't going to cover how to install SSH, but will cover how to use it for a variety of tasks. Consult your Linux distribution's document for information on how to setup OpenSSH.

Chances are that if you are using a version of Linux that was installed within the last 4 or 5 years that you already have OpenSSH installed. The version of SSH that you will want to use on Linux is called OpenSSH. As of this writing (January 2006), the latest version available is 4.2, but you may encounter versions from 3.6 on up. If you are using anything lower than version 3.9, you should upgrade it.
read more...
mail this link | permapage | score:7592 | -Ray, March 4, 2006
More articles...
Buy Abstract Art Canvas Prints

Recent headlines

ATA over Ethernet (AoE) (Ubuntu 12.04)

Pre-release Ubuntu 12.10 has partial support for manual LVM and disk encryption

StartOS 6 GNOME 3 and KDE preview

PC-BSD 9.1 preview

Run Unity desktop on Linux Mint 12

Linux Iptables Examples

OpenShift Online: a non-developer guide

Plasma Media Center 1.1 and digiKam 3.3

Tutorial: Install Debian 7 (testing) with debootstrap from a Grml live Linux

Nuvola Player: Enjoy all your Cloud music services from one interface

How to install Orange in Ubuntu 13.04

Increase file descriptors for Transmission on Linux

LinSSID – Graphical wireless scanning for Linux

Tutorial: Debian 7 Samba Server with tdbsam

Installing FreeIPA with Replication

Detailed Error Handling In Bash

Apple DIY Repair

High-resolution text console with uvesafb in Debian/Ubuntu

Using OpenVZ on Debian 7 (AMD64)

Triple-boot Windows 7, Ubuntu 12.10 and Fedora 18 on one HDD

Tutorial: Fedora 19 Samba server with tdbsam

Tutorial: Ubuntu Jeos 12.04 LTS Spam Filter Gateway Server

E-book: Perl One-Liners Explained

Mixxx – The most advanced free DJ software

Alternative operating systems

Tutorial: Linux game programming with Ogre 3D

Take Android Screenshots

GhostBSD 2.5 review

Better Grails apps with CSS

The future of PC-BSD

Apache2, mod_rewrite tutorial: Redirect requests by device

VPS: Xen vs. OpenVZ

Set up Oneiric PVHVM at Xen 4.1.2 Ubuntu 11.10 Dom0

Install Cinnamon on Fedora 19

Active Directory Integration with Centrify DirectControl Express on Ubuntu 11.10 (Oneiric)

This is not just about your personal privacy

Sagemath in the Cloud and Sagemath 5.11

OpenBSD Tutorial: Configure Ralink USB Wireless Adapter

Linux mail command examples: send mails from command line

PC-BSD 9.1 installer preview

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin