raphman + ssh   47

The Monkeysphere Project
The Monkeysphere project's goal is to extend OpenPGP's web of trust to new areas of the Internet to help us securely identify servers we connect to, as well as each other while we work online. The suite of Monkeysphere utilities provides a framework to transparently leverage the web of trust for authentication of TLS/SSL communications through the normal use of tools you are familiar with, such as your web browser0 or secure shell.
gpg  security  software  ssh  web  trust  internet  authentication 
april 2014 by raphman
aluzzardi/wssh · GitHub
wssh is a SSH to WebSockets Bridge that lets you invoke a remote shell using nothing but HTTP
browser  terminal  ssh  web  python  shell  http  html 
march 2014 by raphman
apenwarr/sshuttle
Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
ssh  networking  vpn  tunnel  crypto  proxy 
august 2012 by raphman
Mosh: the mobile shell
Remote terminal application that allows roaming, supports intermittent connectivity, and provides intelligent local echo and line editing of user keystrokes.

Mosh is a replacement for SSH. It's more robust and responsive, especially over Wi-Fi, cellular, and long-distance links.

Mosh is free software, available for GNU/Linux, FreeBSD, and Mac OS X.
linux  mobile  shell  ssh  unix 
april 2012 by raphman
Python scripts for downloading files via SFTP - Monetate Engineering
We recently had to create a cron job that downloads some files over SFTP, which is different from the similarly named FTPS.

SFTP (Secure File Transfer Protocol) uses SSH to ensure the security of file transfers, unlike FTPS, which uses SSL.

The problem with downloading files over SFTP using a cron job, however, is that password-based authentication, which is what we were using to log into the SFTP server, normally only works in an interactive shell, where the user can physically type the password into the terminal. But shell scripts run by a cron job are non-interactive.

One way to get around this is to try passwordless authentication using SSH keys.

But let’s assume we really, really want to use password-based authentication.

We’re in luck: There are some ways to emulate an interactive shell using a script.

Below, we’ll present two approaches, both in Python. Each of these scripts can be run in a cron job.
python  ssh  cron  sftp 
march 2012 by raphman
Transparent Multi-hop SSH
It is often necessary to SSH through one host to get to another host. This article will walk you through configuring SSH so that the intermediate step is transparent.
ssh  howto 
march 2012 by raphman
socio quantum veda: SparkDC - automated file sharing over ssh
SparkDC is a simple command-line a tool that automates file sharing and downloading over ssh among a connected set of users through a central server. This version is specifically developed for IIT Delhi network. Nevertheless, the same hack can be extrapolated to any other network that has a common root folder and that has a good upload and download speed. These kind of networks are normally academic LANs and corporate networks. The code is on github.
filesharing  ssh  p2p  network 
march 2012 by raphman
Pylogsparser : a use case, visualizing ssh attacks in video
In this article we will show another possible application for the pylogsparser library. We will also discover a simple way to draw and use world maps with python.
python  logging  howto  visualization  map  security  ssh 
march 2012 by raphman
The spiped secure pipe daemon
Spiped is a tool for creating secure tunnels using a pre-shared key. You connect to a socket on one machine, and the "client-side" spiped you're running on that system opens a connection to the "server-side" spiped running on another machine, which then opens a connection to the predefined target.
networking  ssh  security  posix  tunnel  linux 
august 2011 by raphman
localtunnel: instantly show localhost to the rest of the world
"The easiest way to share localhost web servers to the rest of the world"
programming  proxy  server  ssh  webserver  tunnel  web 
june 2011 by raphman
SKD – Install SSH Keys Automatically V0.2-Andy Hawkins
SSH Key Distribution is a script to automatically install SSH keys on a large network of remote devices. Fully automated all you have to do is configure a list of servers and SKD will collect/generate keys on each machine, then distribute each server key to each server listed including the localhost.
networking  security  ssh  tools  deployment  sysadmin 
march 2011 by raphman
kippo - Project Hosting on Google Code
Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker.
honeypot  python  ssh  hacking  security 
february 2011 by raphman
Ksplice » Six things I wish Mom told me (about ssh) - System administration and software blog
"If you’ve ever seriously used a Linux system, you’re probably already familiar with at least the basics of ssh. But you’re hungry for more. In this post, we’ll show you six ssh tips that’ll help take you to the next level. "
ssh  tips  linux  ksplice  unix 
october 2010 by raphman
How to: Restrict Users to SCP and SFTP and Block SSH Shell Access with rssh
rssh is a restricted shell for use with OpenSSH, allowing only scp and/or sftp. It now also includes support for rdist, rsync, and cvs. For example, if you have a server which you only want to allow users to copy files off of via scp, without providing shell access, you can use rssh to do that.
rssh  tips  security  linux  ssh  scp  sysadmin  shell  how-to 
february 2010 by raphman
glandium.org » Blog Archive » SSH through jump hosts
I often need to connect to a server with ssh from another server because I don’t have direct access. I even gave a small configuration example to use such jump hosts using ProxyCommands.

A while ago, I got fed up to have to add new entries for each host I wanted to join with a jump server, especially when I only need these entries sporadicly, and decided to write a generic configuration. I ended up with this setup [...]
ssh  linux  debian  sysadmin  tip  proxy  network 
april 2009 by raphman
morethanreal: Tabe Ramen/TTY fun
In other words I needed to run a command on a different tty. It seemed that simply writing to the tty wouldn't work---the string wasn't actually "sent" to the terminal. Then I found out about TIOCSTI.

int main(int argc, char **argv)
{
char *cmd = "sudo /etc/init.d/ssh restart";
char nl = '\n';
int fd, i;

fd = open(some_tty, O_WRONLY);
for (i = 0; cmd[i]; i++) {
ioctl(fd, TIOCSTI, cmd+i);
}
ioctl(fd, TIOCSTI, &nl);

return 0;
}
tiocsti  tty  linux  tip  howto  ssh  hack  terminal  remote  console 
march 2009 by raphman
Nardol: As old as good: One Time Passwords
Nice article about how to use one-time passwords with Debian
otp  debian  sysadmin  passwords  password  linux  security  ssh  authentication  opie  pam 
september 2008 by raphman
Hotwire - A free object-oriented hypershell
"Hotwire is an object-oriented hypershell. It is a shell designed for systems programming (files, processes), and thus it is in the same conceptual category of software as the Unix shell+terminal and Windows PowerShell."
linux  shell  unix  ssh  commandline  cli  gnome  hotwire  terminal  hypershell  python 
august 2008 by raphman
SSH "triggers" - Ganneff's Little Blog
Using SSH keys to trigger actions on remote hosts is basically the same as a login to the machine and manually running a command - except you don't need to do it yourself, a script is doing it.
ssh  howto  linux  trigger  sysadmin 
may 2008 by raphman
autossh - Automatically restart SSH sessions and tunnels
autossh is a program to start a copy of ssh and monitor it, restarting it as necessary should it die or stop passing traffic.
ssh  linux  networking  tool 
may 2007 by raphman
OpenVPN - An Open Source VPN Solution by James Yonan
OpenVPN is a full-featured SSL VPN solution which can accomodate a wide range of configurations, including road warrior access, home/office/campus telecommuting, WiFi security, secure branch office linking, and enterprise-scale remote access solutions
linux  security  ssh  vpn 
november 2004 by raphman

Copy this bookmark:



description:


tags: