using_ssh_for_connections_transfer_to_from_sdf
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
using_ssh_for_connections_transfer_to_from_sdf [2021/03/14 01:57] – [connecting to SDF from a network] hc9 | using_ssh_for_connections_transfer_to_from_sdf [2024/09/04 17:38] (current) – cleaned up a bit peteyboy | ||
---|---|---|---|
Line 22: | Line 22: | ||
On the client side, a lot of programs are available; you may be best off by using a search engine with the keywords '' | On the client side, a lot of programs are available; you may be best off by using a search engine with the keywords '' | ||
+ | |||
+ | |||
+ | How to get to an ssh client depends on your OS: [[ssh client]]. Special topics below take advantage of a popular free tool for Windows called ' | ||
===== SDF issues ===== | ===== SDF issues ===== | ||
Line 27: | Line 30: | ||
Here we discuss some peculiarities concerning SDF and SSH. | Here we discuss some peculiarities concerning SDF and SSH. | ||
- | ==== file and directory permissions | + | === file and directory permissions === |
[[using_ssh_for_connections_transfer_to_from_sdf# | [[using_ssh_for_connections_transfer_to_from_sdf# | ||
- | To make sure you have the right permissions, | + | To make sure you have the right permissions, |
+ | |||
+ | '' | ||
You should look up '' | You should look up '' | ||
- | ===== special topics ===== | + | ====== special topics |
- | ==== How to enable Port Tunneling and Why ==== | + | ===== How to enable Port Tunneling and Why ===== |
=== What is port tunneling good for === | === What is port tunneling good for === | ||
- | Port tunneling is the ability to tunnel from your internet point for presence back to SDF servers and use the SDF servers like a [[http:// | + | Port tunneling is the ability to tunnel from your internet point for presence back to SDF servers and use the SDF servers like a [[wp>SOCKS|Socks 4 Proxy]]. This allows your connection to be encrypted via SSL between your internet access point and SDF. This allows your traffic to be more secure if you are on a public internet access point |
=== What tools are needed === | === What tools are needed === | ||
Line 67: | Line 72: | ||
=== How to use the Tunnel you just enabled === | === How to use the Tunnel you just enabled === | ||
- | I am now going to configure Trillian (A great multi IM chat program) to use the Tunnel. It should be obvious how to configure other applications from these screenshots. \\ First click on the " | + | I am now going to configure Trillian (A great multi IM chat program) to use the Tunnel. It should be obvious how to configure other applications from these screenshots. \\ First click on the " |
{{: | {{: | ||
Line 73: | Line 78: | ||
Click on " | Click on " | ||
- | ==== SSH Public Key Authentication ==== | + | ===== SSH Public Key Authentication |
These instructions attempt to explain the basic concepts of SSH Public Key Authentication, | These instructions attempt to explain the basic concepts of SSH Public Key Authentication, | ||
- | //Note: Please make sure to have set the [[#sdf_permissions|correct permissions]] in your SDF account, before attempting to set up public key authentication!// | + | //Note: Please make sure to have set the [[#file_and_directory_permissions|correct permissions]] in your SDF account, before attempting to set up public key authentication!// |
Logging in with SSH key authentication means that you do not have to use your SDF account password. Instead, you generate a ' | Logging in with SSH key authentication means that you do not have to use your SDF account password. Instead, you generate a ' | ||
Line 99: | Line 104: | ||
You're almost done! Now you need to let the server know about your new key. After you do this, the ssh, scp and sftp programs will use the key files automatically. So (optionally, | You're almost done! Now you need to let the server know about your new key. After you do this, the ssh, scp and sftp programs will use the key files automatically. So (optionally, | ||
- | 0. Copy the contents in the Key Generator window (" | + | - Copy the contents in the Key Generator window (" |
- | + | | |
- | 1. Log in as normal and run the following commands. | + | |
- | + | | |
- | 2. '' | + | |
- | + | | |
- | 3. '' | + | |
- | + | | |
- | 4. '' | + | |
- | + | ||
- | 5. Open the authorized_keys file you just created in a text editor. | + | |
- | + | ||
- | 6. Paste the contents of that box in to the authorized_keys file. In PuTTY, right click copies and pastes. | + | |
- | + | ||
- | 7. Save the authorized_keys file. | + | |
You should now be able to log in using SSH Key Authentication. | You should now be able to log in using SSH Key Authentication. | ||
Line 131: | Line 129: | ||
You now have two new files in the ~/.ssh/ directory. These files are your public and private key and will be named id_rsa.pub and id_rsa respectively. The ssh, scp and sftp programs use these files automatically. To enable the server to recognize your key, follow these steps: | You now have two new files in the ~/.ssh/ directory. These files are your public and private key and will be named id_rsa.pub and id_rsa respectively. The ssh, scp and sftp programs use these files automatically. To enable the server to recognize your key, follow these steps: | ||
- | 1. Log in as normal and run the following commands. | + | - Log in as normal and run the following commands. |
- | + | | |
- | 2. '' | + | |
- | + | | |
- | 3. '' | + | |
- | + | | |
- | 4. '' | + | |
- | + | ||
- | 5. Open the authorized_keys file you just created in a text editor. | + | |
- | + | ||
- | 6. Paste the contents of your id_dsa.pub file in to the authorized_keys file. | + | |
- | + | ||
- | 7. Save the authorized_keys file. | + | |
You should now be able to log in using SSH Key Authentication. | You should now be able to log in using SSH Key Authentication. | ||
- | ==== connecting to SDF from a network ==== | + | ===== connecting to SDF from a network |
//... or configuring SSH clients to use a SOCKS proxy server// | //... or configuring SSH clients to use a SOCKS proxy server// | ||
Line 164: | Line 156: | ||
This client is often supplied by universities to their students. | This client is often supplied by universities to their students. | ||
- | |**1**|Access the settings dialogue under "Edit -> Settings" | + | - Access the settings dialogue under "Edit -> Settings" |
- | |**2**|Under the '' | + | |
- | + | | |
- | {{: | + | |
- | + | | |
- | |**3**|Under the "Firewall" | + | -Connect as normal! |
- | + | ||
- | {{: | + | |
- | + | ||
- | |**4**|Connect as normal!| | + | |
=== PuTTY === | === PuTTY === | ||
Line 179: | Line 167: | ||
A popular free SSH client. | A popular free SSH client. | ||
- | |**1**|Select in the left window " | + | - Select in the left window " |
- | + | | |
- | {{: | + | |
- | + | | |
- | |**2**|Enter in your details. Illustrated are those for TCD.| | + | |
- | |**3**|Connect as normal! (You may want to save these details for future use)| | + | |
=== Commandline ssh client === | === Commandline ssh client === |
using_ssh_for_connections_transfer_to_from_sdf.1615687035.txt.gz · Last modified: 2021/03/14 01:57 by hc9