background preloader

Ssh

Facebook Twitter

HOWTO. Introduction OpenVPN is a full-featured SSL VPN which implements OSI layer 2 or 3 secure network extension using the industry standard SSL/TLS protocol, supports flexible client authentication methods based on certificates, smart cards, and/or username/password credentials, and allows user or group-specific access control policies using firewall rules applied to the VPN virtual interface.

HOWTO

OpenVPN is not a web application proxy and does not operate through a web browser. OpenVPN 2.0 expands on the capabilities of OpenVPN 1.x by offering a scalable client/server mode, allowing multiple clients to connect to a single OpenVPN server process over a single TCP or UDP port. OpenVPN 2.3 includes a large number of improvements, including full IPv6 support and PolarSSL support. This document provides step-by-step instructions for configuring an OpenVPN 2.x client/server VPN, including: The impatient may wish to jump straight to the sample configuration files: Intended Audience Additional Documentation.

Ssh

OpenSSH Tips and Tricks: Beyond Secure Shell. OpenSSH is one of the most vital tools on any Linux system, at least if you ever need to connect to another Linux system.

OpenSSH Tips and Tricks: Beyond Secure Shell

But OpenSSH is capable of doing much more than just providing a secure shell into another system. Most Linux users already know the bare basics of using OpenSSH. You use ssh to get a secure shell into a remote system, sftp for Secure FTP, and scp for copying files. All well and good. But OpenSSH can do quite a bit more than many users realize. X Forwarding The -X option is very useful if you're in a Linux environment and need to run a GUI app from another machine but display it locally. Let's say, for example, that you're on your laptop in a meeting but need to pull up a few notes from Tomboy that are on your PC.

Ssh -X user@host That will log you into the target system with X11 forwarding enabled. Note that you can use this on different operating systems as well. Quick and Dirty SOCKS Sound difficult? Ssh -ND 9999 user@hostname Use Yafc for Better SFTP yafc -nq. Getting started with SSH - Kimmo Suominen. The following sections hope to provide enough information to setup a user new to ssh with the appropriate files necessary for accessing remote hosts in a secure manner.

Getting started with SSH - Kimmo Suominen

Improvements to and comments about this document are welcome. Updated: The examples now show ssh version 2 commands, using OpenSSH. There are several security vulnerabilities in protocol version 1. Everyone should have already migrated to version 2 by now, so it was about time for me to also reflect best practises in this document.

I also updated the link section at the end of the document to better reflect today’s software selection. Contents About public key cryptography Public key cryptography uses a public key to encrypt data and a private key to decrypt it. What this means is that it is safe to send your public key (i.e. the contents of the ~/.ssh/id_rsa.pub file) in electronic mail or by other means e.g. to have a system administrator of a remote site install that key into your ~/.ssh/authorized_keys file. . #! ?