On Montag, 7. August 2023 16:33:26 CEST you wrote:
> On Montag, 7. August 2023 15:19:49 CEST you wrote:
> > Dear all,
> >
> > I just dist-upgraded my Raspberry Pi from buster to bookworm, and while
> >
> > ssh -Y...
> >
> > worked like a charm in before the update and I could start any X11 program
gene heskett wrote:
> On 8/7/23 10:51, B.M. wrote:
>>> ssh -Y -C -l myUser otherHostname.local -v
>>>
> Is the @ sign between myUser and otherhostname now optional?
He uses option -l login_name, which can be used alternatively to
login_name@destination.
On 8/7/23 10:51, B.M. wrote:
On Montag, 7. August 2023 15:19:49 CEST you wrote:
Dear all,
I just dist-upgraded my Raspberry Pi from buster to bookworm, and while
ssh -Y...
worked like a charm in before the update and I could start any X11 program
over ssh, it doesn't work anymore since then.
On Montag, 7. August 2023 15:19:49 CEST you wrote:
> Dear all,
>
> I just dist-upgraded my Raspberry Pi from buster to bookworm, and while
>
> ssh -Y...
>
> worked like a charm in before the update and I could start any X11 program
> over ssh, it doesn't work anymore since then. Executing
>
> ssh -
Hi Bernd
B.M. wrote:
I just dist-upgraded my Raspberry Pi from buster to bookworm, and while
This might very well be the reason for your problems. You should never
skip a release, bullseye in this case. Upgrading directly from
oldoldstable to stable will get you unpredictable results.
BTW,
Dear all,
I just dist-upgraded my Raspberry Pi from buster to bookworm, and while
ssh -Y...
worked like a charm in before the update and I could start any X11 program
over ssh, it doesn't work anymore since then. Executing
ssh -Y -C -l myUser otherHostname.local -v
I get
...
debug1: Requestin
Long Wind wrote:
> Thank Roberto!
> i find out the causei forget to install ssh on remote pcso it refuse ssh
> connection
Long Wing, the Chinese hero of the day :)
(i hope you are not insulted by this)
regards
On Tue, Feb 27, 2018 at 11:23:50PM +, Long Wind wrote:
>i have 2 pc connected to router
>it's easy to use ssh to transfer files
>but sometime it says ssh connection is refused
>maybe after i install wicd?
>what should i do? Thanks!
Provide the comple
On Thu, Sep 8, 2016 at 10:49 AM, Tim McDonough wrote:
> I have a very straightforward Debian Jessie machine on my network. For SSH
> it uses the standard/default Port 22 and accessing it via ssh works just
> fine from anywhere on the local network.
>
> I also have a NetGear router configured so th
On 9/8/2016 1:42 PM, Joe wrote:
On Thu, 8 Sep 2016 12:49:56 -0500
Tim McDonough wrote:
I have a very straightforward Debian Jessie machine on my network.
For SSH it uses the standard/default Port 22 and accessing it via ssh
works just fine from anywhere on the local network.
I also have a Net
On Thu, 8 Sep 2016 12:49:56 -0500
Tim McDonough wrote:
> I have a very straightforward Debian Jessie machine on my network.
> For SSH it uses the standard/default Port 22 and accessing it via ssh
> works just fine from anywhere on the local network.
>
> I also have a NetGear router configured so
I have a very straightforward Debian Jessie machine on my network. For
SSH it uses the standard/default Port 22 and accessing it via ssh works
just fine from anywhere on the local network.
I also have a NetGear router configured so that a connection from the
outside world using Port 1024 gets
Could be your ssh client proposing ciphers the SSH server doesn't
understand. This was known issue with communication of ssh client 5+ to ssh
server 4.x and older.
Give it a try and let us know.
http://www.held.org.il/blog/2011/05/the-myterious-case-of-broken-ssh-client-connection-reset-by-peer/
hey all :-)
unfortunately I don't have access to ssh server, I can only see:
Platform: i586-pc-linux-gnu
Compiled with: liblua-5.2.3 openssl-1.0.1k libpcre-8.35 libpcap-1.6.2
nmap-libdnet-1.12 ipv6
Compiled without:
Available nsock engines: epoll poll select
ssh -vvvl user ip
debug2: kex_par
Lisi writes:
> Forwarding this to the list, where it ought to have been all along. Sorry,
> Kelly.
Do you seriously expect someone to read a post which is messed up like
this and to try to figure out what it is about?
--
Debian testing iad96 brokenarch
--
To UNSUBSCRIBE, email to debian-
Forwarding this to the list, where it ought to have been all along. Sorry,
Kelly.
Lisi
-- Forwarded Message --
Subject: Re: ssh connection
Date: Tuesday 02 October 2012, 21:49:32
From: Lisi Reisz
To: Kelly Clowers
On 2 October 2012 17:46, Kelly Clowers wrote:
> On
Lisi Reisz:
> On 2 October 2012 21:24, Jochen Spieker wrote:
>>
>> And additionally, what's on the server's log for the aborted log in?
>
> I couldn't find one. Not, I fear, the same thing as "there isn't one". :-(
> Googling suggested that it would be called auth something, and I found
> file
On 2 October 2012 21:24, Jochen Spieker wrote:
> Kelly Clowers:
> > On Tue, Oct 2, 2012 at 7:17 AM, Lisi Reisz
> wrote:
> >>
> >> Anyone got any suggestions what I could try? Could I supply more
> helpful
> >> data? I have done a ssh -v and the result is below.
> >
> > What does your sshd conf
Kelly Clowers:
> On Tue, Oct 2, 2012 at 7:17 AM, Lisi Reisz wrote:
>>
>> Anyone got any suggestions what I could try? Could I supply more helpful
>> data? I have done a ssh -v and the result is below.
>
> What does your sshd config file look like on A? Are you using RSA
> certs for authenticat
On Tue, Oct 2, 2012 at 7:17 AM, Lisi Reisz wrote:
> I am trying to set up a small network of three machines to intercommunicate
> via ssh. Machines B and C are running Squeeze with Trinity DE, machine A is
> running Lenny with KDE3. (The other Squeeze machine turned up its toes and
> died this m
I am trying to set up a small network of three machines to intercommunicate
via ssh. Machines B and C are running Squeeze with Trinity DE, machine A
is running Lenny with KDE3. (The other Squeeze machine turned up its toes
and died this morning. :-( So I had to bring poor old Lenny back on
strea
On Tue, Aug 21, 2012 at 01:39:42PM +0800, lina wrote:
> I felt I made some mistakes before, like put the public keys from those
> servers into my own laptop, just for the convinence of connection.
> I am on my way correcting my mistakes.
Public keys are meant to be public, its the secret/private k
On Tuesday 21 August 2012 08:09:22 lina wrote:
> On Tuesday 21,August,2012 07:48 PM, Eike Lantzsch wrote:
> > On Monday 20 August 2012 09:59:47 lina wrote:
> >> Hi,
> >>
> >> I ssh to a server which has 400+ users, active ones around 100.
> >>
> >> Frankly speaking, I would feel comfortable to hi
On Tuesday 21,August,2012 07:48 PM, Eike Lantzsch wrote:
> On Monday 20 August 2012 09:59:47 lina wrote:
>> Hi,
>>
>> I ssh to a server which has 400+ users, active ones around 100.
>>
>> Frankly speaking, I would feel comfortable to hide my IP if possible,
>>
>> any suggestions (I checked the spoo
On Monday 20 August 2012 09:59:47 lina wrote:
> Hi,
>
> I ssh to a server which has 400+ users, active ones around 100.
>
> Frankly speaking, I would feel comfortable to hide my IP if possible,
>
> any suggestions (I checked the spoof, but seems not positive),
>
> Thanks with best regards,
Hi
On 8/21/12 8:20 AM, lina wrote:
> On Tuesday 21,August,2012 02:52 AM, Joe wrote:
>> On Mon, 20 Aug 2012 23:56:42 +0800
>> lina wrote:
>>
>>> On Monday 20,August,2012 11:45 PM, Mika Suomalainen wrote:
On 20.08.2012 18:38, lina wrote:
>>> How do I know who has this IP address? why s/he didn
On Tuesday 21,August,2012 03:12 AM, unruh wrote:
> Everyone suffers these attacks. They are simply part of a toolset which
> crackers use to try to gain entry into Linux machines. As long as you
> have good passwords do not worry. You will also suffer attacks on
> various Windows ports.
>
> If yo
On Tuesday 21,August,2012 02:52 AM, Joe wrote:
> On Mon, 20 Aug 2012 23:56:42 +0800
> lina wrote:
>
>> On Monday 20,August,2012 11:45 PM, Mika Suomalainen wrote:
>>> On 20.08.2012 18:38, lina wrote:
>> How do I know who has this IP address? why s/he didn't change?
>>
>> You probably d
On Mon, 2012-08-20 at 21:45 +0200, Ralf Mardorf wrote:
> On Mon, 2012-08-20 at 22:22 +0300, Lars Noodén wrote:
> > On 8/20/12 10:18 PM, Ralf Mardorf wrote:> On Mon, 2012-08-20 at 22:08
> > [snip]
> > > I thought using tor was a joke :( or a hint, that too much security at
> > > some point really is
On Mon, 2012-08-20 at 22:22 +0300, Lars Noodén wrote:
> On 8/20/12 10:18 PM, Ralf Mardorf wrote:> On Mon, 2012-08-20 at 22:08
> [snip]
> > I thought using tor was a joke :( or a hint, that too much security at
> > some point really is too much. I don't have much knowledge about the
> > Internet, bu
On 8/20/12 10:18 PM, Ralf Mardorf wrote:> On Mon, 2012-08-20 at 22:08
[snip]
> I thought using tor was a joke :( or a hint, that too much security at
> some point really is too much. I don't have much knowledge about the
> Internet, but I'm sure tor in this case (IMO in any case) is idiotic.
> Sorr
On Mon, 2012-08-20 at 22:08 +0300, Lars Noodén wrote:
> On 8/20/12 7:27 PM, lina wrote:
> > On Monday 20,August,2012 11:15 PM, Lars Noodén wrote:
> >> It looks like it is possible to use Tor as a proxy:
> >>
> >> http://www.howtoforge.com/anonymous-ssh-sessions-with-tor
> >>
> >> If this document i
On 20/08/12, Joe (j...@jretrading.com) wrote:
> On Mon, 20 Aug 2012 23:56:42 +0800
> lina wrote:
> > On Monday 20,August,2012 11:45 PM, Mika Suomalainen wrote:
> ...
> e.g in your INPUT chain, just before the ssh -j ACCEPT command:
>
> iptables -A INPUT -p tcp --dport 22 -j LOG --log-level debug
On 8/20/12 7:27 PM, lina wrote:
> On Monday 20,August,2012 11:15 PM, Lars Noodén wrote:
>> It looks like it is possible to use Tor as a proxy:
>>
>> http://www.howtoforge.com/anonymous-ssh-sessions-with-tor
>>
>> If this document is correct, it is very easy to set up. That would
>> obfuscate the i
On Mon, 20 Aug 2012 23:56:42 +0800
lina wrote:
> On Monday 20,August,2012 11:45 PM, Mika Suomalainen wrote:
> > On 20.08.2012 18:38, lina wrote:
> How do I know who has this IP address? why s/he didn't change?
>
> You probably don't. I don't understand this second question.
> >> Th
Now I read some more mails of this thread.
It's not surprising that everybody connected to the Internet is
attacked. "authentication failure" doesn't lead to a serious issue, but
vice versa it says the attacks were useless. And I'm sure, they will be
useless in the future too.
Lina, perhaps you a
On Monday 20,August,2012 11:15 PM, Lars Noodén wrote:
> It looks like it is possible to use Tor as a proxy:
>
> http://www.howtoforge.com/anonymous-ssh-sessions-with-tor
>
> If this document is correct, it is very easy to set up. That would
> obfuscate the ip number you are connecting from by ad
On Mon, 2012-08-20 at 23:56 +0800, lina wrote:
> On Monday 20,August,2012 11:45 PM, Mika Suomalainen wrote:
> > On 20.08.2012 18:38, lina wrote:
> How do I know who has this IP address? why s/he didn't change?
>
> You probably don't. I don't understand this second question.
> >> The
On Monday 20 August 2012 16:56:42 lina wrote:
> just a bit surprised that it keeps the same
> ip address.
Why?
Lisi
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/2
Le lundi 20 août 2012 à 23:38 +0800, lina a écrit :
> On Monday 20,August,2012 11:35 PM, Mika Suomalainen wrote:
> > On 20.08.2012 18:31, lina wrote:
> >> So I am under regular attacks recently, very gentle attack, only
> >> tried few times each day?
Too few attempts, none succeeded. Something on y
On Monday 20,August,2012 11:45 PM, Mika Suomalainen wrote:
> On 20.08.2012 18:38, lina wrote:
How do I know who has this IP address? why s/he didn't change?
You probably don't. I don't understand this second question.
>> The second question is that for those days, the attacker should
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 20.08.2012 18:38, lina wrote:
>>> How do I know who has this IP address? why s/he didn't change?
>>>
>>> You probably don't. I don't understand this second question.
> The second question is that for those days, the attacker should
> think of ren
On Monday 20,August,2012 11:35 PM, Mika Suomalainen wrote:
> On 20.08.2012 18:31, lina wrote:
>> So I am under regular attacks recently, very gentle attack, only
>> tried few times each day?
>
> At least your auth.log says so and it shouldn't lie.
>
>> How do I know who has this IP address? why s
On Monday 20,August,2012 11:33 PM, Mika Suomalainen wrote:
> On 20.08.2012 18:15, lina wrote:
>> BTW, what is the 172.21.48.161, seems in the old auth.log* also has
>> this one.
>
>> # zmore auth.log.2.gz | grep 172.21.48.161 Aug 5 16:05:13 Debian
>> sshd[15369]: Did not receive identification st
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 20.08.2012 18:31, lina wrote:
> So I am under regular attacks recently, very gentle attack, only
> tried few times each day?
At least your auth.log says so and it shouldn't lie.
> How do I know who has this IP address? why s/he didn't change?
Y
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 20.08.2012 18:15, lina wrote:
> BTW, what is the 172.21.48.161, seems in the old auth.log* also has
> this one.
>
> # zmore auth.log.2.gz | grep 172.21.48.161 Aug 5 16:05:13 Debian
> sshd[15369]: Did not receive identification string from
> 172.
On Monday 20,August,2012 11:21 PM, Darac Marjal wrote:
> On Mon, Aug 20, 2012 at 11:15:55PM +0800, lina wrote:
>> On Monday 20,August,2012 10:44 PM, Mika Suomalainen wrote:
>>> On 20.08.2012 17:02, lina wrote:
On Monday 20,August,2012 09:59 PM, lina wrote:
>> Hi,
>>
>> I ssh to a s
On Mon, Aug 20, 2012 at 11:15:55PM +0800, lina wrote:
> On Monday 20,August,2012 10:44 PM, Mika Suomalainen wrote:
> > On 20.08.2012 17:02, lina wrote:
> >> On Monday 20,August,2012 09:59 PM, lina wrote:
> Hi,
>
> I ssh to a server which has 400+ users, active ones around
> 100.
On Monday 20,August,2012 10:44 PM, Mika Suomalainen wrote:
> On 20.08.2012 17:02, lina wrote:
>> On Monday 20,August,2012 09:59 PM, lina wrote:
Hi,
I ssh to a server which has 400+ users, active ones around
100.
Frankly speaking, I would feel comfortable to hide my IP
It looks like it is possible to use Tor as a proxy:
http://www.howtoforge.com/anonymous-ssh-sessions-with-tor
If this document is correct, it is very easy to set up. That would
obfuscate the ip number you are connecting from by adding a jump in the
middle. The target server would only see that
On Monday 20,August,2012 10:44 PM, Mika Suomalainen wrote:
> On 20.08.2012 17:02, lina wrote:
>> On Monday 20,August,2012 09:59 PM, lina wrote:
Hi,
I ssh to a server which has 400+ users, active ones around
100.
Frankly speaking, I would feel comfortable to hide my IP
On Mon, 2012-08-20 at 16:22 +0200, Gaël DONVAL wrote:
> Le lundi 20 août 2012 à 22:02 +0800, lina a écrit :
> > On Monday 20,August,2012 09:59 PM, lina wrote:
> > > Hi,
> > >
> > > I ssh to a server which has 400+ users, active ones around 100.
> > >
> > > Frankly speaking, I would feel comfortab
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 20.08.2012 17:02, lina wrote:
> On Monday 20,August,2012 09:59 PM, lina wrote:
>>> Hi,
>>>
>>> I ssh to a server which has 400+ users, active ones around
>>> 100.
>>>
>>> Frankly speaking, I would feel comfortable to hide my IP if
>>> possible,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 20.08.2012 16:59, lina wrote:
>
> I ssh to a server which has 400+ users, active ones around 100.
>
> Frankly speaking, I would feel comfortable to hide my IP if
> possible,
>
> any suggestions (I checked the spoof, but seems not positive),
Tr
On Mon, 20 Aug 2012 21:59:47 +0800, lina wrote:
> I ssh to a server which has 400+ users, active ones around 100.
>
> Frankly speaking, I would feel comfortable to hide my IP if possible,
>
> any suggestions (I checked the spoof, but seems not positive),
You mean to hide your ssh remote connect
Le lundi 20 août 2012 à 22:02 +0800, lina a écrit :
> On Monday 20,August,2012 09:59 PM, lina wrote:
> > Hi,
> >
> > I ssh to a server which has 400+ users, active ones around 100.
> >
> > Frankly speaking, I would feel comfortable to hide my IP if possible,
> >
> > any suggestions (I checked th
On Monday 20,August,2012 09:59 PM, lina wrote:
> Hi,
>
> I ssh to a server which has 400+ users, active ones around 100.
>
> Frankly speaking, I would feel comfortable to hide my IP if possible,
>
> any suggestions (I checked the spoof, but seems not positive),
>
> Thanks with best regards,
>
Hi,
I ssh to a server which has 400+ users, active ones around 100.
Frankly speaking, I would feel comfortable to hide my IP if possible,
any suggestions (I checked the spoof, but seems not positive),
Thanks with best regards,
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
nied (publickey).
I.e., with everything seems to be the same to me, using
~/.ssh/config file NOK.
Any ideas? Is there any way to trouble shoot the default sshd daemon? (I can
still
ssh to remote host as root using a secondary session)
As mentioned before. I've still got one ssh conne
On 25/02/11 04:17, T o n g wrote:
> /etc/init.d/ssh restart
This method normally includes /etc/ssh/sshd_config when it starts the
sshd binary. The directive you are looking for in the file is probably
"PermitRootLogin yes". Adding or changing this entry in the sshd_config
file will enable you t
Hi,
I have a very weird ssh connection problem -- I get
Permission denied (publickey).
error while trying to ssh into the box (as root) [1]. However, if I ssh
into the same box, same as root, using the same sshd configuration, just
a secondary debug ssh session, it works flawlessly [2
On Fri, 13 Mar 2009, randall wrote:
And there are indeed other servers that are unhappy with poor DNS
ftp comes to mind, its always the first thing i turn off when i install it
for anything other then personal usage.
:) I don't have that luxury (at work, but do use ftpd-ssl)
The only use to
randall wrote:
> The only use to correct "reverse" DNS i can see is in case of a mail
> server, if you want to filter dynamic and static IP's (but even this is
> theoretical since it is hardly used in practice)
I don't use rDNS for differentiating static and dynamic IPs (well,
not directly); I
Richard A Nelson wrote:
On Fri, 13 Mar 2009, randall wrote:
IMO the solution is not to tweak those subsystems and applications,
but to get a valid rDNS record added to the DNS.
Indeed, always best to have fully functional DNS, and no - for Linux
at least, /etc/hosts is not functional DNS.
dep
On Fri, 13 Mar 2009, randall wrote:
IMO the solution is not to tweak those subsystems and applications,
but to get a valid rDNS record added to the DNS.
Indeed, always best to have fully functional DNS, and no - for Linux
at least, /etc/hosts is not functional DNS.
agreed in principle, but si
Chris Davies wrote:
Boyd Stephen Smith Jr. wrote:
All systems should have an rDNS record to map the number back to a
name. Ideally, that canonical name should also have a mapping back to
the number.
In the case of dynamic IP ranges, the rDNS record might map back to an
entry that mimicks th
Boyd Stephen Smith Jr. wrote:
> In general, you should make sure reverse DNS works for all your IPs.
randall wrote:
> i doubt that this is a sensible default, if i'm wrong please let me
> know ;)
All systems should have an rDNS record to map the number back to a
name. Ideally, that canonical nam
On Friday 13 March 2009 10:42:16 randall wrote:
> Boyd Stephen Smith Jr. wrote:
> > On Friday 13 March 2009 08:41:52 Abdelkader Belahcene wrote:
> >
> >
> > If you are using the OpenSSH daemon on the remote server and that
> > daemon is using the default configuration, it does a reverse DNS
> > loo
Boyd Stephen Smith Jr. wrote:
On Friday 13 March 2009 08:41:52 Abdelkader Belahcene wrote:
If you are using the OpenSSH daemon on the remote server and that
daemon is using the default configuration, it does a reverse DNS
lookup on the connecting IP before accepting the login.
IIRC, It is
On Friday 13 March 2009 08:41:52 Abdelkader Belahcene wrote:
> Thanks for answer,
> but firstly , I am use on my machine a client ssh, the sshd is
running
> on remote server,
> secondly, i connect to server with IP address and not with a
name,
> so no dns needed.
If you are using the OpenS
Abdelkader Belahcene wrote:
Thanks for answer,
but firstly , I am use on my machine a client ssh, the sshd is running
on remote server,
secondly, i connect to server with IP address and not with a name,
so no dns needed.
thanks
not sure what the answer was, but do keep in mind that the
Thanks for answer,
but firstly , I am use on my machine a client ssh, the sshd is running
on remote server,
secondly, i connect to server with IP address and not with a name,
so no dns needed.
thanks
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsub
abdelkader belahcene wrote:
Hi,
When I connect to ssh server ( server running Redhat ) from debian it
takes a long time to give me the prompt, while I receive the prompt
rapidly when I connect from slackware or solaris?
thanks for help
See option "usedns" http://www.manpagez.com/man/5/s
When the date was Monday 02 March 2009, abdelkader belahcene wrote:
> Hi,
> When I connect to ssh server ( server running Redhat ) from debian it
> takes a long time to give me the prompt, while I receive the prompt
> rapidly when I connect from slackware or solaris?
> thanks for help
Running s
On Mon, Mar 02, 2009 at 05:25:08PM +0100, abdelkader belahcene wrote:
> When I connect to ssh server ( server running Redhat ) from debian it
> takes a long time to give me the prompt, while I receive the prompt rapidly
> when I connect from slackware or solaris?
Is your debian box doing a DNS s
Hi,
When I connect to ssh server ( server running Redhat ) from debian it
takes a long time to give me the prompt, while I receive the prompt rapidly
when I connect from slackware or solaris?
thanks for help
Thanks for help,
You are right normally that is enough,
but on my miniPC running DSL (small Damn..) distro, the command
ssh-add doensn't work ??? so even if I user the Priv/Pub key I
have to give the paraphrase??
For this reason I want to send in the line the password , I haven't
security prob
Raj Kiran Grandhi wrote:
abdelkader belahcene wrote:
Hi every one,
I am using DSL on small miniPC.
I tried the ssh-keygen it seemed running correctly, it generates the
key (pub and priv),
Use ssh-copy-id to copy your public key to the ssh server. This requires
that password based connection
Hello,
if a understand, you want to connect to a host without password throught
ssh.
Use the ~/.ssh/authorized_keys
add the pub key of HostA in the authorized_keys of HostB.
You will be able to connect to HostB from HostA.
by
Anthony
abdelkader belahcene a écrit :
Hi every one,
I am using D
Example :
su - usera
ssh-keygen
[EMAIL PROTECTED]:~/.ssh$ cat ~/.ssh/id_rsa.pub
ssh-rsa
B3NzaC1yc2EBIwAAAQEAw7KhpWfG/RRZhaAZlUVK9iH07LnzeO1dgs1vmOX1vK1EZ+p/Pru6UZqSl0sOaBNOIffjG1F4IeRTVw+7CRdnPPcil4htRwFCjMQi11uJcCqfTjaHS5gcvqOOtUPoBlY6WM+35BRzPNdAhnwSWpxVmEfgtDI4Hi18XVU3V9IHTK645oNgHi
abdelkader belahcene wrote:
Hi every one,
I am using DSL on small miniPC.
I tried the ssh-keygen it seemed running correctly, it generates the
key (pub and priv),
Use ssh-copy-id to copy your public key to the ssh server. This requires
that password based connections are allowed to that serv
Hi every one,
I am using DSL on small miniPC.
I tried the ssh-keygen it seemed running correctly, it generates the
key (pub and priv),
but the ssh-add gave cannot open a connection to
authentifcation agent , I tried it after ssh-agent I got same error.
In fact I want an automatic ( fr
I think I've found out why the TCP hangs: someone messes with TCP
sequence numbers and get them wrong.
I studied some advanced features of TCP, and discovered the existence
of "selective acknowledgment" (SACK), which is a very nice feature, by
the way. By comparing packets at the two ends of the
On 17/03/2008, Ken Irving <[EMAIL PROTECTED]> wrote:
> MTU is my standard WAG for this kind of thing, having had problems in
> the distant past.
I don't understand how MTU could be the culprit, as my problem seems
to be that a packet is not resent, and not that a packet doesn't
arrive. Anyway,
On Mon, Mar 17, 2008 at 02:49:21PM +0100, Bernardo Dal Seno wrote:
> I have intermittent problems in transferring files between two
> machines via scp. Symptomps are: when transferring a large file from
> the server to the client, scp transfers a few Kbytes and then says
> "stalled".
>
> ...
> Wha
I have intermittent problems in transferring files between two
machines via scp. Symptomps are: when transferring a large file from
the server to the client, scp transfers a few Kbytes and then says
"stalled".
After a while I was having this problem, I tried to investigate it,
and captured the TCP
On Dec 17, 2007, at 05:08, webjay wrote:
I am on a MacBook Pro and can connect to my server in the basement via
SSH.
Can I install a GUI via SSH and later connect via VLC or the like?
What package would I need and how do I configure it via SSH?
Yes, use VNC:
debian:
1. apt-get update
2. apt
On Dec 17, 2007, at 05:08, webjay wrote:
I am on a MacBook Pro and can connect to my server in the basement via
SSH.
Can I install a GUI via SSH and later connect via VLC or the like?
What package would I need and how do I configure it via SSH?
Yes, use VNC:
debian:
1. apt-get update
2. apt
Thanks a lot for all your help.
It works fine for me now :)
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
webjay wrote:
I have X tools on my Mac.
I also have "X11Forwarding yes" in /etc/ssh/sshd_config
I have installed xnest.
But I guess I need either Gnome or KDE?
No, not necessary.
On my Leopard Mac, I go into the HD, then /Applications/Utilities, and
fire up X11.
This opens an xterm.
In
m there, just "ssh -X [EMAIL PROTECTED]".
I'm assuming your server is running Debian. If you've configured
Debian
to allow X forwarding ("XForwarding=Yes" or similar in
/etc/ssh/sshd_config, I believe), once you've logged into Debian over
the ssh connection, you
gt; From there, just "ssh -X [EMAIL PROTECTED]".
>
> I'm assuming your server is running Debian. If you've configured Debian
> to allow X forwarding ("XForwarding=Yes" or similar in
> /etc/ssh/sshd_config, I believe), once you've logged into De
ssuming your server is running Debian. If you've configured
Debian to allow X forwarding ("XForwarding=Yes" or similar in /etc/
ssh/sshd_config, I believe), once you've logged into Debian over the
ssh connection, you can start any X-enabled app, and it will display/
Hello,
On Mon, Dec 17, 2007 at 05:08:20AM -0800, webjay wrote:
> Can I install a GUI via SSH and later connect via VLC or the like?
>
> What package would I need and how do I configure it via SSH?
xnest does what you want.
greetings Peter Werner
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
27;ve configured Debian
to allow X forwarding ("XForwarding=Yes" or similar in
/etc/ssh/sshd_config, I believe), once you've logged into Debian over
the ssh connection, you can start any X-enabled app, and it will
display/run "on" your Mac.
Any questions, ask again for cla
I am on a MacBook Pro and can connect to my server in the basement via
SSH.
Can I install a GUI via SSH and later connect via VLC or the like?
What package would I need and how do I configure it via SSH?
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Co
my question is:
How do I tell squid to use the ssh connection to forward to, and should
I install squid on the server at work as well?
And,,, am I way off track on the whole idea?
I recentrly felt need of more space for /var directory. I copied /var
onto a new partition with "cp -Rp /var /new/partition".
My existing ssh connection remained functional but today morning I can
not login via ssh to that machine anymore.
Do you think it is an ownership/rights
ing: echo 300 > /proc/sys/net/ipv4/tcp_keepalive_time
>
> ...to counter a similar problem.
But the problem with keepalive is that the ssh connection is dropped
after an ADSL reconnection (every 24 hours). That's why I disabled it
several months ago (though it didn't always wor
on Tue, Apr 13, 2004 at 04:42:40PM +0200, Vincent Lefevre ([EMAIL PROTECTED]) wrote:
> Could someone explain the following behavior, i.e. the fact that the
> ssh connection closes after 10 minutes? Until yesterday, I didn't
> have any problem (but my machine ay isn't connect
1 - 100 of 118 matches
Mail list logo