On Thu, Nov 28, 2013 at 04:36:47AM -0800, Volker Braun wrote:
> It would be just as easy for a compromised cloud ssh to download your 
> personal private key than to log your password. The only solution is to 
> make a different account on your own machine to log into, assuming that 
> your university allows remote logins to personal machines at all (e.g. 
> Oxford doesn't).
> 
>

Here is a ssh free soluion, vim and readline work.

Needs socat(1) and optionally openssl

Plaintext:

On client: socat -,raw,echo=0 tcp-l:5556
On cloud webterm:  socat tcp:CLIENT:5556 exec:"/bin/bash -l",pty,ctty,stderr


Encrypted with key authorization:

On client: socat -,raw,echo=0 
ssl-l:1443,cert=server.pem,cafile=client.crt,verify=1 
On cloud webterm: socat ssl:CLIENT:1443,cert=client.pem,cafile=server.crt 
exec:'/bin/bash',pty,ctty,stderr

In the openssl case one need to easily generate some stuff.

5556 and 1443 are the ports.


-- 
You received this message because you are subscribed to the Google Groups 
"sage-support" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/sage-support.
For more options, visit https://groups.google.com/groups/opt_out.

Reply via email to