On Thu, Nov 28, 2013 at 04:36:47AM -0800, Volker Braun wrote: > It would be just as easy for a compromised cloud ssh to download your > personal private key than to log your password. The only solution is to > make a different account on your own machine to log into, assuming that > your university allows remote logins to personal machines at all (e.g. > Oxford doesn't). > >
Here is a ssh free soluion, vim and readline work. Needs socat(1) and optionally openssl Plaintext: On client: socat -,raw,echo=0 tcp-l:5556 On cloud webterm: socat tcp:CLIENT:5556 exec:"/bin/bash -l",pty,ctty,stderr Encrypted with key authorization: On client: socat -,raw,echo=0 ssl-l:1443,cert=server.pem,cafile=client.crt,verify=1 On cloud webterm: socat ssl:CLIENT:1443,cert=client.pem,cafile=server.crt exec:'/bin/bash',pty,ctty,stderr In the openssl case one need to easily generate some stuff. 5556 and 1443 are the ports. -- You received this message because you are subscribed to the Google Groups "sage-support" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at http://groups.google.com/group/sage-support. For more options, visit https://groups.google.com/groups/opt_out.
