Ok
now you have to do it
log into your firewall with ssh -X firewall ( the -X is to do a X-forwarding)
after this... do it:
ssh -X solaris
so.. every GUI that you execute in solaris will be forwarded to
firewall, but the there is one more X-forward on firewall that will
redirect the X-session
We have a tunnel we use to tunnel FlexLM ports through (a license manager).
we run with ssh -v (version OpenSSH_3.9p1, OpenSSL 0.9.7a). Its an old version because newer versions cause a different
problem for us.
After some amount of uptime, the output from ssh -v goes haywire, with 100s of me
What im wondering is, how can i make it so a user+public key will only
authenticate if the connection is coming from a certain host?
ie: user joe can come from anywhere, pending they have joes.ppk
user jim can only come from 10.10.10.10/32 pending they have jims.ppk
Does your SSH server allow
I like the idea having a scponly-account. But I'm used to run
pure-ftpd and limiting users bandwidth. Is there any way to do this?
I have Server A (Solaris)which needs to run a grpahics program.
Server A resides behind a Firewall.
Server B (Solaris) has access to Server A through ssh. There is a Firewall
Rule that was implemented to allow ssh traffic from Server B to Server A.
Both Server A and Server B do not have Graphics m
I have a feeling that might not be very robust if you're allowing sftp
or scp to anywhere a user normally has access to - a user could then
download their own authorized_keys file, edit it to give themselves
shell access, and then upload it.
Another option might be to use the Match option in Open
You might try adding the -t argument to your ssh call.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Tonnerre Lombard
Sent: Wednesday, November 15, 2006 10:31 AM
To: davej
Cc: secureshell@securityfocus.com
Subject: Re: SSH wont execute commands with bas