extract fingerprints from .ssh/known_hosts
all:
ssh-keygen -l -f ~/.ssh/known_hosts
specific host:
ssh-keygen -l -f ~/.ssh/known_hosts -F host.tld
extract fingerprints from .ssh/known_hosts
all:
ssh-keygen -l -f ~/.ssh/known_hosts
specific host:
ssh-keygen -l -f ~/.ssh/known_hosts -F host.tld
ssh server.tld -o ProxyCommand='nc -x proxy.tld:1234 %h %p'
makes use of ‘netcat-openbsd’
ssh server.tld -lBenutzer -p2210 -o ProxyCommand='nc -x proxy.tld:1234 %h %p'
sftp -P2210 -o "ProxyCommand nc -x proxy.tld:1234 %h %p" Benutzer@server.tld:/path/to/file.ext .
rsync -e "ssh -lBenutzer -p2210 -o ProxyCommand='nc -x proxy.tld:1234 %h %p'" server.tld:/path/to/file .
on e.g. Debian you have to install
aptitude install sshfs
edit /etc/fstab and add the line
sshfs#user@123.123.123.123:/what/ever/remote/ /where/you/wish/local/ fuse uid=1003,gid=100,umask=0,allow_other,_netdev,ro 0 0
or directly in shell:
sshfs user@123.123.123.123:/what/ever/remote/ /where/you/wish/local/ -o idmap=user -o uid=1000 -o gid=100 -o umask=0 -o allow_other -o ro
mutt -f /var/mail/root
ssh -o GatewayPorts=yes -L 123:4.5.6.7:8910 2.3.4.5
LocalPort: 123
TargetIP:4.5.6.7
RemotePort:8910
SSH Server: 2.3.4.5