Re: SSH proxying

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wednesday 25 June 2003 12:15 pm, John Haxby wrote:
> Yes, it does make sense and it's very lucid!
> 
> It's quite easy.
> 
> 1.  Put your public key on both B and C.
> 2.  Make sure you're using the ssh-agent.  RH9 is set up with this 
quite 
> well already -- type "ssh-add -l" to see if your key is registered 
and 
> "ssh-add" to actually register it.
> 3.  "echo ForwardAgent yes > ~/.ssh/config
> 3a.  You may need to restart the ssh agent by logging out and 
logging in 
> again.
> 4.  Now ssh to B (notice no prompts for password or private-key 
> passphrase) and then ssh to B and the original ssh will forward the 
> authentication signing to the agen running on A.
> 
> Make sure you do an "ssh-add -D" to remove your private key when you 
> leave your machine (assuming you don't log out).   I put it in a 
cron 
> job ...

Once that is set up and working:

1. Install netcat on B -- the rpm is called nc-<version>.rpm

2. add to your .ssh/config file on A:

Host C
        ProxyCommand  ssh B nc %h 22
Host

3. Then type:

$ ssh C

and the ProxyCommand will automagically forward the conection thru B.

> I have a little howto describing all of this in gory detail if 
you're 
> interested.
> 
> jch
> 
> A.J. Werkman wrote:
> 
> > I have a SSH proxy problem.
> >
> > If I have three machines A, B and C. A can't reach C, but B can 
both 
> > reach A and C.
> >
> > In order to connect form A to C you would connect from A to B with 
ssh 
> > and on B connect to C. Now you have a proxy connection from A 
through 
> > B to C.
> >
> > But I use only key authentication. B and C are configured to 
accept 
> > the key from A. But B as not being accepted as a total secure host 
> > (because it is the gateway to the evale world), does not have 
> > authentication keys. Conquering this gateway would mean every host 
can 
> > be reached by using the authentication key on the gateway.
> >
> > Now if I want to connect from A to C I log in using the private 
key on 
> > host A.  But if I want to log in from host B to C I don't have a 
> > private key there to use.
> >
> > Does anyone know if it is possible to use the above scenario but 
be 
> > able to use my private key from host A on host B to access host C. 
Of 
> > course I don't want to copy the private key from host A to host B 
> > because of the risk of compromising this key.
> >
> > I hope what I am saying here makes sense to all. Does anyone know 
a 
> > solution?
> >
> > Regards, Koos.
> >
> >
> 
> 
> 
> -- 
> Shrike-list mailing list
> Shrike-list@xxxxxxxxxx
> https://www.redhat.com/mailman/listinfo/shrike-list
> 
> 

-- 
Stephen Carville
------------------------------------------------------------------
Mom & Pop were just a couple of kids when they got married. He was
eighteen, she was sixteen and I was three."
 -- Billie Holiday




[Index of Archives]     [Fedora Users]     [Centos Users]     [Kernel Development]     [Red Hat Install]     [Red Hat Watch]     [Red Hat Development]     [Red Hat Phoebe Beta]     [Yosemite Forum]     [Fedora Discussion]     [Gimp]     [Stuff]     [Yosemite News]

  Powered by Linux