A while ago in the Transparent SSH host-jumping (Advanced) post I described a technique on how one could jump quite effortlessly through a chain of intermediate hosts. However, there was a catch: the user names and ports across the whole chain should be the same and there was no easy … read time 3 min.
I was involved in the creation of the sshephalopod project, which was an attempt to build an enterprise level authentication framework for SSH authentication using the SSH CA feature.
The project is based on a wrapper script that signs a user via a SAML identity provider and gets user’s … read time 5 min.
I heard a lot about Raspberry Pi boards but until now I had no need nor time to work with one.
However, recently I purchased a Dodge Journey R/T and found that although I love the car I am so disappointed with its software and hard-wired logic that I … read time 5 min.
I strive for simplicity since I am a strong believer that achieving a goal with the most simplest solution looks elegant, proves that you have deep knowledge on the subject, and overall is beautiful by itself. Additionally to this, a simple solution is easier to comprehend and to audit, hence … read time 7 min.
In this brief article I am going to describe how I resolved a nagging issue I had with setting up access to hosts which are not directly reachable, but where you need to forward your connection through an intermediate host.
Previously, I was using the local SSH port-forwarding technique (although … read time 6 min.
- Table of Contents
None of the systems I administer … read time 15 min.
I think all of you are using SSH in your daily routines. However, do you use its full potential? Today’s topic is the SSH port-forwarding feature and how it can be use to achieve some interesting configurations.
I’m sure most of you are aware of the feature, but … read time 2 min.