Ssh: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
Signux (Diskussion | Beiträge) Keine Bearbeitungszusammenfassung |
Signux (Diskussion | Beiträge) Keine Bearbeitungszusammenfassung |
||
| (7 dazwischenliegende Versionen desselben Benutzers werden nicht angezeigt) | |||
| Zeile 45: | Zeile 45: | ||
|- | |- | ||
|} | |} | ||
{| class="wikitable" | |||
|- | |||
| 1024 | |||
| SHA256 | |||
| 73jtsguLxkVJTTCThL/HqRvSGr/Nok+24kvLDEWYTjI | |||
| DSA | |||
| ssh-keygen -lf /etc/ssh/ssh_host_dsa_key.pub | |||
|- | |||
| 256 | |||
| SHA256 | |||
| 6SQyVJ4y90aPsZFPjryqtNA/R4mZ6/VsdUm6THQQosY | |||
| ECDSA | |||
| ssh-keygen -lf /etc/ssh/ssh_host_ecdsa_key.pub | |||
|- | |||
| 256 | |||
| MD5 | |||
| 58:9d:23:24:bd:e4:9f:55:6f:f4:4e:bd:bc:11:e0:47 | |||
| ECDSA | |||
| ssh-keygen -E md5 -lf /etc/ssh/ssh_host_ecdsa_key.pub | |||
|- | |||
| 256 | |||
| SHA256 | |||
| EeT9gcyXiD1jfQ0TRfZHWt6o7cKQSnKXZXM0Xnjcb4E | |||
| ED25519 | |||
| ssh-keygen -lf /etc/ssh/ssh_host_ed25519_key.pub | |||
|- | |||
| 256 | |||
| MD5 | |||
| 09:16:01:67:34:ba:2b:92:b3:13:5f:b3:30:48:a3:7f | |||
| ED25519 | |||
| ssh-keygen -E md5 -lf /etc/ssh/ssh_host_ed25519_key.pub | |||
|- | |||
| 2048 | |||
| SHA256 | |||
| 9nR5p+EacFyqv83tYWGbVD9oRnAhJ6K2zpGMDFtsPbg | |||
| RSA | |||
| ssh-keygen -lf /etc/ssh/ssh_host_rsa_key.pub | |||
|- | |||
| 2048 | |||
| MD5 | |||
| 65:bb:f3:bf:81:85:04:6d:65:ce:0c:ee:ed:b6:56:ce | |||
| RSA | |||
| ssh-keygen -E md5 -lf /etc/ssh/ssh_host_rsa_key.pub | |||
|- | |||
|} | |||
illi | |||
MD5: <code>ssh-keygen -E md5 -lf /etc/ssh/ssh_host_<...>_key.pub</code> | |||
SHA256: <code>ssh-keygen -lf /etc/ssh/ssh_host_<...>_key.pub</code> | |||
{| class="wikitable" | |||
|- | |||
| ??? | |||
| MD5 | |||
| SHA256 | |||
| typ | |||
|- | |||
| 1024 | |||
| 05:9b:97:f1:61:68:ef:cd:26:ba:6f:49:1f:5d:ee:0b | |||
| R53s547SpSpp0BB0A8ZuPh7+fQXjiXs8mOXn+893bLY | |||
| DSA | |||
|- | |||
| 256 | |||
| 50:f0:9f:31:7d:66:d7:c8:f4:de:5a:4e:9b:1d:d1:70 | |||
| Tf0fgIPOMzW+8AVC9HryPfTh3taL8kwFzLVLf5lYC6I | |||
| ECDSA | |||
|- | |||
| 256 | |||
| 8f:15:d6:5c:5b:3d:dd:a4:8e:02:32:3a:75:ed:5a:b1 | |||
| YEjk1g5zv5jPw4/IWWq7U5YYPiM+cjPGK6O++aAhjEU | |||
| ED25519 | |||
|- | |||
| 2048 | |||
| 23:e4:2c:a6:e9:4e:8b:8a:f0:42:5b:d6:4b:a2:a9:b5 | |||
| 1+A0lMmAB7tTXYANlVy/A5MWB/JXJ45jAWC/mHI/9dk | |||
| RSA | |||
|- | |||
|} | |||
um standby zu verhinden wenn ssh verbindung aufgebaut ist könnte die folgende Seite weiter helfen [http://askubuntu.com/questions/521620/prevent-machine-from-sleeping-when-ssh-connections-are-on seite] | |||
Https-Tunnel erstellen: <code>ssh -fCN -L 443:localhost:443 nutzer@zielserver</code> | |||
---- | |||
== Tunnel für Webseite erstellen == | |||
Tunnel zu einem Server aufbauen und Script starten, was Daten intern von einem Port <1024 umleitet umleitet (mit einem rsa key) | |||
<pre> | |||
#!/bin/bash | |||
ServerIp=192.168.0.1 | |||
User=root | |||
KeyFile=/home/user/.ssh/id_rsa | |||
#http tunnel | |||
PortOut=80 | |||
PortTunnel=8080 | |||
sudo -u signux -s autossh -M 0 -f -R ${PortTunnel}:localhost:${PortOut} -i $KeyFile $User@$ServerIp -o ServerAliveInterval=30 -o ServerAliveCountMax=2 -o ExitOnForwardFailure=yes "/root/initTunnel.sh ${PortOut} ${PortTunnel}" | |||
</pre> | |||
Script Daten von einem Port <1024 auf einen anderen Port umleiten lassen <code>initTunnel.sh</code> | |||
<pre> | |||
#!/bin/bash | |||
PortOut=$1 | |||
PortTunnel=$2 | |||
PID=`ps -ef | grep -v "grep" | grep "socat TCP-LISTEN:$PortOut,fork,reuseaddr TCP:localhost:$PortTunnel" | awk '{print $2}'` | |||
if [[ "" != "$PID" ]]; then | |||
# echo "killing $PID" | |||
kill -9 $PID | |||
fi | |||
socat TCP-LISTEN:$PortOut,fork,reuseaddr TCP:localhost:$PortTunnel | |||
</pre> | |||
22000 mobilebpi | |||
22001 zentraleX2 | |||
22002 hühnerstall | |||
Aktuelle Version vom 31. Oktober 2019, 09:13 Uhr
ssh-authentifizierung:
ssh-keygen -t rsa -b 4096
ssh-copy-id -i ~/.ssh/id_rsa.pub user@server
| 1024 | SHA256 | QJet+Cx12LIR0aqOwcoMXP1XM4KtWSg6YmsKXDooCTI | DSA | ssh-keygen -lf /etc/ssh/ssh_host_dsa_key.pub |
| 256 | SHA256 | SMZ2znYo39P0jqoHQMzok6v63pqdTzOxuMATrd9Z42w | ECDSA | ssh-keygen -lf /etc/ssh/ssh_host_ecdsa_key.pub |
| 256 | MD5 | 85:a3:2a:10:43:36:08:be:58:f1:27:53:54:b8:09:c0 | ECDSA | ssh-keygen -E md5 -lf /etc/ssh/ssh_host_ecdsa_key.pub |
| 256 | SHA256 | NSfk9rm0ppYb47Nyji0enw29vKN7BMGnu9F216ZXyRo | ED25519 | ssh-keygen -lf /etc/ssh/ssh_host_ed25519_key.pub |
| 2048 | SHA256 | yRlkqQgE6Ee5QsCuhgrDN/ZZTCHgoFl18nTsm/Sfl1o | RSA | ssh-keygen -lf /etc/ssh/ssh_host_rsa_key.pub |
| 2048 | MD5 | 0c:91:d4:3e:57:06:ad:4a:ad:2a:e2:09:93:4b:3b:c7 | RSA | ssh-keygen -E md5 -lf /etc/ssh/ssh_host_rsa_key.pub |
| 1024 | SHA256 | 73jtsguLxkVJTTCThL/HqRvSGr/Nok+24kvLDEWYTjI | DSA | ssh-keygen -lf /etc/ssh/ssh_host_dsa_key.pub |
| 256 | SHA256 | 6SQyVJ4y90aPsZFPjryqtNA/R4mZ6/VsdUm6THQQosY | ECDSA | ssh-keygen -lf /etc/ssh/ssh_host_ecdsa_key.pub |
| 256 | MD5 | 58:9d:23:24:bd:e4:9f:55:6f:f4:4e:bd:bc:11:e0:47 | ECDSA | ssh-keygen -E md5 -lf /etc/ssh/ssh_host_ecdsa_key.pub |
| 256 | SHA256 | EeT9gcyXiD1jfQ0TRfZHWt6o7cKQSnKXZXM0Xnjcb4E | ED25519 | ssh-keygen -lf /etc/ssh/ssh_host_ed25519_key.pub |
| 256 | MD5 | 09:16:01:67:34:ba:2b:92:b3:13:5f:b3:30:48:a3:7f | ED25519 | ssh-keygen -E md5 -lf /etc/ssh/ssh_host_ed25519_key.pub |
| 2048 | SHA256 | 9nR5p+EacFyqv83tYWGbVD9oRnAhJ6K2zpGMDFtsPbg | RSA | ssh-keygen -lf /etc/ssh/ssh_host_rsa_key.pub |
| 2048 | MD5 | 65:bb:f3:bf:81:85:04:6d:65:ce:0c:ee:ed:b6:56:ce | RSA | ssh-keygen -E md5 -lf /etc/ssh/ssh_host_rsa_key.pub |
illi
MD5: ssh-keygen -E md5 -lf /etc/ssh/ssh_host_<...>_key.pub
SHA256: ssh-keygen -lf /etc/ssh/ssh_host_<...>_key.pub
| ??? | MD5 | SHA256 | typ |
| 1024 | 05:9b:97:f1:61:68:ef:cd:26:ba:6f:49:1f:5d:ee:0b | R53s547SpSpp0BB0A8ZuPh7+fQXjiXs8mOXn+893bLY | DSA |
| 256 | 50:f0:9f:31:7d:66:d7:c8:f4:de:5a:4e:9b:1d:d1:70 | Tf0fgIPOMzW+8AVC9HryPfTh3taL8kwFzLVLf5lYC6I | ECDSA |
| 256 | 8f:15:d6:5c:5b:3d:dd:a4:8e:02:32:3a:75:ed:5a:b1 | YEjk1g5zv5jPw4/IWWq7U5YYPiM+cjPGK6O++aAhjEU | ED25519 |
| 2048 | 23:e4:2c:a6:e9:4e:8b:8a:f0:42:5b:d6:4b:a2:a9:b5 | 1+A0lMmAB7tTXYANlVy/A5MWB/JXJ45jAWC/mHI/9dk | RSA |
um standby zu verhinden wenn ssh verbindung aufgebaut ist könnte die folgende Seite weiter helfen seite
Https-Tunnel erstellen: ssh -fCN -L 443:localhost:443 nutzer@zielserver
Tunnel für Webseite erstellen
Tunnel zu einem Server aufbauen und Script starten, was Daten intern von einem Port <1024 umleitet umleitet (mit einem rsa key)
#!/bin/bash
ServerIp=192.168.0.1
User=root
KeyFile=/home/user/.ssh/id_rsa
#http tunnel
PortOut=80
PortTunnel=8080
sudo -u signux -s autossh -M 0 -f -R ${PortTunnel}:localhost:${PortOut} -i $KeyFile $User@$ServerIp -o ServerAliveInterval=30 -o ServerAliveCountMax=2 -o ExitOnForwardFailure=yes "/root/initTunnel.sh ${PortOut} ${PortTunnel}"
Script Daten von einem Port <1024 auf einen anderen Port umleiten lassen initTunnel.sh
#!/bin/bash
PortOut=$1
PortTunnel=$2
PID=`ps -ef | grep -v "grep" | grep "socat TCP-LISTEN:$PortOut,fork,reuseaddr TCP:localhost:$PortTunnel" | awk '{print $2}'`
if [[ "" != "$PID" ]]; then
# echo "killing $PID"
kill -9 $PID
fi
socat TCP-LISTEN:$PortOut,fork,reuseaddr TCP:localhost:$PortTunnel
22000 mobilebpi 22001 zentraleX2 22002 hühnerstall