ssh client
Contents
Key Pairs
Ssh key pairs are used for key based authentication. The private key must be kept on the client, never to be given to anyone else than the owner. The public key can be published anywhere, and added to authorized keys lists in order to grant ssh accesses.
- Creating a key pair :
ssh-keygen # Default to 2048 bits RSA as of RHEL5 ssh-keygen -t dsa # Force to DSA, size is and must be 1024 bits ssh-keygen -t rsa -b 4096 # Double the default size, theoretically stronger to crack ssh-keygen -f ~/.ssh/id_rsa_work # Generate a second parallel key pair
- Updating a key's passphrase :
ssh-keygen -p # For the default key ssh-keygen -p -f ~/.ssh/id_rsa_work # For a non-default key
Note that a key should always have a passphrase set, unless it's used only for automatic ssh connections (such as ones run from cron jobs). The annoyance of having a passphrase goes away when using an ssh agent.
Ssh Agents
And ssh agent is a small program which is typically launched once during a desktop session and stores private ssh keys in memory after asking only once for each key's passphrase. Ssh clients then contact the agent for key based authentication, which avoids to have to re-enter the passphrase for each new connection.
This makes using passphrase protected keys nearly as convenient as passphrase-less keys, while keeping the main advantage of having passphrase protected keys : If the client system is cracked or stolen, it is not possible for the attacker to get the private key if the system had to be rebooted. This is the case with suspended laptops or workstations which are turned off.
Ssh Agent Forwarding
The most typical use of ssh agent forwarding is to allow to forward key based authentication all the way back to the workstation where the initial ssh connection originated from : If you connect from workstation1 to server1, then from server1 to server2, you can have the key based authentication transparently use the private key present on workstation1 only.
- Enable ssh agent forwarding explicitly for a connection :
ssh -A server1
- Disable ssh agent forwarding explicitly for a connection :
ssh -a server1
- Configure your defaults to enable ssh agent forwarding for some hosts :
$ cat ~/.ssh/config Host *.lan server1 server2 ForwardAgent yes
When using ssh agent forwarding, you should make sure you trust anyone with root access to the systems you are connecting to, as although it's not possible to retrieve the private key directly, it's possible to authenticate against it.
Default Options
All ssh client options can be found in man 5 ssh_config
and used from the command line, or in the ~/.ssh/config
file (though a different file can be specified with the -F option) or even in the system-wide /etc/ssh/ssh_config
configuration file :
- Equivalent commands :
ssh -b 10.0.0.1 server1
andssh -o BindAddress=10.0.0.1 server1
- Example
~/.ssh/config
file with useful examples :
# Avoid having to type in "-p 2222" for hosts where sshd is on this non-standard port Host server3 server4 Port 2222 # Forward agent and X11 to all our own domains Host *.lan *.mydomain1 *.mydomain2 ForwardAgent yes ForwardX11 yes # Don't complain when the localhost key changes, useful when using ssh tunnels Host localhost StrictHostKeyChecking no
Ssh Port Forwarding
Forward Port Forwarding
Forward port forwarding is very useful to reach ports which can't be directly reached from the local system, but can be from a remote system accessible through ssh.
Example where the ssh client will listen on localhost port 8080 and forward all connections through the ssh tunnel, out through the other end towards 192.168.0.1:80
:
ssh -L 8080:192.168.0.1:80 remote-system.domain
This is a typical example where remote-system.domain
is a home DSL connection, where the ssh port is redirected to a GNU/Linux machine of the local network, from where the DSL router at address 192.168.0.1
is reachable. The DSL router's web interface will be accessible on http://localhost:8080/
transparently, without it being available to the whole Internet.
Note that the local listening port must be 1024 or higher for non root accounts, and mustn't already be used. This is why 8080 is used in the example instead of 80.
Reverse Port Forwarding
Reverse port forwarding is less used than forward port forwarding, but it also has its usefulness. It allows remote access to the local system, using a remote system accessible through ssh.
Example where the ssh client will listen on remote-system.domain
port 2222 and forward all connections back through the ssh tunnel, out to localhost port 22 :
ssh -R 0.0.0.0:2222:127.0.0.1:22 remote-system.domain
This is a typical example where anyone connecting to remote-system.domain
port 2222 will transparently be connecting to the system where the ssh client was executed. This can be very useful to enable temporary access to a local system behind NAT or a firewall by using one external system.
Note that if the 0.0.0.0:
bind address is omitted, the command will listen on the remote localhost only. We use the 2222 port because it's very likely the remote system already has its own ssh server listening on port 22.
X11 Forwarding
A very powerful and useful feature of ssh is X11 forwarding. The advantages are many : You don't have to mess with $DISPLAY
, xauth etc. in order to locally display remote graphical applications, it works with simple NAT situations, and you get it all encrypted, suitable to be executed over the Internet.
Example where we run the revelation
graphical password management application on a remote desktop system from our local desktop system. :
ssh -Y remote-system.domain revelation myfile.rev
This makes X11 forwarding very useful for situations where your local system does not fulfill the requirements to run an application, but an available remote system does : Architecture specific binaries, binaries requiring some specific OS revision, etc. Note that this will work well on a fast LAN, but might be a bit slow over the Internet, because of both bandwidth and response time values. You can omit the -Y
option is you set the ForwardX11 yes
option for the connection.