Sponsored Content
Full Discussion: SSH Tunneling
Top Forums UNIX for Advanced & Expert Users SSH Tunneling Post 302108592 by silvaman on Tuesday 27th of February 2007 02:57:31 PM
Old 02-27-2007
after a little thought just changed my line to

ssh -R 1234:localhost:3128 user@serverB (from server A) - the update is flying - guess thats 1 nil to me - i have the pleasure of telling the sysadmin to come!

many thanks
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Tunneling

Hello, I am within a LAN system and I need to be able to tunnel out (and recv UDP) packets. Currently the router automatically drops UDP packets. My PC cant see the outside world, nor ping, but it can connect via SSH to a server on the "edge" of the network which can see everything. I... (2 Replies)
Discussion started by: ErNci
2 Replies

2. Solaris

ssh tunneling

Hi, I have tried the following: on PC1 (win xp) I have created ssh connection with port forwarding (local 8888 to remote 8888) to server1. >From server1 I have created another ssh connection with port forwarding to server2(local 8888 to remote 1521). When I try to connect to oracle... (3 Replies)
Discussion started by: goran00
3 Replies

3. Filesystems, Disks and Memory

Tunneling NFS through SSH????

Hello Folks, Im trying to pass the NFS Shared data through the SSH tunnel. Following are the Steps for my Executions: A) Commands Executed on Server (NFS Server + SSHD Server running) i) share -F nfs -o rw=<NFS Server IP> /home ii) Start the NFS Server Services and SSHD Services. ... (3 Replies)
Discussion started by: ImpeccableCode
3 Replies

4. UNIX for Advanced & Expert Users

tunneling commands and file transfers through established ssh connection

Hi - I frequently run commands, and transfer files to/from a host that uses SecurID ssh authentication. It is a real pain to have to enter the authentication information every time I want to interact with this host. I am wondering if there is a way to establish a one-time ssh connection to this... (2 Replies)
Discussion started by: cpp6f
2 Replies

5. Infrastructure Monitoring

Tunneling UDP via SSH

Performing UDP tunneling through an SSH connection Found this while looking for a way to temporarily forward SNMP requests across otherwise disconnected networks. Might be useful for someone else, too. (1 Reply)
Discussion started by: pludi
1 Replies

6. UNIX for Dummies Questions & Answers

SSH port forwarding/tunneling

So this seems like something that should be simple...but I can't quite seem to get it up and running. I have a machine, .107 with a GUI on port 8443. The problem is that I can't connect directly to .107 from my laptop. Now I have another machine, .69 that can connect to .107. So shouldn't I be able... (4 Replies)
Discussion started by: DeCoTwc
4 Replies

7. Shell Programming and Scripting

Are free public shells for ssh tunneling safe?

Is it secure to use free shells for ssh tunneling? Can the shell provider see and log the sites I visit and passwords I enter? I'm new to this thing and couldn't find info on google :o (5 Replies)
Discussion started by: rafunk
5 Replies

8. UNIX for Advanced & Expert Users

Server access for SSH Tunneling!

Hi! I came to know about SSH Tunneling to bypass the Firewall. I will have to setup a free access SSH server to tunnel data access through PUTTY or OpenSSH. The problem is that I don't know about any free access servers. So, can anyone of you guide me for that, for any type of help? (1 Reply)
Discussion started by: nixhead
1 Replies

9. UNIX for Dummies Questions & Answers

Ssh tunneling

I want to perform ssh tunnelling for which I have been using PuTTy. Config is as follows: Host IP: 172.XX.XX.111Port: 22Tunnel setting source port: 19005Destination: 172.XX.XX.40:1521After entering my user ID and password, I am able to see in my command prompt that 127.0.0.1:19005 is listening.... (1 Reply)
Discussion started by: aakashsoor
1 Replies

10. Shell Programming and Scripting

Query regarding PuTTY SSH Tunneling

I have a process running on my local server. http://dev.techx.com:6060/proct I wish to block port 6060 and expose port 7777 to the outside world. I block port 6060 and open port 7777 on the firewall. What should be the PuTTY Settings -> Connection -> SSH -> Tunnels 1. Destination ... (3 Replies)
Discussion started by: mohtashims
3 Replies
CTLUSER(8)						      System Manager's Manual							CTLUSER(8)

NAME
ctluser - control lusers SYNOPSIS
ctluser [ -h ] [ -m ] command [ argument... ] DESCRIPTION
Ctluser sends a message to the control channel of a given luser(8) This command can only be run by the sysadmin(1) In the normal mode of behavior, the message is sent to the luser's brain, which then performs the requested action and sends back a reply with a text message and the exit code for ctluser. If the luser's brain successfully performed the command, ctluser will exit with a sta- tus of zero and print the reply on standard output. The ``-m'' flag is used to display an MPEG of the results of the given command on the console of the sysadmin(1) Note that this requires the sysadmin(1) to be running an X server. To see a command summary, use the ``-h'' flag. If a command is included when ctluser is invoked with the ``-h'' flag, then only the usage for that command will be given. The complete list of commands follows. Note that all commands have a fixed number of arguments. If a parameter can be an empty string, then it is necessary to specify it as two adjacent quotes, like "". addhist <entry> Add an entry to the luser's employment record. allow reason Allow a luser to use the computer system again. The reason must be the same text given with an earlier ``reject'' command. Note that this command is currently not implemented. begin name Begin a new luser(1) with the given file. Note that this command is currently not implemented. cancel pid Causes a process of a luser to be killed changegroup group Changes a luser from their current workgroup to the one specified. checkfile Forces a user to return to a paper based system drop Causes a large mass to drop onto the luser from a great height. flushlogs Destorys all logs of the actions done by the sysadmin(1) to the luser. go reason The luser is fired for the given reason. hangup Makes the luser hang themselves mode Displays the operating mode of the luser newgroup group Causes a luser to make their own newgroup up pause thought Makes the luser pause for the given thought. Note that this may cause some lusers to crash shutdown reason Makes the luser shutdown. This is essentially the same as killing them signal sig Sends the given signal to the luser throttle reason Causes the luser to throttle themselves trace item flag Gives the sysadmin(1) information on what the luser is doing. BUGS
Ctluser sometimes has the effect of lusers complaining the to management. The use of bosskill(8) maybe required at this point. HISTORY
Written by Simon Burr <simes@tcp.co.uk>. Based upon the manual page for ctlinnd(8), part of the InterNetNews system. SEE ALSO
luser(1), sysadmin(1), bosskill(8) 19 October 1995 CTLUSER(8)
All times are GMT -4. The time now is 02:03 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy