[Eisfair] Neues Paket ssh-tools
Marcus Röckrath
marcus.roeckrath at gmx.de
Do Dez 30 11:04:11 CET 2021
Hallo,
das Paket ssh-tools enthält insgesamt 8 Shellskripte, die im Zusammenhang
mit ssh sehr nütlzlich sein können.
Eine kurze Beschreibung findet sich in der Paketdokumentation, ansonsten sei
auf die Hilfeseiten der einzelnen Tools verwiesen.
ssh-ping
========
Check if host is reachable using ssh_config
Outputs Reply from when server is reachable but login failed
Outputs Pong from when server is reachable and login was successful
$ ssh-ping -c 3 kim
SSHPING kim
Reply from kim: ssh_seq=1 time=109 ms
Reply from kim: ssh_seq=2 time=136 ms
Reply from kim: ssh_seq=3 time=141 ms
--- kim ping statistics ---
3 requests transmitted, 3 requests received, 0% request loss
ssh-version
===========
Shows version of the SSH server you are connecting to
$ ssh-version kim
Remote protocol version 2.0, remote software version OpenSSH_7.2p2
Ubuntu-4ubuntu2.6
ssh-diff
========
Diff a file over SSH
$ ssh-diff /etc/hosts kim
Comparing kim:/etc/hosts (<) with /etc/hosts (>)
1,2c1,2
< 127.0.0.1 localhost
< 127.0.1.1 kim
---
> 127.0.0.1 localhost
> 127.0.1.1 blinky
ssh-facts
=========
Get some facts about the remote system
$ ssh-facts kim
OS=ubuntu
OS_VERSION=16.04
UPTIME=7 days, 22 hours, 25 minutes
LAST_REBOOT=Dec 20 19:34:27 2018
CPU_CORES=2
CPU_SOCKETS=2
HOSTNAME=kim
KERNEL_NAME=Linux
MACHINE=x86_64
MACHINE_TYPE=virtual_by_kvm
MEMORY=4045996
INIT=systemd
LSB_CODENAME=xenial
LSB_DESCRIPTION=Ubuntu 16.04.5 LTS
LSB_ID=Ubuntu
LSB_RELEASE=16.04
ssh-hostkeys
============
Prints server host keys in several formats
$ ssh-hostkeys kim
(ECDSA) 256 MD5 3d:8e:49:6e:40:34:c6:e4:c8:5f:60:d9:ad:bf:1f:b9
(ECDSA) 256 SHA256 txYpmPENBWolKBaA5EkCM/y1Hm2DP81jtABFrWUBf/c
(ED25519) 256 MD5 a8:93:71:f9:13:d0:32:02:c0:e5:1e:f6:b9:db:8c:b0
(ED25519) 256 SHA256 JZMLzNS2ifdGYv2SrqDodz7+/qaRCTBPukaCnMQqbX8
(RSA) 2048 MD5 8b:37:63:cd:58:fd:9c:18:93:08:3a:4c:84:64:87:91
(RSA) 2048 SHA256 WkOzD8BaeljejgTTAwECkByyb4kHdI0pnJB2/gcS1Lk
ssh-keyinfo
===========
Prints keys in several formats
$ ssh-keyinfo ~/.ssh/*.pub
(RSA) 2048 MD5
40:52:aa:14:a5:9a:fe:b5:96:c0:d2:dc:99:f1:a5:77 /home/vaporup/.ssh/id_rsa.pub
(RSA) 2048 SHA256
V4F6ipY4gG83sQGM0eRk0+g1RWE9K4asDUj1jFpCa48 /home/vaporup/.ssh/id_rsa.pub
ssh-certinfo
============
Shows validity and information of SSH certificates
$ ssh-certinfo ~/.ssh/*.pub
/home/vaporup/.ssh/id_rsa-cert.pub SSH_CERT_VALID forever
-> forever
/home/vaporup/.ssh/test1-cert.pub SSH_CERT_INVALID
2038-01-19T04:14:07 -> 2038-01-19T04:14:07
/home/vaporup/.ssh/test2-cert.pub SSH_CERT_EXPIRED
1988-11-14T13:36:40 -> 1991-08-11T14:36:40
$ ssh-certinfo -v ~/.ssh/*.pub
/home/vaporup/.ssh/id_rsa-cert.pub:
Type: ssh-rsa-cert-v01 at openssh.com user certificate
Public key: RSA-CERT
SHA256:Mm7o312345YEaWetVshTBslX48h0XJceLWzxx3RugDg
Signing CA: RSA SHA256:4fcOpOm/Xk12345mYnihk0cr6SdjghPgONxriMJex+A
Key ID: "vaporup"
Serial: 0
Valid: forever
Principals: (none)
Critical Options: (none)
Extensions:
permit-X11-forwarding
permit-agent-forwarding
permit-port-forwarding
permit-pty
permit-user-rc
ssh-force-password
==================
Enforces password authentication (as long as the server allows it).
It became quite annoying googling the SSH options for this every time.
e.g. used to skip key-based login for password testing.
$ ssh-force-password kim
vaporup at kim's password:
--
Gruß Marcus
[eisfair-Team]
Mehr Informationen über die Mailingliste Eisfair