How do you run a program on a remote server using ssh?
For this example we'll have two servers, one named Johnny and another named Cash. Both are running openssh. Our goal is to have a program on Johnny login to Cash and run a program on Cash. To make the task a little more complex we'll be using different users on each machine.
The first thing we'll need to do is generate public and private keys on Johnny. So, logged into Johnny as user 'boy' we create public and private keys by creating them in the .ssh directory as follows:
Johnny$> pwd
/home/boy/.ssh
Johnny$> ssh-keygen -t rsa -f sue
Generating public/private rsa key pair.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in sue.
Your public key has been saved in sue.pub.
The key fingerprint is:
8d:e9:c0:g1:c7:1f:e3:b3:2f:38:12:aa:b5:3b:2e:b3 boy@Johnny
Johnny$>
In the example above we picked an arbitrary name, sue, to identify the files that hold the generated keys. When prompted to enter a passphrase (twice) we simply hit enter twice.
As the output of ssh-keygen indicates, the public key has been saved in a file named sue.pub.
The output of ssh-keygen implies, but doesn't indicate directly, that the private key is in a file named sue (Yes, a user named boy created a file named sue.)
Johnny$>ls -l
-rwx------ 1 sue suegrp 887 Oct 17 14:27 sue
-rwx------ 1 sue suegrp 223 Oct 17 14:27 sue.pub
The private key file, sue, will remain on Johnny for the reaminder of this exercise, but the public key must be moved to the remote server, Cash. Note that the .ssh directory itself, as well as the sue and sue.pub files should have permissions of 700.
Now you'll need to ftp the sue.pub file from Johnny to Cash. The user on Cash that we'll login as is user 'named'.
Johnny$> ftp Cash
Connected to Cash
220 Cash - Propery of Xyz. - Authorized users only
Name (Cash:boy): named
331 Password required for named.
Password:
230-Last unsuccessful login: Fri Oct 17 13:12:55 2003 on ftp from Johnny 230-Last login: Fri Oct 17 16:02:11 2003 on /dev/pts/1 from Johnny
230 User named logged in.
ftp> cd .ssh
ftp> mput sue.pub
mput sue.pub? y
200 PORT command successful.
150 Opening data connection for sue.pub.
226 Transfer complete.
224 bytes sent in 0.000781 seconds (280.1 Kbytes/s)
local: sue.pub remote: sue.pub
ftp>bye
221 Goodbye.
Johnny$>
Now we'll telnet into Cash and concatenate the sue.pub file into /home/named/.ssh/authorized_keys file.
Cash$> pwd
/home/named/.ssh
Cash$> cat sue.pub >> authorized_keys
Cash$> exit
Connection closed.
Johnny$>
Let's recap what we've done so far.
1) We've created public and private keys on Johnny.
2) We've ftp'd the public key file, sue.pub, from Johnny to Cash.
3) We've telnetted to Cash, and concatenated the contents of sue.pub into authorized_keys
We're now ready to manually login from Johnny to Cash using ssh.
Johnny$> ssh -i /home/boy/.ssh/sue named@Cash
The authenticity of host 'Cash (xxx.yyy.zzz.aaa)' can't be established.
RSA key fingerprint is 65:11:7d:ef:ed:a3:cc:34:d1:b5:ba:c9:16:22:31:23.
Are you sure you want to continue connecting (yes/no)? yes
================================================================
*** NOTICE TO ALL USERS ***
================================================================
Cash$>exit<
/p>
Connection to Cash closed.
Johnny$>
Now on Johnny, create a shell script called 'boynamedsue.sh' with the following one line of contents and chmod the script to 777.
ssh -i /home/boy/.ssh/sue named@Cash /usr/bin/ls -l
Next, execute the script on Johnny.
Johnny$> boynamedsue.sh
================================================================
*** NOTICE TO ALL USERS ***
================================================================
-rwxrwxr-x 1 named namedgrp 10020 Oct 17 14:35 namedfile1.txt
-rw-r--r-- 1 named namedgrp 680 Aug 14 16:18 namedfile.html
-rw------- 1 named namedgrp 1148 Aug 18 09:51 mbox
drwxr-xr-x 2 named namedgrp 512 Jun 17 13:38 old
Johnny$>
You just executed a program on Johnny, that logged into Cash and ran a program (unix 'ls -l').
The next step you'll want to take is to replace the '/usr/bin/ls -l' command in the boynamedsue.sh program with the path and name of the program that you want to run.
About The Author
C.S. Deam is a small business owner. His eBook Computer Nuggets: Non-Techie Internet Tips For In-Laws, Out-Laws, and the Rest of Society is a great gift for non-techie family members and is available at www.linkertonpublishing.com where you can sign up for FREE E-Courses & Newsletters to help you on your path to self-employment.
best cleaning company Highland Park ..Microsoft CRM customization techniques are very diversified and based on... Read More
Microsoft Business Solutions is emerging as very attractive vendor for... Read More
Microsoft Business Solutions Great Plains was historically designed to serve... Read More
Whether you are a small consultancy firm, a medium sized... Read More
In the real world a "fire wall" is a fireproof... Read More
Before September of 1995, Microsoft ignored the Internet because their... Read More
In order to implement VLANs in a network environment, you'll... Read More
It would be easy to think, like most people apparently... Read More
It is now common thing when large corporation selects mid-market... Read More
Microsoft Retail Management System serves retail single store as well... Read More
Since technology changes so quickly, it is hard to begin... Read More
Preventive Maintenance (PM) is defined as scheduled work done on... Read More
MSN messenger is a pretty cool invention. I mean I'm... Read More
In this small article we will show you the possible... Read More
Anti-virus software is used to find, remove or fix files... Read More
I have yet to see a business that, sometimes in... Read More
Microsoft Business Solutions CRM and IBM Lotus Notes Domino, being... Read More
Hi, Guys,I believe a lot of programmers are trying to... Read More
Several years ago Microsoft purchased Great Plains Software, then Navision... Read More
And kill the best layout software in the process of... Read More
Microsoft Great Plains, former Great Plains Software Dynamics / eEnterprise... Read More
Icons are used everywhere; right from software applications, to internet... Read More
Collaboration SoftwareCollaboration Software, also known as group collaboration software or... Read More
We will base our prognosis on our Microsoft Business Solutions... Read More
Have you ever noticed that when you look at your... Read More
high-end home cleaning Winnetka ..Best Software Act! is very popular CRM for small and... Read More
Just the thought of a duel-boot scares many people away,... Read More
The first thing that you will notice about Linux Red... Read More
Bill of Lading is required report for Logistics and Freight... Read More
What is IRC?IRC is Internet Relay Chat. It is a... Read More
The Windows registry is a huge database that ensures normal... Read More
When reading an article where some term is used often,... Read More
CD and DVD replication is a process that works by... Read More
Before September 1995, Microsoft Windows was an MS-DOS program. DOS... Read More
It's not very often I get excited about a software... Read More
Great Plains Software Dynamics, Dynamics C/S+, eEnterprise were written on... Read More
Microsoft Great Plains serves the wide spectrum of horizontal markets.... Read More
Simply put, fleet maintenance allows companies to monitor and maintain... Read More
In 2004 Oracle, Inc. made its new step toward J2EE... Read More
With many manufacturing shops heading over seas in favor of... Read More
The destruction of the Soviet Union about 15 years ago,... Read More
Which Type of Shop Can Rely On A Home Built... Read More
A few months back I really got sick of my... Read More
Learning how to program software seems like a daunting task... Read More
Microsoft-Outlook is a pretty amazing program. So much more than... Read More
I completed an experiment recently. I wanted to find out... Read More
Spyware is software or hardware installed on a computer without... Read More
The various resume software offered, particularly on the internet, can... Read More
Logistics automation is often considered as barcoding extension to Sales... Read More
Around the same time Microsoft made its move with .Net... Read More
Software |