J'aimerais accélérer la connexion à des serveurs spécifiques.
J'ai les serveurs disons:
123.123.123.1
123.123.123.2
123.123.123.3
Je communique normalement avec ce qui suit:
ssh -p 12345 [email protected]
C'est une douleur car la seule différence entre les serveurs est le dernier numéro de l'ip.
J'ai essayé le code suivant:
alias ssht='{ ip=$(cat -); ssh -p 12345 my_user@"123.123.123.$ip"; }<<<'
Cependant je reçois une erreur:
karl@karls-laptop ~/scripts $ ssht 1
Pseudo-terminal will not be allocated because stdin is not a terminal.
Y a-t-il un moyen de faire fonctionner ça?
Cela appelle une fonction - simple et robuste, alors qu'un alias
serait dans ce cas fragile.
Quelque chose comme ça devrait faire:
function ssht () {
[[ $1 =~ ^(1|2|3)$ ]] || { echo 'Not a valid last octet value !!' && return ;}
ip=123.123.123.$1
ssh my_user@"$ip" -p 12345
}
La condition [[ $1 =~ ^(1|2|3)$ ]]
s'assure que vous avez entré l'un des 1, 2, 3 comme premier argument (tout argument final est ignoré).
Maintenant, vous pouvez donner le dernier octet désiré comme premier argument:
ssht 1
ssht 2
ssht 3
Mettez ceci dans votre ~/.bashrc
pour l'avoir disponible dans n'importe quelle session interactive.
Utilisez la méthode souhaitée et écrivez les options et les alias dans ~/.ssh/config
:
Host 1
Port 12345
User my_user
HostName 123.123.123.1
Host 2
Port 12345
User my_user
HostName 123.123.123.2
etc...
Et puis connectez-vous simplement en utilisant
ssh 1
ssh 2
...
Vous pouvez utiliser des modèles dans ~/.ssh/config
. De man ssh_config
:
PATTERNS
A pattern consists of zero or more non-whitespace characters, ‘*’ (a
wildcard that matches zero or more characters), or ‘?’ (a wildcard that
matches exactly one character). For example, to specify a set of
declarations for any Host in the “.co.uk” set of domains, the following
pattern could be used:
Host *.co.uk
The following pattern would match any Host in the 192.168.0.[0-9] network
range:
Host 192.168.0.?
Combiné avec:
HostName
Specifies the real Host name to log into. This can be used to
specify nicknames or abbreviations for hosts. If the hostname
contains the character sequence ‘%h’, then this will be replaced
with the Host name specified on the command line (this is useful
for manipulating unqualified names). The character sequence ‘%%’
will be replaced by a single ‘%’ character, which may be used
when specifying IPv6 link-local addresses.
Donc, dans votre ~/.ssh/config
, mettez:
Host ?
Hostname 123.123.123.%h
Port 12345
User my_user
Ensuite:
$ ssh -v 1
OpenSSH_7.4p1, LibreSSL 2.5.0
debug1: Reading configuration data /home/muru/.ssh/config
debug1: /home/muru/.ssh/config line 41: Applying options for ?
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Connecting to 123.123.123.1 [123.123.123.1] port 12345.
debug1: connect to address 123.123.123.1 port 12345: Connection refused
ssh: connect to Host 123.123.123.1 port 12345: Connection refused
Utilisez une fonction à la place:
function ssht(){
ssh -p 12345 [email protected].$1
}
$ ssht 1
$ ssht 2
$ ...
Une meilleure solution consiste à utiliser un fichier ssh config
:
touch ~/.ssh/config
avec des lignes similaires à:
Host some-name
HostName 123.123.123.1
User your_user
Port 22
Vous pouvez également utiliser les touches ssh pour améliorer la vitesse, enfin vous ne lancez que:
ssh some-name
et vous êtes connecté à ce serveur.
Vous n'avez même pas besoin d'utiliser un nom comme ssht. Les noms commençant par des chiffres, même seulement des chiffres, sont des noms d'hôte valides dans le fichier de configuration ssh.
Ci-dessous les travaux sur Xubuntu Xenial
Une partie de mon ~/.ssh/config
Host 1
Hostname bastion.example.me
User said
Port 22
IdentityFile ~/.ssh/id_rsa
ForwardAgent yes
Commande que j'exécute (ci-dessous, j'ai ajouté -vv
pour la journalisation détaillée à STDOUT
a.k.a votre écran par défaut)
ssh -vv 1
Sortie
OpenSSH_7.2p2 Ubuntu-4ubuntu2.2, OpenSSL 1.0.2g 1 Mar 2016
debug1: Reading configuration data /home/said/.ssh/config
debug1: /home/said/.ssh/config line 24: Applying options for 1
debug1: /home/said/.ssh/config line 540: Applying options for *
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 19: Applying options for *
debug2: resolving "bastion.example.me" port 22
debug2: ssh_connect_direct: needpriv 0
debug1: Connecting to bastion.example.me [XXX.YYY.120.51] port 22.
debug1: Connection established.
debug1: identity file /home/said/.ssh/id_rsa type 1
debug1: key_load_public: No such file or directory
debug1: identity file /home/said/.ssh/id_rsa-cert type -1
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.2
debug1: Remote protocol version 2.0, remote software version OpenSSH_7.2p2 Ubuntu-4ubuntu2.2
debug1: match: OpenSSH_7.2p2 Ubuntu-4ubuntu2.2 pat OpenSSH* compat 0x04000000
debug2: fd 3 setting O_NONBLOCK
debug1: Authenticating to bastion.example.me:22 as 'said'
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms: [email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,ext-info-c
debug2: Host key algorithms: [email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[email protected],[email protected],ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa
debug2: ciphers ctos: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc
debug2: ciphers stoc: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc
debug2: MACs ctos: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,[email protected],zlib
debug2: compression stoc: none,[email protected],zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: [email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1
debug2: Host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]
debug2: ciphers stoc: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]
debug2: MACs ctos: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,[email protected]
debug2: compression stoc: none,[email protected]
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug1: kex: algorithm: [email protected]
debug1: kex: Host key algorithm: ecdsa-sha2-nistp256
debug1: kex: server->client cipher: [email protected] MAC: <implicit> compression: none
debug1: kex: client->server cipher: [email protected] MAC: <implicit> compression: none
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: Server Host key: ecdsa-sha2-nistp256 SHA256:44tChrTUMwuRcOi6laiYlf6VM3qAD+PEn9EdNMribFw
debug1: Host 'bastion.example.me' is known and matches the ECDSA Host key.
debug1: Found key in /home/said/.ssh/known_hosts:69
debug2: set_newkeys: mode 1
debug1: rekey after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: rekey after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS received
debug2: key: /home/said/.ssh/id_rsa (0x562c764294f0), explicit, agent
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=<rsa-sha2-256,rsa-sha2-512>
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey
debug1: Next authentication method: publickey
debug1: Offering RSA public key: /home/said/.ssh/id_rsa
debug2: we sent a publickey packet, wait for reply
debug1: Server accepts key: pkalg rsa-sha2-512 blen 279
debug2: input_userauth_pk_ok: fp SHA256:KQNLYiJICyNbKmIxVVgc67RF+qRKjNi3w+0iXz/YDyk
debug1: Authentication succeeded (publickey).
Authenticated to bastion.example.me ([XXX.YYY.120.51]:22).
debug1: channel 0: new [client-session]
debug2: channel 0: send open
debug1: Requesting [email protected]
debug1: Entering interactive session.
debug1: pledge: network
debug1: client_input_global_request: rtype [email protected] want_reply 0
debug2: callback start
debug1: Requesting authentication agent forwarding.
debug2: channel 0: request [email protected] confirm 0
debug2: fd 3 setting TCP_NODELAY
debug2: client_session2_setup: id 0
debug2: channel 0: request pty-req confirm 1
debug2: channel 0: request Shell confirm 1
debug2: callback done
debug2: channel 0: open confirm rwindow 0 rmax 32768
debug2: channel_input_status_confirm: type 99 id 0
debug2: PTY allocation request accepted on channel 0
debug2: channel 0: rcvd adjust 2097152
debug2: channel_input_status_confirm: type 99 id 0
debug2: Shell request accepted on channel 0
Welcome to Ubuntu 16.04.2 LTS (GNU/Linux 4.8.0-42-lowlatency x86_64)
<TRUNCATED CUSTOM MOTD>
$
Mise à jour - ci-dessous est une solution alternative hackish, prenez-le uniquement pour un exercice basiste, peut-être pour des choses rapides et sales:
alias ssht='f(){ ssh -p 22 [email protected].$@;unset -f f;}&&f'
Ce qu'il fait
-L
, -R
, -D
), le mode prolixe (-vv
), no-TTY (-T
), etc.Par exemple, je veux démarrer un proxy chaussettes sans terminal
$ ssht 2 -vv -D 1080 -T
OpenSSH_7.2p2 Ubuntu-4ubuntu2.2, OpenSSL 1.0.2g 1 Mar 2016
debug1: Reading configuration data /home/said/.ssh/config
debug1: /home/said/.ssh/config line 540: Applying options for *
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 19: Applying options for *
debug2: resolving "192.168.0.2" port 22
debug2: ssh_connect_direct: needpriv 0
debug1: Connecting to 192.168.0.2 [192.168.0.2] port 22.
debug1: Connection established.
<TRUNCATED>
Welcome to Linux Mint 18.1 Serena (GNU/Linux 4.4.0-81-generic x86_64)
* Documentation: https://www.linuxmint.com
98 packages can be updated.
0 updates are security updates.
Comme vous pouvez le constater, aucune commande Invite n’a été exécutée avec les arguments -vv
, -T
, -D 1080
.
Je peux aussi vérifier le tunnel (essentiellement le proxy SOCKS5) sur ma machine
$ ss -ltnp | grep 1080
LISTEN 0 128 127.0.0.1:1080 *:* users:(("ssh",pid=17038,fd=6))