How do you run a program on a remote server using ssh?
For this example we'll have two servers, one named Johnny and another named Cash. Both are running openssh. Our goal is to have a program on Johnny login to Cash and run a program on Cash. To make the task a little more complex we'll be using different users on each machine.
The first thing we'll need to do is generate public and private keys on Johnny. So, logged into Johnny as user 'boy' we create public and private keys by creating them in the .ssh directory as follows:
Johnny$> pwd
/home/boy/.ssh
Johnny$> ssh-keygen -t rsa -f sue
Generating public/private rsa key pair.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in sue.
Your public key has been saved in sue.pub.
The key fingerprint is:
8d:e9:c0:g1:c7:1f:e3:b3:2f:38:12:aa:b5:3b:2e:b3 boy@Johnny
Johnny$>
In the example above we picked an arbitrary name, sue, to identify the files that hold the generated keys. When prompted to enter a passphrase (twice) we simply hit enter twice.
As the output of ssh-keygen indicates, the public key has been saved in a file named sue.pub.
The output of ssh-keygen implies, but doesn't indicate directly, that the private key is in a file named sue (Yes, a user named boy created a file named sue.)
Johnny$>ls -l
-rwx------ 1 sue suegrp 887 Oct 17 14:27 sue
-rwx------ 1 sue suegrp 223 Oct 17 14:27 sue.pub
The private key file, sue, will remain on Johnny for the reaminder of this exercise, but the public key must be moved to the remote server, Cash. Note that the .ssh directory itself, as well as the sue and sue.pub files should have permissions of 700.
Now you'll need to ftp the sue.pub file from Johnny to Cash. The user on Cash that we'll login as is user 'named'.
Johnny$> ftp Cash
Connected to Cash
220 Cash - Propery of Xyz. - Authorized users only
Name (Cash:boy): named
331 Password required for named.
Password:
230-Last unsuccessful login: Fri Oct 17 13:12:55 2003 on ftp from Johnny 230-Last login: Fri Oct 17 16:02:11 2003 on /dev/pts/1 from Johnny
230 User named logged in.
ftp> cd .ssh
ftp> mput sue.pub
mput sue.pub? y
200 PORT command successful.
150 Opening data connection for sue.pub.
226 Transfer complete.
224 bytes sent in 0.000781 seconds (280.1 Kbytes/s)
local: sue.pub remote: sue.pub
ftp>bye
221 Goodbye.
Johnny$>
Now we'll telnet into Cash and concatenate the sue.pub file into /home/named/.ssh/authorized_keys file.
Cash$> pwd
/home/named/.ssh
Cash$> cat sue.pub >> authorized_keys
Cash$> exit
Connection closed.
Johnny$>
Let's recap what we've done so far.
1) We've created public and private keys on Johnny.
2) We've ftp'd the public key file, sue.pub, from Johnny to Cash.
3) We've telnetted to Cash, and concatenated the contents of sue.pub into authorized_keys
We're now ready to manually login from Johnny to Cash using ssh.
Johnny$> ssh -i /home/boy/.ssh/sue named@Cash
The authenticity of host 'Cash (xxx.yyy.zzz.aaa)' can't be established.
RSA key fingerprint is 65:11:7d:ef:ed:a3:cc:34:d1:b5:ba:c9:16:22:31:23.
Are you sure you want to continue connecting (yes/no)? yes
================================================================
*** NOTICE TO ALL USERS ***
================================================================
Cash$>exit<
/p>
Connection to Cash closed.
Johnny$>
Now on Johnny, create a shell script called 'boynamedsue.sh' with the following one line of contents and chmod the script to 777.
ssh -i /home/boy/.ssh/sue named@Cash /usr/bin/ls -l
Next, execute the script on Johnny.
Johnny$> boynamedsue.sh
================================================================
*** NOTICE TO ALL USERS ***
================================================================
-rwxrwxr-x 1 named namedgrp 10020 Oct 17 14:35 namedfile1.txt
-rw-r--r-- 1 named namedgrp 680 Aug 14 16:18 namedfile.html
-rw------- 1 named namedgrp 1148 Aug 18 09:51 mbox
drwxr-xr-x 2 named namedgrp 512 Jun 17 13:38 old
Johnny$>
You just executed a program on Johnny, that logged into Cash and ran a program (unix 'ls -l').
The next step you'll want to take is to replace the '/usr/bin/ls -l' command in the boynamedsue.sh program with the path and name of the program that you want to run.
About The Author
C.S. Deam is a small business owner. His eBook Computer Nuggets: Non-Techie Internet Tips For In-Laws, Out-Laws, and the Rest of Society is a great gift for non-techie family members and is available at www.linkertonpublishing.com where you can sign up for FREE E-Courses & Newsletters to help you on your path to self-employment.
family-safe home cleaners Northbrook ..Microsoft-Outlook is a pretty amazing program. So much more than... Read More
Today's business world is fast-paced. No matter what it is... Read More
SAP Inc., a global leader in client/server enterprise application software... Read More
The term "document management" and "paperless office" is the subject... Read More
For those who are unclear on the differences between the... Read More
All your software is stored on a hard-drive. But how... Read More
Are you a whiz at calculating financial information? Not the... Read More
Microsoft Business Solutions CRM is present several years on the... Read More
Great Plains Fixed Assets Management module is a robust tool... Read More
Our opinion is based on our Microsoft Business Solutions Great... Read More
Bar charts, bar graphs, and any other chart or graph... Read More
"Pfishing", sometimes spelled "Phishing", is a word that's used to... Read More
What is Snort?Snort is an open source network intrusion detection... Read More
For those who still don't know, Microsoft Publisher helps computer... Read More
Microsoft Great Plains and Microsoft Retail Management System (Microsoft RMS)... Read More
As of now - Great Plains Dynamics/eEnterprise is transformed/renamed into... Read More
Logistics automation is often considered as barcoding extension to Sales... Read More
CD and DVD replication is a process that works by... Read More
There are plenty of articles out there about how to... Read More
Microsoft Great Plains may be recommended for international freight forwarding... Read More
Just the thought of a duel-boot scares many people away,... Read More
Every organization which creates collaborative documents, whether they are budgets,... Read More
In this small article we will be looking at the... Read More
Designing without tables by using CSS layouts is fast becoming... Read More
Scrapbooks are very popular these days. I think that almost... Read More
residential cleaning services Deerfield ..With thousands of web pages added to the Net every... Read More
XML Server can be a Web Server that stores the... Read More
Handling character strings in Java is supported through two final... Read More
We live in a post-industrial age where information is the... Read More
After seeing many people complain about their weak Internet security... Read More
Heard about the Quark "killer"?Adobe InDesign CS2. Will it really... Read More
.Net Framework is a platform or development environment to seamlessly... Read More
Now there are Three Steps To Heaven Just listen and... Read More
Document Manager and Version HistoryIn previous articles I have discussed... Read More
If there still are few unprotected computers left, I haven't... Read More
DBxtra goes ASPGetting to the information hidden within corporate databases... Read More
When you first think about multicurrency ? you probably have... Read More
Make-or-Break Factors in Success and ProfitabilityFor quick printers, estimating can... Read More
Microsoft Great Plains could be tuned and setup to fit... Read More
Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More
Sticky Noteshttp://www.deprice.com/stickynote.htmWith StickyNote 9.0, you can create beautiful 3D notes... Read More
The fact that a software tester is a most infamous... Read More
Remember back in the days where screensavers were the coolest... Read More
Ok... Where to start?Well, I guess I will start at... Read More
When you think... Read More
Research bears that less than 70 percent of development projects... Read More
SyncUp, a file synchronizer is designed to assist the home... Read More
... Read More
Adware is a type of Spyware program that displays some... Read More
Are you ready? SQL Server 2005, the next-generation data management... Read More
Software |