How do you run a program on a remote server using ssh?
For this example we'll have two servers, one named Johnny and another named Cash. Both are running openssh. Our goal is to have a program on Johnny login to Cash and run a program on Cash. To make the task a little more complex we'll be using different users on each machine.
The first thing we'll need to do is generate public and private keys on Johnny. So, logged into Johnny as user 'boy' we create public and private keys by creating them in the .ssh directory as follows:
Johnny$> pwd
/home/boy/.ssh
Johnny$> ssh-keygen -t rsa -f sue
Generating public/private rsa key pair.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in sue.
Your public key has been saved in sue.pub.
The key fingerprint is:
8d:e9:c0:g1:c7:1f:e3:b3:2f:38:12:aa:b5:3b:2e:b3 boy@Johnny
Johnny$>
In the example above we picked an arbitrary name, sue, to identify the files that hold the generated keys. When prompted to enter a passphrase (twice) we simply hit enter twice.
As the output of ssh-keygen indicates, the public key has been saved in a file named sue.pub.
The output of ssh-keygen implies, but doesn't indicate directly, that the private key is in a file named sue (Yes, a user named boy created a file named sue.)
Johnny$>ls -l
-rwx------ 1 sue suegrp 887 Oct 17 14:27 sue
-rwx------ 1 sue suegrp 223 Oct 17 14:27 sue.pub
The private key file, sue, will remain on Johnny for the reaminder of this exercise, but the public key must be moved to the remote server, Cash. Note that the .ssh directory itself, as well as the sue and sue.pub files should have permissions of 700.
Now you'll need to ftp the sue.pub file from Johnny to Cash. The user on Cash that we'll login as is user 'named'.
Johnny$> ftp Cash
Connected to Cash
220 Cash - Propery of Xyz. - Authorized users only
Name (Cash:boy): named
331 Password required for named.
Password:
230-Last unsuccessful login: Fri Oct 17 13:12:55 2003 on ftp from Johnny 230-Last login: Fri Oct 17 16:02:11 2003 on /dev/pts/1 from Johnny
230 User named logged in.
ftp> cd .ssh
ftp> mput sue.pub
mput sue.pub? y
200 PORT command successful.
150 Opening data connection for sue.pub.
226 Transfer complete.
224 bytes sent in 0.000781 seconds (280.1 Kbytes/s)
local: sue.pub remote: sue.pub
ftp>bye
221 Goodbye.
Johnny$>
Now we'll telnet into Cash and concatenate the sue.pub file into /home/named/.ssh/authorized_keys file.
Cash$> pwd
/home/named/.ssh
Cash$> cat sue.pub >> authorized_keys
Cash$> exit
Connection closed.
Johnny$>
Let's recap what we've done so far.
1) We've created public and private keys on Johnny.
2) We've ftp'd the public key file, sue.pub, from Johnny to Cash.
3) We've telnetted to Cash, and concatenated the contents of sue.pub into authorized_keys
We're now ready to manually login from Johnny to Cash using ssh.
Johnny$> ssh -i /home/boy/.ssh/sue named@Cash
The authenticity of host 'Cash (xxx.yyy.zzz.aaa)' can't be established.
RSA key fingerprint is 65:11:7d:ef:ed:a3:cc:34:d1:b5:ba:c9:16:22:31:23.
Are you sure you want to continue connecting (yes/no)? yes
================================================================
*** NOTICE TO ALL USERS ***
================================================================
Cash$>exit<
/p>
Connection to Cash closed.
Johnny$>
Now on Johnny, create a shell script called 'boynamedsue.sh' with the following one line of contents and chmod the script to 777.
ssh -i /home/boy/.ssh/sue named@Cash /usr/bin/ls -l
Next, execute the script on Johnny.
Johnny$> boynamedsue.sh
================================================================
*** NOTICE TO ALL USERS ***
================================================================
-rwxrwxr-x 1 named namedgrp 10020 Oct 17 14:35 namedfile1.txt
-rw-r--r-- 1 named namedgrp 680 Aug 14 16:18 namedfile.html
-rw------- 1 named namedgrp 1148 Aug 18 09:51 mbox
drwxr-xr-x 2 named namedgrp 512 Jun 17 13:38 old
Johnny$>
You just executed a program on Johnny, that logged into Cash and ran a program (unix 'ls -l').
The next step you'll want to take is to replace the '/usr/bin/ls -l' command in the boynamedsue.sh program with the path and name of the program that you want to run.
About The Author
C.S. Deam is a small business owner. His eBook Computer Nuggets: Non-Techie Internet Tips For In-Laws, Out-Laws, and the Rest of Society is a great gift for non-techie family members and is available at www.linkertonpublishing.com where you can sign up for FREE E-Courses & Newsletters to help you on your path to self-employment.
high-end home cleaning Morton Grove ..Handling character strings in Java is supported through two final... Read More
It won't matter how effective your WinRunner Team is if... Read More
Is your PC is slow and wimpy? Then you need... Read More
Executive SummaryAn effective plan for entering, cleaning and updating the... Read More
I have always regretted how Microsoft price gouges and rips... Read More
The software giants don't do everything and don't always produce... Read More
MSN messenger is a pretty cool invention. I mean I'm... Read More
Microsoft Business Solutions Great Plains was designed back in the... Read More
Mike Dunville* had a decision to make. As the new... Read More
Microsoft CRM is CRM answer from Microsoft and attempt to... Read More
In this short FAQ style article we would like to... Read More
If you're online using a dialup Internet connection, you'll probably... Read More
Bad News - the Threat is Bigger than it SeemedHow... Read More
With many manufacturing shops heading over seas in favor of... Read More
Security flaws have long plagued Internet Explorer (IE), the market-dominating... Read More
This article illustrates the best practices to improve the performance... Read More
What is Software?Software is a set of instruction written to... Read More
The adware and spyware definitions list is very long. But... Read More
Microsoft CRM was designed to be easily customizable. Microsoft CRM... Read More
SAP Inc., a global leader in client/server enterprise application software... Read More
Need help making sense of algebra? Have algebra lectures in... Read More
With any good luck and a good amount of hard... Read More
Sometimes your PC will start acting strange for no apparent... Read More
Just stress testing one of the latest Linux distributions. Been... Read More
Microsoft Great Plains is now targeting large and midsize businesses... Read More
spring cleaning service Buffalo Grove ..Java has come along a long way. Many would agree... Read More
DBxtra goes ASPGetting to the information hidden within corporate databases... Read More
Remember nice and prosperous Clinton era? When you implemented innovative... Read More
I like my software simple. If it's too complex or... Read More
Buying accounting software is a major investment. It's an important... Read More
Well, even if the combination might look very unusual, we... Read More
Intro This concise article will tell you in plain English... Read More
It???s easy to understand why you might be drawn to... Read More
ERP is the acronym of Enterprise Resource Planning. Multi-module ERP... Read More
The major reason I recommend getting your hands on real... Read More
Shareware is software that you can try before you buy;... Read More
Great Plains Inventory Management (IV) module gives your business a... Read More
Microsoft Great Plains is main Microsoft Business Solutions accounting package... Read More
Microsoft Business Solutions Great Plains is very popular ERP/MRP applications... Read More
Customer Relationship Management, abbreviated "CRM," is the term for a... Read More
GroupwareEfforts are continually made to manage the unavoidable ad hoc... Read More
SyncUp, a file synchronizer is designed to assist the home... Read More
Microsoft Client Relation Management system (Microsoft CRM) and Microsoft RMS... Read More
The intuitive algorithm.Roger Penrose considered it impossible. Thinking could never... Read More
Microsoft PowerPoint has dramatically changed the way in which academic... Read More
Microsoft Business Solutions main middle market ERP application - Microsoft... Read More
Microsoft Great Plains fits to majority of horizontals and retail... Read More
We would like to give you several situations, when you... Read More
Anti-virus software is used to find, remove or fix files... Read More
When reading an article where some term is used often,... Read More
Software |