Shell tools
Vim
- Vim.org
- home page
- config file
$HOME/.vimrc - content
$HOME/.vimrcThis library comes pre-installed with BSD and Linux variants. The use case here is to create client keys so as to avoid password authentication.
ssh-keygen -t ed25519$HOME/.ssh directoryssh-keygen -t ecdsa$HOME/.ssh directoryssh-copy-id user@hostnameauthorized_keys file on the
remote server. From now on you can use publickey authentication instead of
password authenticationpkg install fusefs-sshfsapt-get install sshfsvi /etc/fstabsshfs#user@hostname:/path/to/share /path/to/mountpoint fuse noauto,rw,uid=username,gid=groudname,user,reconnect,IdentityFile=/path/to/home/.ssh/id_ecdsa 0 0mount /path/to/mountpointA multi purpose relay, which had multiple use cases
ssh to log onto your computer you can hide the ssh trafic as
https traficpkg install socatopenssl req -x509 -newkey rsa:2048 -keyout client.key -out client.crt -days 300 -nodesmv client.* $HOME/.ssh/openssl req -x509 -newkey rsa:2048 -keyout tunnel.key -out tunnel.crt -days 300 -nodesmv tunnel.* /root/
/path/to/socat -L /run/Socat_21022_22 OPENSSL-LISTEN:21022,fork,reuseaddr,certificate=/root/tunnel.crt,key=/root/tunnel.key,verify=0 tcp:127.0.0.1:22 &
/etc/rc.local
you can hide your ssh connections within https. The
tunnel listens to incoming port 21022 and redirects it to local port 22. Since
this is only for hiding traffic no keys are verified (verify=0).vi $HOME/.ssh/config/
Host vicktricks.net
ProxyCommand =/usr/bin/socat STDIO OPENSSL-CONNECT:%h:21022,verify=0,cert=/path/to/home/.ssh/client.crt,key=/path/to/home/.ssh/client.key
socat tunnel.crt/tunnel.key
are run