![]() The popular OpenSSH client allows you to permanently configure specific options on a host-by-host basis, by adding sections to the file ~/.ssh/config. Note: The Windows SSHAndTunnels page describes in more detail how to configure PuTTY for use with PageKite. If your SSH client supports it, simply configure it to use :443 as the HTTP proxy and connect to on the standard port, 22. Ssh-keygen -l -f /etc/ssh/ssh_host_dsa_key.pubĮxactly which of the above commands apply on your system may vary (and you may need to tweak the paths slightly), but one of the listed fingerprints should be displayed by your ssh client the first time you connect. Ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key.pub If you want to verify later that you are indeed connecting to the correct server, you can display the server's public SSH key fingerprints using commands like so: ssh-keygen -l -f /etc/ssh/ssh_host_ecdsa_key.pub Making sure you connect to the right server Restart pagekite.py, and the SSH server should be accessible. If you have installed PageKite with the DebianPackage or RpmPackage, follow the instructions on ConfigureYourSystem.Īssuming you already have an SSH server running on port 22 on your local machine, and the machine has an active PageKite connection named, run the following command to add it to your configuration file: $ pagekite.py -add 22 ssh:Īlternately, you can edit the configuration file yourself, adding a line like so: service_on=raw/22::localhost:22:SECRET
0 Comments
Leave a Reply. |