Countdown

265 days since the Man burns....

system administration

I see YOU!

Jan
15

Bad Login

It never ceases to amaze me, the number of things going on behind the scenes that folks think I don't notice.

123.30.189.246
% APNIC found the following authoritative answer from: whois.apnic.net
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html
% Information related to '123.30.0.0 - 123.31.255.255'
inetnum:        123.30.0.0 - 123.31.255.255
netname:        VDC-NET
country:        vn
descr:          VietNam Data Communication Company (VDC)
admin-c:        VIG1-AP
tech-c:         VIG1-AP
status:         ALLOCATED NON-PORTABLE
changed:        [email protected] 20090325
mnt-by:         MAINT-VN-VNPT
source:         APNIC
role:           VDC IPADMIN GROUP
address:        Internet Building, Block II, Thang Long Inter Village
address:        Nguyen Phong Sac str, Cau Giay Dist,  Ha Noi
country:        VN
phone:          +84-912-800008
fax-no:         +84-4-9430427
e-mail:         [email protected]
remarks:        send spam reports to [email protected]
remarks:        and abuse reports to [email protected]
admin-c:        THMH1-AP
tech-c:         THMH1-AP
nic-hdl:        VIG1-AP
notify:         [email protected]
mnt-by:         MAINT-VN-VNPT
changed:        [email protected] 20090325
source:         APNIC
changed:        [email protected] 20111114
% Information related to '123.30.128.0/18AS7643'
route:          123.30.128.0/18
descr:          VietNam Post and Telecom Corporation (VNPT)
descr:          VNPT-AS-AP
country:        VN
origin:         AS7643
remarks:        mailto: [email protected]
notify:         [email protected]
mnt-by:         MAINT-VN-VNPT
changed:        [email protected] 20100121
source:         APNIC
% This query was served by the APNIC Whois Service version 1.69.1-APNICv1r0 (WHOIS1)
Posted By kyrka read more

Linux Server Hacks - O'Reilly Press, Hack #67

Oct
24
One of my absolute favorite server hacks.  This requires that you have already setup SSH keys for authentication instead of passwords.  

Hack #67. Turbo-mode ssh Logins



Even faster logins from the command line



If you've just come from the previous hack, you've only seen half of the solution! Even with client keys, you still have to needlessly type ssh server every time you want to ssh in. Back in the dark, insecure, unenlightened days of rsh, there was an obscure feature that I happened to love that hasn't (yet) been ported to ssh. It used to be possible to symlink /usr/bin/rsh to a file of the same name as your server, and rsh was smart enough to realize that if it wasn't called as rsh, that it should rsh to whatever name it was called as.



Of course, this is trivial to implement in shell. Create a file called ssh-to with these two lines in it:


#!/bin/sh 
ssh `basename $0` $*


(Those are backticks around basename $0.) Now put that in your PATH (if ~/bin doesn't exist or isn't in your PATH already, it should be) and set up symlinks to all of your favorite servers to it:

$ cd bin $ ln -s ssh-to server1 $ ln -s ssh-to server2 $ ln -s ssh-to server3

Now, to ssh to server1 (assuming you've copied your public key over as described previously) you can simply type "server1" and you'll magically end up with a shell on server1, without typing "ssh," and without entering your password. That $* at the end allows you to run arbitrary commands in a single line (instead of spawning a shell), like this:


server1 uptime





Linux Server Hacks



by Rob Flickenger

Published by O'Reilly Media, Inc., 2003
Posted By kyrka read more
Subscribe to RSS - system administration