Run SSH without ANY Authentication [closed] - security

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
Closed 6 years ago.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Improve this question
I know it flies in the face of the very notion of a "secure shell," but I would like a way to run SSH that requires absolutely no authentication whatsoever. I have a collection of machines that run on a totally air gaped network. It's used for a hardware prototyping project, and for reasons beyond my understanding some of these machines occasionally start asking for a password regardless of the fact that they have all been cloned with the same SSH keys that work some times.
I'd really like to side step all the security issues that can prevent SSH from connecting to a machine. I've seen in other posts people strongly recommending against what I am trying to do; but I've wasted enough time trying to fight SSH's security features. Is there a flag I can use? A change to a config file? Another version of SSH I can install?
Any help would be appreciated.

It seems that you want a 'remote shell', so try rsh.

Related

Can an attacker exploit my /etc/machine-id? [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
Closed 5 years ago.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Improve this question
I am writing software that needs to uniquely identify multiple different machines. I was planning on using /etc/machine-id to do this.
While reading the docs for machine-id, I stumbled upon this passage:
This ID uniquely identifies the host. It should be considered "confidential", and must not be exposed in untrusted environments, in particular on the network. If a stable unique identifier that is tied to the machine is needed for some application, the machine ID or any part of it must not be used directly. Instead the machine ID should be hashed with a cryptographic, keyed hash function, using a fixed, application-specific key.
Is this really the case? If so, what could an attacker actually exploit using the machine-id? I don't know much about d-bus, but I was under the impression that it's only for IPC, and therefore I'm not sure why it would really matter if a remote attacker knew the machine-id. I was planning on sending / storing these unencrypted, but would rather not if it's going to be a security issue.
Edit: This question was answered here by someone familiar with the issue. Basically, the recommendation in the manpage is just for privacy reasons, not due to any actual security issues.

Run ssh forwarding command before nagios command [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
Closed 6 years ago.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Improve this question
I have a number of machines which I would like to check using my Nagios box. They sit behind a machine which is reachable from my Nagios box; all are running Linux. These machines have no routing to outside networks. If I need to reach the machines manually I either ssh to the intermediate box and then ssh to the other machines, or I'll use ssh to forward a port.
I usually use SNMP for most of my checks. So my thought is that prior to my Nagios box running a check I could have it run a command to forward the needed port, then get rid of the forward when done. Can anyone guide me on the best way to do this?
Thanks!
You probably want to look into Nagios passive checks. As described in the documentation:
Passive checks are useful for monitoring services that are:
Asynchronous in nature and cannot be monitored effectively by polling
their status on a regularly scheduled basis
Located behind a firewall and cannot be checked actively from the monitoring host
Your use case is pretty clearly the second one.

Opening a session on your operating system [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 6 years ago.
Improve this question
I was looking at how windows provides tools like this called Remote Desktop Connection. Then I wondered, how would of this been accomplished. First most likely a socket connection is made between the two computers, but then how is a usable session opened. How could I do this in Java or Python?
My goal is to make one of these for connections over the internet protocol.
Research the protocol RDP which underpins the remote desktop connection support. Libraries exist to assist in using RDP in many different programming languages when you get to that point.

Detect incoming ssh connection [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
Closed 8 years ago.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Improve this question
I'm working on a network with many Linux machines.
In one of them I have a file that I suspect was pushed by another machine.
The machines can access each other using ssh connections.
Is there anyway I can tell which machine pushed the file?
I tried looking for ssh logs but the /var/log/secure/ directory doesn't exist.
Depending on the distro and your logging settings, you may have some luck with /log/auth.
Try grep sshd /var/log/auth.log
Depends on your distro, you can check following files from your distro.
/var/log/secure
/var/log/auth.log
/var/log/syslog
/var/log/daemon.log

$DISPLAY env not set using ssh [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
Closed 9 years ago.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Improve this question
I'm using ssh from my Mac terminal to login to a server at my university. I'm trying to launch cscope which uses X and get "Error initializing application (Tcl_AppInit?): no display name and no $DISPLAY environment variable". This is expected. I've tried adding the -X parameter when logging in but that doesn't work. I know this can work with putty and x-term but that's only with Windows machines. Is there any way to launch a gui just from my terminal through playing with $DISPLAY and X tunneling? Thanks!
Before you ask a question it's recommended that you try to do some research on your own. A little searching can go a long way.
Anyways
how-to-enable-x11-forwarding-with-ssh-on-mac-os-x-leopard
MIT article on the subject
my Google search
If you can't get it working, I suggest looking at the Super User Q&A forums.
Super User is similar to Stack Overflow but it's more geared towards arcane terminal stuff and general computer questions whereas Stack Overflow is more geared towards programming specifically. You might be able to find more knowledgeable people there.

Resources