Re: How do I set-up secure automated file push and pull?

From: Crist J. Clark (
Date: 04/25/02

Date: Wed, 24 Apr 2002 23:07:59 -0700
From: "Crist J. Clark" <>
To: Anupam <>

On Fri, Apr 19, 2002 at 11:47:58PM -0400, Anupam wrote:

> - Are there any options I am missing?


Your SSH description has be a bit puzzled. Do you want to use SSH or
RSH? Certificates, huh? Also look at using ssh(1) with an
'authorized_keys' file with a 'command=' specification.

Crist J. Clark                     |
                                   |    |

Relevant Pages

  • Re: Tunneling through a corporate firewall
    ... Apple Mail allows that; many other e-mail clients do, ... admin is not blocking port 995, the default port for POP over SSH. ... If yes, I won't be able to avoid tunneling through http, and in this ...
  • Re: Tunneling misc questions.
    ... I want to set up an SSH-based tunnel from my computer at ... > to get a HTTP tunnel working. ... > Would I need to install a HTTP proxy on that machine? ... my ssh syntax is: ...
  • Re: Tunneling through a corporate firewall
    ... But his company's firewall doesn't allow SSH through. ... You're doing the opposite -- tunneling HTTP through SSH, ... SSH through HTTP. ... POP server using https, without downloading the mail, just to be ...
  • Re: any way to confirm break-in?
    ... made through ssh to access the machine from a couple of IP addresses. ... check the installed files against the md5 sums in the database of installed ... Is it still possible for an outsider to manipulate the system somehow? ... means of rooter firewall but by this means only -- HTTP, ...
  • Re: ssh over http
    ... SSH is a transport layer protocol, HTTP ...