<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.umiacs.umd.edu/umiacs/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Azar</id>
	<title>UMIACS - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.umiacs.umd.edu/umiacs/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Azar"/>
	<link rel="alternate" type="text/html" href="https://wiki.umiacs.umd.edu/umiacs/index.php/Special:Contributions/Azar"/>
	<updated>2026-04-28T12:01:13Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.7</generator>
	<entry>
		<id>https://wiki.umiacs.umd.edu/umiacs/index.php?title=SecureShell&amp;diff=4127</id>
		<title>SecureShell</title>
		<link rel="alternate" type="text/html" href="https://wiki.umiacs.umd.edu/umiacs/index.php?title=SecureShell&amp;diff=4127"/>
		<updated>2011-11-09T17:31:03Z</updated>

		<summary type="html">&lt;p&gt;Azar: /* X11 Forwarding */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Secure Shell (or [http://en.wikipedia.org/wiki/Secure_Shell SSH]) is a network protocol allowing two computers to exchange data securely over an insecure network.  By default use of SSH brings the user to a terminal, but the protocol can be used for other types of data transfer such as [[SFTP]] and [[SCP]].&lt;br /&gt;
&lt;br /&gt;
==Connecting to an SSH Server==&lt;br /&gt;
Under Linux and Mac OS X, the following command from a terminal will connect a client computer to the UMIACS [[OpenLAB]].&lt;br /&gt;
 # ssh bkirz@openlab.umiacs.umd.edu&lt;br /&gt;
This will give you access to a terminal on any one of the [[OpenLAB]] servers.  Note that by default you will not have access to applications that require X11 to run.&lt;br /&gt;
&lt;br /&gt;
All UMIACS Windows hosts are installed with SSH Secure Shell Client. Alternatively, users can install these software on their personal machines:&lt;br /&gt;
&lt;br /&gt;
* [http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY]&lt;br /&gt;
* [http://ttssh2.sourceforge.jp/ ttssh2]&lt;br /&gt;
&lt;br /&gt;
Alternatively, all users can use the UMIACS Intranet SFTP Web Applet located [https://intranet.umiacs.umd.edu/ssh/ here] without installing any additional software.&lt;br /&gt;
&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
By default, SSH only gives the user shell access to a host.  Enabling X11 Forwarding allows users to run applications with Graphical User Interfaces.&lt;br /&gt;
&lt;br /&gt;
Under Linux and Mac OS X, the following command from a terminal will connect a client computer to the UMIACS [[OpenLAB]] using X11 Forwarding.&lt;br /&gt;
 # ssh &#039;&#039;&#039;-Y&#039;&#039;&#039; bkirz@openlab.umiacs.umd.edu&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; Mac users must have X11 installed in their systems for X11 forwarding to work.  This can be checked by looking for X11.app in /Applications/Utilities.  You can find the installer [http://www.apple.com/support/downloads/x11formacosx.html here].&lt;br /&gt;
&lt;br /&gt;
If you do not have Cygwin, you will need to forward X through Xming.&lt;br /&gt;
First, enable X forwarding on your secure ssh client. The option is under tunneling in the ssh client settings, shown below. This only has to be done once.&lt;br /&gt;
&lt;br /&gt;
[[Image:sshXForward.jpg]]&lt;br /&gt;
&lt;br /&gt;
Next, click save in the main ssh appication window to save this setting.&lt;br /&gt;
&lt;br /&gt;
After this has been done, every time you want to use X forwarding, you need to make sure Xming has been started (it will appear in your task tray) through the start menu programs.&lt;br /&gt;
Now, you will be able to use Xwindow programs from your ssh client.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that the UMIACS Intranet SFTP Web Applet does &#039;&#039;not&#039;&#039; allow X11 Forwarding.&lt;br /&gt;
&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
&lt;br /&gt;
You can tunnel one or more ports through an SSH connection such that your packets will look like they are coming from the host you are tunneling to.   This is helpful for services that you would be normally blocked by a firewall.&lt;br /&gt;
&lt;br /&gt;
Please see the [[SecureShellTunneling]] page for more information.&lt;br /&gt;
&lt;br /&gt;
==Passwordless SSH with SSH Keys==&lt;br /&gt;
&lt;br /&gt;
There are some situations where it is important to be able to ssh without entering a password.  This is mostly required when working in clusters.  This is done using ssh keys.  Instead of authenticating with a password, ssh can use a pre-defined set of encryption keys to establish an authorized connection. &lt;br /&gt;
To setup passwordless ssh, do the following.&lt;br /&gt;
&lt;br /&gt;
First, you will need to create a ssh key pair.  It is possible to use a password that you will need to enter at the beginning of your work session.  This is preferable as it is more secure but may cause problems for some clustered work, particularly our TORQUE/MAUI clusters.  If you simply hit &#039;&#039;&#039;[enter]&#039;&#039;&#039;, you will never be prompted for a password when ssh&#039;ing which can lead to security problems.&lt;br /&gt;
&lt;br /&gt;
To create a &#039;&#039;&#039;&#039;&#039;passwordless&#039;&#039;&#039;&#039;&#039; key, type the following.  &#039;&#039;&#039;NOTE: This is &#039;&#039;REQUIRED&#039;&#039; for our [[ClusterGuide|TORQUE/MAUI]]-based clusters!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
  # ssh-keygen -N &amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
To create a &#039;&#039;&#039;&#039;&#039;passphrase-protected&#039;&#039;&#039;&#039;&#039; (more-secure) key, type the following.  Do not use this option if you plan to use any of our [[ClusterGuide|TORQUE/MAUI]]-based clusters.&lt;br /&gt;
&lt;br /&gt;
  # ssh-keygen&lt;br /&gt;
&lt;br /&gt;
This will produce two files, &#039;&#039;&#039;id_rsa&#039;&#039;&#039; and &#039;&#039;&#039;id_rsa.pub&#039;&#039;&#039;, the private and public keys respectively.  Once you&#039;ve created the keys, you will need to put them into place as follows:&lt;br /&gt;
&lt;br /&gt;
  # mkdir ~/.ssh&lt;br /&gt;
  # chmod 700 ~/.ssh&lt;br /&gt;
  # mv id_rsa ~/.ssh&lt;br /&gt;
  # chmod 600 ~/.ssh/id_rsa&lt;br /&gt;
  # touch ~/.ssh/authorized_keys2&lt;br /&gt;
  # chmod 600 ~/.ssh/authorized_keys2&lt;br /&gt;
  # cat id_rsa.pub &amp;gt;&amp;gt; ~/.ssh/authorized_keys2&lt;br /&gt;
  # rm id_rsa.pub&lt;br /&gt;
&lt;br /&gt;
It is &#039;&#039;&#039;very&#039;&#039;&#039; important that you keep your private key secure!  Ensure that it is chmod&#039;d to 600 and that you do not put it anywhere visible to other users!&lt;br /&gt;
&lt;br /&gt;
If you did not select a passphrase when you generated your keys, you can now ssh without a password.  If you did select a passphrase, you will need to activate the keys as follows:&lt;br /&gt;
&lt;br /&gt;
  # ssh-agent [SHELL]&lt;br /&gt;
  # ssh-add -t [TIME]&lt;br /&gt;
&lt;br /&gt;
In this case, &amp;quot;[SHELL]&amp;quot; is your preferred shell and &amp;quot;[TIME]&amp;quot; is the amount of time you&#039;d like the key to be active in seconds.  So, the following would start a bash shell with passwordless ssh active for 30 minutes:&lt;br /&gt;
&lt;br /&gt;
  # ssh-agent bash&lt;br /&gt;
  # ssh-add -t 1800&lt;br /&gt;
&lt;br /&gt;
You will be prompted for your passphrase and, when entered correctly, you will be able to ssh without entering a password.&lt;br /&gt;
&lt;br /&gt;
To disable this functionality, simply delete your private key file (&#039;&#039;&#039;~/.ssh/id_rsa&#039;&#039;&#039;) and remove the public key from your &#039;&#039;&#039;~/.ssh/authorized_keys2&#039;&#039;&#039; file.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
[http://www.openssh.org/ OpenSSH]&lt;br /&gt;
&lt;br /&gt;
[http://www.openssh.com/windows.html Windows Clients]&lt;/div&gt;</summary>
		<author><name>Azar</name></author>
	</entry>
	<entry>
		<id>https://wiki.umiacs.umd.edu/umiacs/index.php?title=SecureShell&amp;diff=4126</id>
		<title>SecureShell</title>
		<link rel="alternate" type="text/html" href="https://wiki.umiacs.umd.edu/umiacs/index.php?title=SecureShell&amp;diff=4126"/>
		<updated>2011-11-09T17:30:17Z</updated>

		<summary type="html">&lt;p&gt;Azar: /* Connecting to an SSH Server */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Secure Shell (or [http://en.wikipedia.org/wiki/Secure_Shell SSH]) is a network protocol allowing two computers to exchange data securely over an insecure network.  By default use of SSH brings the user to a terminal, but the protocol can be used for other types of data transfer such as [[SFTP]] and [[SCP]].&lt;br /&gt;
&lt;br /&gt;
==Connecting to an SSH Server==&lt;br /&gt;
Under Linux and Mac OS X, the following command from a terminal will connect a client computer to the UMIACS [[OpenLAB]].&lt;br /&gt;
 # ssh bkirz@openlab.umiacs.umd.edu&lt;br /&gt;
This will give you access to a terminal on any one of the [[OpenLAB]] servers.  Note that by default you will not have access to applications that require X11 to run.&lt;br /&gt;
&lt;br /&gt;
All UMIACS Windows hosts are installed with SSH Secure Shell Client. Alternatively, users can install these software on their personal machines:&lt;br /&gt;
&lt;br /&gt;
* [http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY]&lt;br /&gt;
* [http://ttssh2.sourceforge.jp/ ttssh2]&lt;br /&gt;
&lt;br /&gt;
Alternatively, all users can use the UMIACS Intranet SFTP Web Applet located [https://intranet.umiacs.umd.edu/ssh/ here] without installing any additional software.&lt;br /&gt;
&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
By default, SSH only gives the user shell access to a host.  Enabling X11 Forwarding allows users to run applications with Graphical User Interfaces.&lt;br /&gt;
&lt;br /&gt;
Under Linux and Mac OS X, the following command from a terminal will connect a client computer to the UMIACS [[OpenLAB]] using X11 Forwarding.&lt;br /&gt;
 # ssh &#039;&#039;&#039;-Y&#039;&#039;&#039; bkirz@openlab.umiacs.umd.edu&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; Mac users must have X11 installed in their systems for X11 forwarding to work.  This can be checked by looking for X11.app in /Applications/Utilities.  You can find the installer [http://www.apple.com/support/downloads/x11formacosx.html here].&lt;br /&gt;
&lt;br /&gt;
Windows users can enable X11 forwarding on UMIACS desktops by using cygwin to ssh -X.&lt;br /&gt;
If you do not have Cygwin, you will need to forward X through Xming.&lt;br /&gt;
First, enable X forwarding on your secure ssh client. The option is under tunneling in the ssh client settings. This only has to be done once.&lt;br /&gt;
&lt;br /&gt;
[[Image:sshXForward.jpg]]&lt;br /&gt;
&lt;br /&gt;
Next, click save in the main ssh appication window to save this setting.&lt;br /&gt;
&lt;br /&gt;
After this has been done, every time you want to use X forwarding, you need to make sure Xming has been started (it will appear in your task tray) through the start menu programs.&lt;br /&gt;
Now, you will be able to use Xwindow programs from your ssh client.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that the UMIACS Intranet SFTP Web Applet does &#039;&#039;not&#039;&#039; allow X11 Forwarding.&lt;br /&gt;
&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
&lt;br /&gt;
You can tunnel one or more ports through an SSH connection such that your packets will look like they are coming from the host you are tunneling to.   This is helpful for services that you would be normally blocked by a firewall.&lt;br /&gt;
&lt;br /&gt;
Please see the [[SecureShellTunneling]] page for more information.&lt;br /&gt;
&lt;br /&gt;
==Passwordless SSH with SSH Keys==&lt;br /&gt;
&lt;br /&gt;
There are some situations where it is important to be able to ssh without entering a password.  This is mostly required when working in clusters.  This is done using ssh keys.  Instead of authenticating with a password, ssh can use a pre-defined set of encryption keys to establish an authorized connection. &lt;br /&gt;
To setup passwordless ssh, do the following.&lt;br /&gt;
&lt;br /&gt;
First, you will need to create a ssh key pair.  It is possible to use a password that you will need to enter at the beginning of your work session.  This is preferable as it is more secure but may cause problems for some clustered work, particularly our TORQUE/MAUI clusters.  If you simply hit &#039;&#039;&#039;[enter]&#039;&#039;&#039;, you will never be prompted for a password when ssh&#039;ing which can lead to security problems.&lt;br /&gt;
&lt;br /&gt;
To create a &#039;&#039;&#039;&#039;&#039;passwordless&#039;&#039;&#039;&#039;&#039; key, type the following.  &#039;&#039;&#039;NOTE: This is &#039;&#039;REQUIRED&#039;&#039; for our [[ClusterGuide|TORQUE/MAUI]]-based clusters!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
  # ssh-keygen -N &amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
To create a &#039;&#039;&#039;&#039;&#039;passphrase-protected&#039;&#039;&#039;&#039;&#039; (more-secure) key, type the following.  Do not use this option if you plan to use any of our [[ClusterGuide|TORQUE/MAUI]]-based clusters.&lt;br /&gt;
&lt;br /&gt;
  # ssh-keygen&lt;br /&gt;
&lt;br /&gt;
This will produce two files, &#039;&#039;&#039;id_rsa&#039;&#039;&#039; and &#039;&#039;&#039;id_rsa.pub&#039;&#039;&#039;, the private and public keys respectively.  Once you&#039;ve created the keys, you will need to put them into place as follows:&lt;br /&gt;
&lt;br /&gt;
  # mkdir ~/.ssh&lt;br /&gt;
  # chmod 700 ~/.ssh&lt;br /&gt;
  # mv id_rsa ~/.ssh&lt;br /&gt;
  # chmod 600 ~/.ssh/id_rsa&lt;br /&gt;
  # touch ~/.ssh/authorized_keys2&lt;br /&gt;
  # chmod 600 ~/.ssh/authorized_keys2&lt;br /&gt;
  # cat id_rsa.pub &amp;gt;&amp;gt; ~/.ssh/authorized_keys2&lt;br /&gt;
  # rm id_rsa.pub&lt;br /&gt;
&lt;br /&gt;
It is &#039;&#039;&#039;very&#039;&#039;&#039; important that you keep your private key secure!  Ensure that it is chmod&#039;d to 600 and that you do not put it anywhere visible to other users!&lt;br /&gt;
&lt;br /&gt;
If you did not select a passphrase when you generated your keys, you can now ssh without a password.  If you did select a passphrase, you will need to activate the keys as follows:&lt;br /&gt;
&lt;br /&gt;
  # ssh-agent [SHELL]&lt;br /&gt;
  # ssh-add -t [TIME]&lt;br /&gt;
&lt;br /&gt;
In this case, &amp;quot;[SHELL]&amp;quot; is your preferred shell and &amp;quot;[TIME]&amp;quot; is the amount of time you&#039;d like the key to be active in seconds.  So, the following would start a bash shell with passwordless ssh active for 30 minutes:&lt;br /&gt;
&lt;br /&gt;
  # ssh-agent bash&lt;br /&gt;
  # ssh-add -t 1800&lt;br /&gt;
&lt;br /&gt;
You will be prompted for your passphrase and, when entered correctly, you will be able to ssh without entering a password.&lt;br /&gt;
&lt;br /&gt;
To disable this functionality, simply delete your private key file (&#039;&#039;&#039;~/.ssh/id_rsa&#039;&#039;&#039;) and remove the public key from your &#039;&#039;&#039;~/.ssh/authorized_keys2&#039;&#039;&#039; file.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
[http://www.openssh.org/ OpenSSH]&lt;br /&gt;
&lt;br /&gt;
[http://www.openssh.com/windows.html Windows Clients]&lt;/div&gt;</summary>
		<author><name>Azar</name></author>
	</entry>
	<entry>
		<id>https://wiki.umiacs.umd.edu/umiacs/index.php?title=Main_Page&amp;diff=4100</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.umiacs.umd.edu/umiacs/index.php?title=Main_Page&amp;diff=4100"/>
		<updated>2011-09-06T13:09:29Z</updated>

		<summary type="html">&lt;p&gt;Azar: /* Anouncements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
===Barracuda Reorganization===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;When: Monday October 3rd 2011 8pm-12am&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To provide even better SPAM and Virus scanning we will be reorganizing our current Barracuda SPAM Firewalls.  This will provide scanning for all incoming mail including mailing lists and external email forwards.&lt;br /&gt;
&lt;br /&gt;
The change will mean that your Quarantine in the future will be from your username@umiacs.umd.edu address and will be distinct from your current Quarantine settings.  We will be working to provide a transition in the next few weeks for your Quarantine settings.&lt;br /&gt;
&lt;br /&gt;
You may receive two mails for up to 3 weeks (21days) from the Barracudas as your old Quarantine will still be available until messages expire after they are 21 days old.&lt;br /&gt;
&lt;br /&gt;
===Upgraded OpenLAB Desktop===&lt;br /&gt;
The desktop called raspberry in Open Lab Computer Room in AVW room 4462 has been upgraded to a newer machine and is now running Red Hat Enterprise Linux 6.&lt;br /&gt;
&lt;br /&gt;
===New UNIX Print System===&lt;br /&gt;
We are pleased to announce the immediately available [[CUPS]] print system for our UNIX (rhel/ubuntu) users.  Please contact staff@umiacs.umd.edu with any issues.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;endFeed /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Technical Reference==&lt;br /&gt;
&lt;br /&gt;
Welcome to UMIACS Wiki.  This is the main place to find documentation and information about your account and  the technical services that UMIACS offers.  If this is your first time please start here [[GettingStarted| Getting Started]].&lt;br /&gt;
&lt;br /&gt;
We provide many  [[CoreServices|Core Services]] which include [[EMail]], [[Backups]] and [[VPN]].&lt;br /&gt;
&lt;br /&gt;
We have lots of specific [[LabFacilities|Lab Facilities]] that you may be interested in.&lt;br /&gt;
&lt;br /&gt;
Please check here if you are interested in [[OrderingEquipment|Ordering Equipment]].&lt;/div&gt;</summary>
		<author><name>Azar</name></author>
	</entry>
</feed>