From owner-freebsd-questions@FreeBSD.ORG Fri May 9 18:52:32 2008 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 241BD1065670 for ; Fri, 9 May 2008 18:52:32 +0000 (UTC) (envelope-from xi@borderworlds.dk) Received: from kazon.borderworlds.dk (kazon.borderworlds.dk [213.239.213.48]) by mx1.freebsd.org (Postfix) with ESMTP id D63158FC0A for ; Fri, 9 May 2008 18:52:31 +0000 (UTC) (envelope-from xi@borderworlds.dk) Received: from dominion.borderworlds.dk (localhost [127.0.0.1]) by kazon.borderworlds.dk (Postfix) with ESMTP id 5A1E61701C for ; Fri, 9 May 2008 20:52:30 +0200 (CEST) Received: by dominion.borderworlds.dk (Postfix, from userid 2000) id 1589347B; Fri, 9 May 2008 20:52:30 +0200 (CEST) To: freebsd-questions@freebsd.org References: <200805060931.18936.beech@freebsd.org> <20080506173912.GB85015@Grumpy.DynDNS.org> <200805060959.28509.beech@freebsd.org> <48229099.5030004@boosten.org> <20080508224235.GA87584@devil.mutu.us> <4823BE7B.2050806@boosten.org> From: Christian Laursen Date: Fri, 09 May 2008 20:52:29 +0200 In-Reply-To: <4823BE7B.2050806@boosten.org> (Peter Boosten's message of "Fri\, 09 May 2008 05\:01\:15 +0200") Message-ID: User-Agent: Gnus/5.11 (Gnus v5.11) Emacs/22.1 (berkeley-unix) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Subject: Re: [SSHd] Increasing wait time? X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: freebsd-questions@freebsd.org List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 09 May 2008 18:52:32 -0000 Peter Boosten writes: > No, I was more thinking of: > > ssh -L 4444:your.own.host:22 user@your.friends.host > > and then open a new shell: > > scp -P 4444 the-file-you-want-to-copy user@localhost: > > This works easiest with agent forwarding, but I guess any > authentication will do. It is also worth taking a look at the ProxyCommand option. For the case above something like this should be put in ~/.ssh/config: Host your.own.host-tunneled HostKeyAlias your.own.host ProxyCommand ssh user@your.friends.host nc your.own.host 22 The you can just do "ssh your.own.host-tunneled" and go through your.friends.host transparently. -- Christian Laursen