Date: Thu, 24 Jul 2003 16:55:13 -0500 From: Kirk Strauser <kirk@strauser.com> To: freebsd-hackers@freebsd.org Subject: Re: Network pipes Message-ID: <873cgvh9oe.fsf@pooh.honeypot.net> In-Reply-To: <3F1F96A5.A7D2D221@aueb.gr> (Diomidis Spinellis's message of "Thu, 24 Jul 2003 11:19:49 %2B0300") References: <3F1F96A5.A7D2D221@aueb.gr>
next in thread | previous in thread | raw e-mail | index | archive | help
--=-=-=
Content-Transfer-Encoding: quoted-printable
At 2003-07-24T08:19:49Z, Diomidis Spinellis <dds@aueb.gr> writes:
> tar cvf - / |@ ssh remotehost -- dd of=3D/dev/st0 bs=3D32k | :
> The effect of the above command is that a socket is created between the
> local and the remote host with the standard output of tar and the standard
> input of dd redirected to that socket. Authentication is still performed
> using ssh (or any other remote login mechanism you specify before the --
> argument), but the flow between the two processes is from then on not
> protected in terms of integrity and privacy. Thus the method will mostly
> be useful within the context of a LAN or a VPN.
Isn't this almost the same as:
# ssh -f remotehost "nc -l -p 54321 | dd of=3D/dev/st0 bs=3D32k"
# tar cvf - / | nc remotehost 54321
Netcat implements a TCP/UDP transports and basically nothing else. Isn't
that what you're trying to achieve?
=2D-=20
Kirk Strauser
--=-=-=
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
iD8DBQA/IFXI5sRg+Y0CpvERAn68AKCb3qZi0tzRwxTUJHb3DyZoNS18igCfepfA
53pZ+kERAV6PePJB2PZpCJU=
=ExXx
-----END PGP SIGNATURE-----
--=-=-=--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?873cgvh9oe.fsf>
