How do you run a program on a remote server using ssh?
For this example we'll have two servers, one named Johnny and another named Cash. Both are running openssh. Our goal is to have a program on Johnny login to Cash and run a program on Cash. To make the task a little more complex we'll be using different users on each machine.
The first thing we'll need to do is generate public and private keys on Johnny. So, logged into Johnny as user 'boy' we create public and private keys by creating them in the .ssh directory as follows:
Johnny$> pwd
/home/boy/.ssh
Johnny$> ssh-keygen -t rsa -f sue
Generating public/private rsa key pair.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in sue.
Your public key has been saved in sue.pub.
The key fingerprint is:
8d:e9:c0:g1:c7:1f:e3:b3:2f:38:12:aa:b5:3b:2e:b3 boy@Johnny
Johnny$>
In the example above we picked an arbitrary name, sue, to identify the files that hold the generated keys. When prompted to enter a passphrase (twice) we simply hit enter twice.
As the output of ssh-keygen indicates, the public key has been saved in a file named sue.pub.
The output of ssh-keygen implies, but doesn't indicate directly, that the private key is in a file named sue (Yes, a user named boy created a file named sue.)
Johnny$>ls -l
-rwx------ 1 sue suegrp 887 Oct 17 14:27 sue
-rwx------ 1 sue suegrp 223 Oct 17 14:27 sue.pub
The private key file, sue, will remain on Johnny for the reaminder of this exercise, but the public key must be moved to the remote server, Cash. Note that the .ssh directory itself, as well as the sue and sue.pub files should have permissions of 700.
Now you'll need to ftp the sue.pub file from Johnny to Cash. The user on Cash that we'll login as is user 'named'.
Johnny$> ftp Cash
Connected to Cash
220 Cash - Propery of Xyz. - Authorized users only
Name (Cash:boy): named
331 Password required for named.
Password:
230-Last unsuccessful login: Fri Oct 17 13:12:55 2003 on ftp from Johnny 230-Last login: Fri Oct 17 16:02:11 2003 on /dev/pts/1 from Johnny
230 User named logged in.
ftp> cd .ssh
ftp> mput sue.pub
mput sue.pub? y
200 PORT command successful.
150 Opening data connection for sue.pub.
226 Transfer complete.
224 bytes sent in 0.000781 seconds (280.1 Kbytes/s)
local: sue.pub remote: sue.pub
ftp>bye
221 Goodbye.
Johnny$>
Now we'll telnet into Cash and concatenate the sue.pub file into /home/named/.ssh/authorized_keys file.
Cash$> pwd
/home/named/.ssh
Cash$> cat sue.pub >> authorized_keys
Cash$> exit
Connection closed.
Johnny$>
Let's recap what we've done so far.
1) We've created public and private keys on Johnny.
2) We've ftp'd the public key file, sue.pub, from Johnny to Cash.
3) We've telnetted to Cash, and concatenated the contents of sue.pub into authorized_keys
We're now ready to manually login from Johnny to Cash using ssh.
Johnny$> ssh -i /home/boy/.ssh/sue named@Cash
The authenticity of host 'Cash (xxx.yyy.zzz.aaa)' can't be established.
RSA key fingerprint is 65:11:7d:ef:ed:a3:cc:34:d1:b5:ba:c9:16:22:31:23.
Are you sure you want to continue connecting (yes/no)? yes
================================================================
*** NOTICE TO ALL USERS ***
================================================================
Cash$>exit<
/p>
Connection to Cash closed.
Johnny$>
Now on Johnny, create a shell script called 'boynamedsue.sh' with the following one line of contents and chmod the script to 777.
ssh -i /home/boy/.ssh/sue named@Cash /usr/bin/ls -l
Next, execute the script on Johnny.
Johnny$> boynamedsue.sh
================================================================
*** NOTICE TO ALL USERS ***
================================================================
-rwxrwxr-x 1 named namedgrp 10020 Oct 17 14:35 namedfile1.txt
-rw-r--r-- 1 named namedgrp 680 Aug 14 16:18 namedfile.html
-rw------- 1 named namedgrp 1148 Aug 18 09:51 mbox
drwxr-xr-x 2 named namedgrp 512 Jun 17 13:38 old
Johnny$>
You just executed a program on Johnny, that logged into Cash and ran a program (unix 'ls -l').
The next step you'll want to take is to replace the '/usr/bin/ls -l' command in the boynamedsue.sh program with the path and name of the program that you want to run.
About The Author
C.S. Deam is a small business owner. His eBook Computer Nuggets: Non-Techie Internet Tips For In-Laws, Out-Laws, and the Rest of Society is a great gift for non-techie family members and is available at www.LinkertonPublishing.com where you can sign up for FREE E-Courses & Newsletters to help you on your path to self-employment.
![]() |
|
![]() |
|
![]() |
|
![]() |
IntroductionDuring the early years of our modern computer era, very... Read More
Microsoft Great Plains fits to majority of industries, in the... Read More
Itâ??s easy to understand why you might be drawn to... Read More
You've finally created databases that you can actually use to... Read More
After seeing many people complain about their weak Internet security... Read More
Corporate ERP/MRP selection might be tough one, especially considering very... Read More
This article is the third of a series of articles... Read More
"Pfishing", sometimes spelled "Phishing", is a word that's used to... Read More
Before September 1995, Microsoft Windows was an MS-DOS program. DOS... Read More
Microsoft Great Plains serves majority of US based horizontal and... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
Creating a new markup language.Introduction.General Reuse Markup Langauge, or GRML,... Read More
IntroductionPHP can be used for a lot of different things,... Read More
Former Great Plains Software Dynamics/eEnterprise and currently Microsoft Business Solutions... Read More
We all take the computer for granted. I mean, all... Read More
While I was preparing some personal background information for a... Read More
C/SIDE (Client/Server Integrated Development Environment) - The core of... Read More
The COSMIC FP (function point) software quality metric, is no... Read More
Microsoft Business Solutions Great Plains, former Great Plains Software Dynamics... Read More
While Adobe is the most known maker of PDF tools,... Read More
Mike Dunville* had a decision to make. As the new... Read More
Microsoft Business Solutions CRM is present several years on the... Read More
We all already got used to computer monitoring both at... Read More
Microsoft CRM is relatively new player on the now becoming... Read More
Designing without tables by using CSS layouts is fast becoming... Read More
We will base our prognosis on our Microsoft Business Solutions... Read More
Microsoft-Outlook is a pretty amazing program. So much more than... Read More
Great Plains Software Dynamics, Dynamics C/S+, eEnterprise were written on... Read More
The various resume software offered, particularly on the internet, can... Read More
When you double-click a layer in the Layer Palette, you... Read More
Microsoft released Service Pack 2 (SP2) for the Windows XP... Read More
In the Clinton era the status quo was simple: you... Read More
Microsoft Great Plains, former Great Plains Software Dynamics, eEnterprise has... Read More
The most important things you can do for your computer... Read More
When you double-click a layer in the Layer Palette, you... Read More
How many steps does it take you to locate and... Read More
Microsoft Business Solutions ? Navision is an integrated solution for... Read More
Microsoft Great Plains as ERP and Microsoft CRM as... Read More
Spyware, what it is and what it does. Basically, spyware... Read More
In this short FAQ style article we would like to... Read More
The major reason I recommend getting your hands on real... Read More
Siebel is traditional CRM market leader, however and mostly due... Read More
The vast majority of us will have, at some point,... Read More
This is intermediate level SQL scripting article for DB Administrator,... Read More
XML parser is a software module to read documents and... Read More
I love new technology. I am still ready to wait... Read More
One day, you suddenly realize that your computer started to... Read More
Microsoft Business Solutions offers several ERP applications: Great Plains, Navision,... Read More
Let's say that you have a software project that's under... Read More
Microsoft Great Plains serves majority of US based horizontal and... Read More
Anyone who has ever used Microsoft Word knows that it... Read More
Bad News - the Threat is Bigger than it SeemedHow... Read More
Now there are Three Steps To Heaven Just listen and... Read More
Does Microsoft Have any Real Competition? Copyright (c) 2003 Gregory... Read More
In the early days of the personal computer, we're talking... Read More
Looking at all the ads which promise to get rid... Read More
When you first think about multicurrency ? you probably have... Read More
Former Great Plains Software Dynamics/eEnterprise, and currently Microsoft Business Solutions... Read More
Remember back in the days where screensavers were the coolest... Read More
Once a business idea is selected, it is highly recommended... Read More
What is Tripwire?Tripwire is a form intrusion detection system (IDS)... Read More
User interfaces and accessibility are some of the most important... Read More
MicroWorld Technologies, Inc. the leading solutions provider in the area... Read More
Stealing company information used to be the specialty of spies... Read More
Microsoft Business Solutions is emerging as very attractive vendor for... Read More
Almost all new and major brand of PCs come with... Read More
Software |