use improved parameters for more robust ssh reverse port forwarding
This commit is contained in:
parent
c58b806f4c
commit
4e0c9e3ba1
|
@ -25,8 +25,8 @@ sudo -u automation /home/automation/chch-power/run.sh
|
||||||
do
|
do
|
||||||
# cat ~/.ssh/authorized_key
|
# cat ~/.ssh/authorized_key
|
||||||
# permitopen="127.0.0.1:20023",command="",no-pty,no-agent-forwarding,no-X11-forwarding ssh-rsa AAAA...
|
# permitopen="127.0.0.1:20023",command="",no-pty,no-agent-forwarding,no-X11-forwarding ssh-rsa AAAA...
|
||||||
AUTOSSH_FIRST_POLL=30 AUTOSSH_POLL=15 /usr/bin/autossh -N -M 20023 -4 -R '127.0.0.1:2322:127.0.0.1:22' automation@vbox.chch.it
|
autossh automation@vbox.chch.it -M 0 -o "TCPKeepAlive yes" -o "ServerAliveInterval 5" -o "ServerAliveCountMax 3" -o "ExitOnForwardFailure yes" -N -4 -R '127.0.0.1:2322:127.0.0.1:22'
|
||||||
sleep 10
|
sleep 30
|
||||||
done
|
done
|
||||||
} &
|
} &
|
||||||
disown $!
|
disown $!
|
||||||
|
@ -37,8 +37,8 @@ disown $!
|
||||||
do
|
do
|
||||||
# cat ~/.ssh/authorized_key
|
# cat ~/.ssh/authorized_key
|
||||||
# permitopen="127.0.0.1:20025",command="",no-pty,no-agent-forwarding,no-X11-forwarding ssh-rsa AAAA...
|
# permitopen="127.0.0.1:20025",command="",no-pty,no-agent-forwarding,no-X11-forwarding ssh-rsa AAAA...
|
||||||
AUTOSSH_FIRST_POLL=30 AUTOSSH_POLL=15 /usr/bin/autossh -N -M 20025 -4 -R '127.0.0.1:2322:127.0.0.1:22' cloudbot@vcup.chch.it
|
autossh cloudbot@vcup.chch.it -M 0 -o "TCPKeepAlive yes" -o "ServerAliveInterval 5" -o "ServerAliveCountMax 3" -o "ExitOnForwardFailure yes" -N -4 -R '127.0.0.1:2322:127.0.0.1:22'
|
||||||
sleep 10
|
sleep 30
|
||||||
done
|
done
|
||||||
} &
|
} &
|
||||||
disown $!
|
disown $!
|
||||||
|
|
Loading…
Reference in New Issue