Running a Program on a Remote Server Using SSH

How do you run a program on a remote server using ssh?

For this example we'll have two servers, one named Johnny and another named Cash. Both are running openssh. Our goal is to have a program on Johnny login to Cash and run a program on Cash. To make the task a little more complex we'll be using different users on each machine.

The first thing we'll need to do is generate public and private keys on Johnny. So, logged into Johnny as user 'boy' we create public and private keys by creating them in the .ssh directory as follows:


Johnny$> pwd


/home/boy/.ssh


Johnny$> ssh-keygen -t rsa -f sue


Generating public/private rsa key pair.


Enter passphrase (empty for no passphrase):


Enter same passphrase again:


Your identification has been saved in sue.


Your public key has been saved in sue.pub.


The key fingerprint is:


8d:e9:c0:g1:c7:1f:e3:b3:2f:38:12:aa:b5:3b:2e:b3 [email protected]


Johnny$>

In the example above we picked an arbitrary name, sue, to identify the files that hold the generated keys. When prompted to enter a passphrase (twice) we simply hit enter twice.

As the output of ssh-keygen indicates, the public key has been saved in a file named sue.pub.

The output of ssh-keygen implies, but doesn't indicate directly, that the private key is in a file named sue (Yes, a user named boy created a file named sue.)


Johnny$>ls -l


-rwx------ 1 sue suegrp 887 Oct 17 14:27 sue


-rwx------ 1 sue suegrp 223 Oct 17 14:27 sue.pub

The private key file, sue, will remain on Johnny for the reaminder of this exercise, but the public key must be moved to the remote server, Cash. Note that the .ssh directory itself, as well as the sue and sue.pub files should have permissions of 700.

Now you'll need to ftp the sue.pub file from Johnny to Cash. The user on Cash that we'll login as is user 'named'.


Johnny$> ftp Cash


Connected to Cash


220 Cash - Propery of Xyz. - Authorized users only


Name (Cash:boy): named


331 Password required for named.


Password:


230-Last unsuccessful login: Fri Oct 17 13:12:55 2003 on ftp from Johnny 230-Last login: Fri Oct 17 16:02:11 2003 on /dev/pts/1 from Johnny


230 User named logged in.


ftp> cd .ssh


ftp> mput sue.pub


mput sue.pub? y


200 PORT command successful.


150 Opening data connection for sue.pub.


226 Transfer complete.


224 bytes sent in 0.000781 seconds (280.1 Kbytes/s)


local: sue.pub remote: sue.pub


ftp>bye


221 Goodbye.


Johnny$>

Now we'll telnet into Cash and concatenate the sue.pub file into /home/named/.ssh/authorized_keys file.


Cash$> pwd


/home/named/.ssh


Cash$> cat sue.pub >> authorized_keys


Cash$> exit


Connection closed.


Johnny$>

Let's recap what we've done so far.

1) We've created public and private keys on Johnny.

2) We've ftp'd the public key file, sue.pub, from Johnny to Cash.

3) We've telnetted to Cash, and concatenated the contents of sue.pub into authorized_keys

We're now ready to manually login from Johnny to Cash using ssh.


Johnny$> ssh -i /home/boy/.ssh/sue [email protected]


The authenticity of host 'Cash (xxx.yyy.zzz.aaa)' can't be established.


RSA key fingerprint is 65:11:7d:ef:ed:a3:cc:34:d1:b5:ba:c9:16:22:31:23.


Are you sure you want to continue connecting (yes/no)? yes


================================================================


*** NOTICE TO ALL USERS ***


================================================================


Cash$>exit< /p>


Connection to Cash closed.


Johnny$>

Now on Johnny, create a shell script called 'boynamedsue.sh' with the following one line of contents and chmod the script to 777.

ssh -i /home/boy/.ssh/sue [email protected] /usr/bin/ls -l

Next, execute the script on Johnny.


Johnny$> boynamedsue.sh


================================================================


*** NOTICE TO ALL USERS ***


================================================================


-rwxrwxr-x 1 named namedgrp 10020 Oct 17 14:35 namedfile1.txt


-rw-r--r-- 1 named namedgrp 680 Aug 14 16:18 namedfile.html


-rw------- 1 named namedgrp 1148 Aug 18 09:51 mbox


drwxr-xr-x 2 named namedgrp 512 Jun 17 13:38 old


Johnny$>

You just executed a program on Johnny, that logged into Cash and ran a program (unix 'ls -l').

The next step you'll want to take is to replace the '/usr/bin/ls -l' command in the boynamedsue.sh program with the path and name of the program that you want to run.

About The Author

C.S. Deam is a small business owner. His eBook Computer Nuggets: Non-Techie Internet Tips For In-Laws, Out-Laws, and the Rest of Society is a great gift for non-techie family members and is available at www.LinkertonPublishing.com where you can sign up for FREE E-Courses & Newsletters to help you on your path to self-employment.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Greentech Media

5 Software Startups Solving the Biggest Challenges in Solar
Greentech Media
The startup ecosystem insolaris still strong. At GTM Events, we're now including sessions where young companies tell their stories in front of the audience. It's a great way to bring fresh perspectives to the industry. At the Solar Software Summit next ...


Washington Post

Whistleblower: ECOT used software to get more state money
10TV
A former technology employee of the now-shuttered Electronic Classroom of Tomorrow said he told the Ohio Department of Education last year that school officials ordered staff to manipulate student data with software obtained following the state's ...
Whistleblower: School used software to get more state moneyWTOP

all 8 news articles »

Government Technology

VaultRMS Acquired, Makes Its Software Free
Government Technology
VaultRMS, which makes software to help firefighters track their exposure to harmful substances and carcinogens, has been acquired — and as a result, its product will now become free. Envisage Technologies, which makes training and compliance software ...

and more »

The Register

Rebuilding your software ops and looking for the right tool kit?
The Register
If you're contemplating a radical overhaul of your software development operation or are simply planning the next step in a finely planned evolution, you should be joining us at Continuous Lifecycle in London next month. We've got a wide range of ...


Investor's Business Daily

Software Stocks: Salesforce, Servicenow, Workday, Pegasystems ...
Investor's Business Daily
Hot software stocks Salesforce, Servicenow, Workday, Pegasystems and Okta are setting up near buy points as recent volatility in the Nasdaq and S&P 500 created base-building opportunities for this high-flying group.

and more »

Windows Central

Best Internet Security Software of 2018
Windows Central
Best Internet Security Software of 2018. When it comes to securing yourself online, it goes beyond just an antivirus program. Richard Devine. 23 Apr 2018. Antivirus programs are good at what they do, but many also stop short of offering much more than ...


Crime Report

Facial Recognition Software: Coming Soon to Your Local Retailer?
Crime Report
Shoplifting is harmless, right? It's nothing more than a victimless petty crime. Besides, it doesn't really hurt the retailers because they just write off their losses. Shoplifters don't even face jail time. If you believe these so-called “facts,” you ...


FinSMEs (blog)

Vista invests in Allocate Software
PE Hub (blog)
Vista Equity Partners said April 23 that it invested in Allocate Software. Financial terms weren't announced. Allocate, of the U.K., provides workforce solutions to the healthcare, defense and maritime sectors. PRESS RELEASE. AUSTIN, Texas–(BUSINESS ...
Hg Sells Software Company to Vista EquityPrivate Equity News
Allocate Software Receives Investment from Vista Equity PartnersFinSMEs (blog)

all 4 news articles »

Brewbound.com

4 Reasons to Avoid Brewery Software
Brewbound.com
Do You View Your Brewery as a Business? If your brewery's sole purpose is to brew beer, employ a few people, and have a few taps around town, then brewery software probably isn't for you. It's a different story if you have any desire to grow ...

and more »

Nikkei Asian Review

India shares edge higher as software exporters advance on weaker rupee
Nikkei Asian Review
MUMBAI (NewsRise) -- Indian shares rose Monday, led by software exporters, as the rupee dropped to fresh one-year lows. Tata Consultancy Services extends its rally to reach a market capitalization of $100 billion. The BSE Sensex rose 0.1% to 34,450.77 ...

and more »
Google News

3 Reasons Why Medical Billing Software is Leading the Way

Since technology changes so quickly, it is hard to begin... Read More

Benefits of Shareware

Shareware has been fighting the stigma of being misunderstood for... Read More

Microsoft CRM Integration with Microsoft Retail Management System (RMS) ? Overview

Microsoft Client Relation Management system (Microsoft CRM) and Microsoft RMS... Read More

Microsoft Great Plains Accounting/ERP Implementation ? Finance Industry Customization Example

Microsoft Business Solutions Great Plains is very generic accounting application... Read More

Kick-Ass Performance For Your PC? Its Easy

Is your PC is slow and wimpy? Then you need... Read More

Groupware: What Works the Way Businesses Do?

GroupwareThe internet is full of 1.5 million to 7 million... Read More

Corporate Accounting System: Microsoft Great Plains ? Overview

Corporate ERP/MRP selection might be tough one, especially considering very... Read More

Ukraine IT Myths Dispersed

While Ukraine is becoming a new popular IT outsourcing destination,... Read More

Mapping Software: Putting Data Visualization on the Map

Mapping Software Improves Data VisualizationFrom the outset, it is important... Read More

Beware of The Pirated Software E-Mail Scams!

You have gotten those E_Mails buy software at deep discounts.... Read More

Software Process Improvement -A Successful Journey

Background: For many organizations like ours, the interim target of... Read More

Microsoft CRM Data Import FAQ

Microsoft CRM has built-in conversion tool, however you should probably... Read More

Microsoft CRM: Implementation, Customization, Support ? Consultant Overview

Microsoft Business Solutions CRM is present several years on the... Read More

Accessing XML Using Java Technologies

The most important benefit of XML is its simplicity. Though... Read More

Cross-Platform Custom Software Development & Integration ? IT Strategy for Large Corporation

Microsoft Business Solutions products: Great Plains, MS CRM, Navision, Axapta,... Read More

Adware, What Is It?

Adware is a type of Spyware program that displays some... Read More

MCP Market News: Microsoft SQL Server & SQL Reporting Services

Are you ready? SQL Server 2005, the next-generation data management... Read More

IT Strategy for Large Corporation: ERP/MRP/CRM, Unix/Linux/Windows, Microsoft/Java

Combining Microsoft Business Solutions Great Plains ERP with non-Microsoft Business... Read More

COSMIC: A Small Improvement on the Symons Method

The COSMIC FP (function point) software quality metric, is no... Read More

Great Plains Dynamics on Pervasive/Ctree support ? overview for consultant

All of us know that Microsoft bought former Great Plains... Read More

What is Fleet Maintenance Software?

Simply put, fleet maintenance allows companies to monitor and maintain... Read More

The Religion And Philosophy Of Small Internet Business

I have always had a tendency to focus on the... Read More

String in Java

Handling character strings in Java is supported through two final... Read More

Twelve Things You Should Know to Save on Computer Software

Do you want to get quality software at a reasonable... Read More

Microsoft Great Plains Distribution, Barcoding, Consignment ? overview for consultant

Microsoft Great Plains ? ERM from Microsoft Business Solutions and... Read More