Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Tunneling CVS

Posted on 2004-04-16
4
Medium Priority
?
303 Views
Last Modified: 2010-05-18
Hi

I will work from Linux and Windows and access a Linux host with SSH server on. Also there is an CVS server on it. WOuld it be possible to configure the server and clients so that I can access it through SSH with freeware products? How and with what?
0
Comment
Question by:mdoland
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 4

Expert Comment

by:john-at-7fff
ID: 10843290
Absolutely.

This gets fairly complicated fast. You will need to do three things: get an ssh client on Windows; set up public/private keys so that you can ssh into the Linux box without having to enter your password everytime; and then you would either have to use the raw cvs client, or a front-end such as WinCVS (http://www.wincvs.org/) which would require additional configuration.

Here's what you need to do:

1. Install Cygwin (http://www.cygwin.com/) on the Windows machine. During the install, you would need to ensure that you get the openssh support. This will get you ssh on Windows.

2. Set up your private/public key combination. It would look something like the following:

In this scenario, 192.168.1.100 is the remote (Linux) system, and yourid
is the username there.

We are creating the private key there.

(a) On the Windows system, enter

      ssh yourid@192.168.1.100

you will get a prompt asking about continuing to connect. Say yes.

Enter your password

(b) on the remote system, type

      (You will see a dot before ssh in a number of places -- that's one word, .ssh)

      ssh-keygen -t rsa
            When asked about the directory location, take the default (return)
            Press return twice (no passphrase -- important for CVS)
      cp .ssh/id_rsa.pub .ssh/authorized_keys
      logout

(b) Now you are back at your Windows computer's DOS prompt. Enter the following:

      bash
      cd
      scp yourid@192.168.1.100:.ssh/id_rsa .ssh/id_rsa

You will be prompted for your password. Enter it.

(c) Now the best part:

      Exit from bash with control D
      ssh yourid@192.168.1.100

You should get in without being prompted by a password.

If you get that far, I can tell you about using CVS via this means.
0
 

Author Comment

by:mdoland
ID: 10843367
I intend to use wincvs.
0
 
LVL 4

Expert Comment

by:john-at-7fff
ID: 10843415
OK -- Well, you will still need to get ssh going on your Windows machine. WinCVS will use ssh to communicate w/ your Linux box.

Installing Cygwin also means that you will have a suite of Linux-style tools on your Windows machine, which in the long run will make you very happy.
0
 
LVL 4

Accepted Solution

by:
john-at-7fff earned 500 total points
ID: 10843427
If you want to avoid Cygwin, another way to do it is to use a free ssh client called putty.

Here are instructions on setting up WinCVS with Putty:

http://www.devguy.com/fp/cfgmgmt/cvs/cvs_ssh.htm

0

Featured Post

[Webinar] Lessons on Recovering from Petya

Skyport is working hard to help customers recover from recent attacks, like the Petya worm. This work has brought to light some important lessons. New malware attacks like this can take down your entire environment. Learn from others mistakes on how to prevent Petya like worms.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes Administrators rights are not enough. These cases call for the SYSTEM account. The process in this article outlines the steps required to execute commands using the SYSTEM account.
A new hacking trick has emerged leveraging your own helpdesk or support ticketing tools as an easy way to distribute malware.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question