Solved

putty+ankhsvn

Posted on 2008-10-29
5
1,268 Views
Last Modified: 2012-05-05
hello experts,

I cannot get AnkhSVN to connect trough my ssh application (putty)

current setup:
I run putty at the background, accepting localhost connections on 8080
port mapping is set to dynamic, and it forwards to my server.
_this setup works!!!!_ (atleast with mirc)

please help me configure AnkhSVN to connect trough putty!
(i am running on windows vista here)

thanks in advance,
mark
0
Comment
Question by:Mark_FreeSoftware
  • 3
  • 2
5 Comments
 
LVL 32

Expert Comment

by:harbor235
ID: 22831320

What are you trying to do? port forward?

harbor235 ;}
0
 
LVL 13

Author Comment

by:Mark_FreeSoftware
ID: 22832009
i am trying to connect trough an ssh tunnel to my server
0
 
LVL 32

Accepted Solution

by:
harbor235 earned 500 total points
ID: 22832459


Ok, on what port does the AnkhSVN server run on?

here you go;

http://cyberknights.com.au/doc/PuTTY-tunnelling-HOWTO.html

harbor235 ;}
0
 
LVL 13

Author Comment

by:Mark_FreeSoftware
ID: 22832689
i have setup putty, and this works (tested with mirc)
but i cannot configure AnkhSVN (dont know what to change)

AnkhSVN is the client, the SVN server is Subversion running on port 3490
0
 
LVL 13

Author Comment

by:Mark_FreeSoftware
ID: 22949150
turns out it was quite simple,

i had to configure a special port for ankh in my putty settings,
and connect ankhsvn to localhost

comment from (harbor235) ID:22832459 helped me in setting this up,
therefore accepting it as  an valid answer
0

Featured Post

Connect further...control easier

With the ATEN CE624, you can now enjoy a high-quality visual experience powered by HDBaseT technology and the convenience of a single Cat6 cable to transmit uncompressed video with zero latency and multi-streaming for dual-view applications where remote access is required.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question