Timeline for Using an already established SSH channel
Current License: CC BY-SA 4.0
13 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| S Apr 13 at 20:21 | history | suggested | glacier | CC BY-SA 4.0 | Remove false information. If socket does not exist, it will still create a new one. |
| Apr 13 at 16:09 | review | Suggested edits | |||
| S Apr 13 at 20:21 | |||||
| S Mar 31 at 19:26 | history | suggested | glacier | CC BY-SA 4.0 | Add command line option |
| Mar 31 at 14:08 | review | Suggested edits | |||
| S Mar 31 at 19:26 | |||||
| S Dec 20, 2023 at 22:33 | history | edited | Gilles 'SO- stop being evil' | CC BY-SA 4.0 | Add ControlPersist 600 (otherwise, it closes automatically between connections) and %C in case the host is too long |
| S Dec 20, 2023 at 22:33 | history | suggested | bryant1410 | CC BY-SA 4.0 | Add ControlPersist 600 (otherwise, it closes automatically between connections) and %C in case the host is too long |
| Dec 20, 2023 at 21:40 | review | Suggested edits | |||
| S Dec 20, 2023 at 22:33 | |||||
| Oct 7, 2016 at 20:07 | comment | added | yankee | If you do not want to edit the global configuration, you can also use the options -S (specify socket) and -M (create master connection) of the SSH client. | |
| Jun 19, 2016 at 1:05 | comment | added | user13666 | You can also use ControlPersist 600 which is a delay in seconds of the socket being in idle before it gets automatically deleted. Otherwise it will close down automatically when the master connection ends. That's no good for executing a series of commands remotely (eg. a series of rsync commands to different folders) | |
| Sep 6, 2013 at 15:51 | comment | added | Gilles 'SO- stop being evil' | @XichenLi /var/log/secure and /var/log/auth.log log SSH connections; a slave connection does not appear there because it piggybacks on an existing connection. If your ssh session allocates a terminal (i.e. ssh somehost with no command supplied, or ssh -t), that is (normally) logged in wtmp, regardless of how that terminal appeared (sshd whatever method was used to establish the connection, terminal emulator application, …). | |
| Sep 6, 2013 at 15:21 | comment | added | SOUser | It looks the second one will not be registered in /var/log/secure or /var/log/auth.log. However, will the second one be registered in /var/log/wtmp? | |
| Mar 8, 2012 at 14:15 | vote | accept | SWeko | ||
| Mar 6, 2012 at 15:49 | history | answered | Gilles 'SO- stop being evil' | CC BY-SA 3.0 |