Erik Anderson:<br>
<br>
> Examples of services using ssh tunnelling or examples of how services<br>
> accept user-submitted ssh public keys?<br><br>Either/both. Examples that are less automated than Github.<br>
<br>> Perhaps it would be easier for you to give us your use case so we can<br>
> better understand what you're trying to do.<br><br>I'm working on an on line code generator that's implemented<br>as a 3-tier system. The data passed between the middle and<br>back tiers includes files --<br>
<a href="http://webEbenezer.net/build_integration.html">http://webEbenezer.net/build_integration.html</a><br>. I'm starting to use tunneling to encrypt the messages between <br>the back and middle tiers. It would be helpful to see how others <br>
have documented and scripted their use of ssh tunneling with <br>their service.<br><br>
<br>
> I'm not sure what version of the OpenSSH server you're running, but on<br>
> all the systems I have access to, each new ssh connection only spawns<br>
> two new processes: one owned by root and one by the user I<br>
> authenticated as:<br>
<br>My mistake. I was confused by running everything on one<br>machine. Sorry for the noise.<br><br>I'm also wondering about restricting the tunneling. I guess it<br>may have to do with the authorized_keys file, but am not sure <br>
how to limit what ports are available for tunneling.<br><br>-- <br>Brian Wood<br>Ebenezer Enterprises<br><a href="http://webEbenezer.net" target="_blank">http://webEbenezer.net</a><br>(651) 251-9384<br><br><br><br><br>