mirror of
https://github.com/ben-grande/qusal.git
synced 2024-10-01 02:35:49 -04:00
44ea4c5db2
Ability to read the program's manual from the terminal is much better than to ask the user to search the manual page on the internet, we already trust the installed program and documentation, but we should not trust every manual page on the internet. |
||
---|---|---|
.. | ||
clone.sls | ||
clone.top | ||
configure.sls | ||
configure.top | ||
create.sls | ||
create.top | ||
init.top | ||
install.sls | ||
install.top | ||
README.md |
ssh
SSH remote login client in Qubes OS.
Table of Contents
Description
Setup SSH client AppVM ssh and a DispVM Template "dvm-ssh". It's use is plain simple, SSH to servers, no extra configuration is required. When saving the SSH configuration is necessary, use the ssh qube. If login in as a one time connection or to an untrusted host use a DispVM based on "dvm-ssh" for disposability.
Installation
- Top:
sudo qubesctl top.enable ssh
sudo qubesctl --targets=tpl-ssh,dvm-ssh,ssh state.apply
sudo qubesctl top.disable ssh
- State:
sudo qubesctl state.apply ssh.create
sudo qubesctl --skip-dom0 --targets=tpl-ssh state.apply ssh.install
sudo qubesctl --skip-dom0 --targets=dvm-ssh,ssh state.apply ssh.configure
Usage
Create DispVMs based on the Template for DispVMs "dvm-ssh" for disposable SSH sessions or create AppVMs based on "tpl-ssh", such as the "ssh" qube for for preserving the SSH configuration client side.
The client qube can enhanced by being:
- sys-ssh-agent's client and not storing the SSH keys on the client; or
- sys-git's client and fetching from qubes and push to remote servers.
The server requires the OpenSSH server to be installed.