Date: Thu, 24 Jul 2003 16:55:13 -0500 From: Kirk Strauser <kirk@strauser.com> To: freebsd-hackers@freebsd.org Subject: Re: Network pipes Message-ID: <873cgvh9oe.fsf@pooh.honeypot.net> In-Reply-To: <3F1F96A5.A7D2D221@aueb.gr> (Diomidis Spinellis's message of "Thu, 24 Jul 2003 11:19:49 %2B0300") References: <3F1F96A5.A7D2D221@aueb.gr>
next in thread | previous in thread | raw e-mail | index | archive | help
--=-=-= Content-Transfer-Encoding: quoted-printable At 2003-07-24T08:19:49Z, Diomidis Spinellis <dds@aueb.gr> writes: > tar cvf - / |@ ssh remotehost -- dd of=3D/dev/st0 bs=3D32k | : > The effect of the above command is that a socket is created between the > local and the remote host with the standard output of tar and the standard > input of dd redirected to that socket. Authentication is still performed > using ssh (or any other remote login mechanism you specify before the -- > argument), but the flow between the two processes is from then on not > protected in terms of integrity and privacy. Thus the method will mostly > be useful within the context of a LAN or a VPN. Isn't this almost the same as: # ssh -f remotehost "nc -l -p 54321 | dd of=3D/dev/st0 bs=3D32k" # tar cvf - / | nc remotehost 54321 Netcat implements a TCP/UDP transports and basically nothing else. Isn't that what you're trying to achieve? =2D-=20 Kirk Strauser --=-=-= Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQA/IFXI5sRg+Y0CpvERAn68AKCb3qZi0tzRwxTUJHb3DyZoNS18igCfepfA 53pZ+kERAV6PePJB2PZpCJU= =ExXx -----END PGP SIGNATURE----- --=-=-=--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?873cgvh9oe.fsf>