{"id":2943,"date":"2010-09-13T09:42:25","date_gmt":"2010-09-13T07:42:25","guid":{"rendered":"http:\/\/code.openark.org\/blog\/?p=2943"},"modified":"2010-09-13T09:42:25","modified_gmt":"2010-09-13T07:42:25","slug":"tool-of-the-day-autossh","status":"publish","type":"post","link":"https:\/\/code.openark.org\/blog\/mysql\/tool-of-the-day-autossh","title":{"rendered":"Tool of the day: autossh"},"content":{"rendered":"<p>Maybe I&#8217;m like an old replication server, lagging way behind, but a couple of weeks ago I found <em><a href=\"http:\/\/www.harding.motd.ca\/autossh\/\">autossh<\/a><\/em>, which is a wrapper around <em>ssh<\/em>, that keeps reconnecting the session if it breaks.<\/p>\n<p>With public key encryption, I am now able to work out pretty reliable SSH tunneling among servers, which doesn&#8217;t break. It seems to be working well during these couple of weeks. And it&#8217;s in my favorite distro&#8217;s repository \ud83d\ude42<\/p>\n<p>I suppose use cases are as many as those for SSH or SSH tunneling, and I&#8217;m putting it to an interesting use. But I suppose the most obvious use in the MySQL world would be to encrypt client connections over unsafe network, or make the network more reliable, for that matter. Yes, there&#8217;s SSL connections, but opening your <strong>3306<\/strong> port on your firewall? Too risky for my taste.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Maybe I&#8217;m like an old replication server, lagging way behind, but a couple of weeks ago I found autossh, which is a wrapper around ssh, that keeps reconnecting the session if it breaks. With public key encryption, I am now able to work out pretty reliable SSH tunneling among servers, which doesn&#8217;t break. It seems [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"enabled":false},"version":2}},"categories":[5],"tags":[16],"class_list":["post-2943","post","type-post","status-publish","format-standard","hentry","category-mysql","tag-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2bZZp-Lt","_links":{"self":[{"href":"https:\/\/code.openark.org\/blog\/wp-json\/wp\/v2\/posts\/2943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/code.openark.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/code.openark.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/code.openark.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/code.openark.org\/blog\/wp-json\/wp\/v2\/comments?post=2943"}],"version-history":[{"count":3,"href":"https:\/\/code.openark.org\/blog\/wp-json\/wp\/v2\/posts\/2943\/revisions"}],"predecessor-version":[{"id":2946,"href":"https:\/\/code.openark.org\/blog\/wp-json\/wp\/v2\/posts\/2943\/revisions\/2946"}],"wp:attachment":[{"href":"https:\/\/code.openark.org\/blog\/wp-json\/wp\/v2\/media?parent=2943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/code.openark.org\/blog\/wp-json\/wp\/v2\/categories?post=2943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/code.openark.org\/blog\/wp-json\/wp\/v2\/tags?post=2943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}