Setting up passphrase-less login to your SSH servers is a convenient way of logging into your servers without being annoyed for a passphrase. In today’s post, I’ll take you through generating a key, distributing your identity and logging on.
Generating your key
If you haven’t done so already, you’ll need to generate some authentication keys for yourself. You can do this with ssh-keygen.
ssh-keygen -t rsa
The output of which will look like this:
root@64ed9b1beed9:~# ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/root/.ssh/id_rsa):
Created directory '/root/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/id_rsa.
Your public key has been saved in /root/.ssh/id_rsa.pub.
The key fingerprint is:
b6:ff:5f:1b:88:12:7e:3d:5f:28:c9:66:fb:a7:21:6a root@64ed9b1beed9
The key's randomart image is:
+--[ RSA 2048]----+
| |
| |
| |
| |
| S. |
| .....o... |
| .o oB+o.o|
| .E+ +oo=|
| .o.oo+= |
+-----------------+
Now that this process has completed, you’re given a public key and private secret key in your .ssh/ folder.
Distribute your identity
To deploy your public key to other servers so that you can authenticate using your private key, you can use ssh-copy-id.
$ ssh-copy-id remote-user@remote-host
You’ll want to swap out remote-user for the user that you’re associating your key to and remote-host with the machine that you want to connect to.
Another way that you can establish your key into the remote machine’s authorized set is as follows:
You’ll then be taken through the verification process, which is just supplying your remote password:
The authenticity of host '123.123.123.123 (123.123.123.123)' can't be established.
ECDSA key fingerprint is ae:2d:33:79:e9:d8:03:16:6c:17:d3:f2:7e:c4:05:60.
Are you sure you want to continue connecting (yes/no)? yes
/usr/bin/ssh-copy-id: INFO: attempting to log in with the new key(s), to filter out any that are already installed
/usr/bin/ssh-copy-id: INFO: 1 key(s) remain to be installed -- if you are prompted now it is to install the new keys
example@123.123.123.123's password:
Number of key(s) added: 1
Now try logging into the machine, with: "ssh 'example@123.123.123.123'"
and check to make sure that only the key(s) you wanted were added.
Conclusion
You’re free to login. Of course, if you don’t set a pass phrase for your keys you won’t be hassled all the time to unlock them. If you do set a pass phrase, your overall solution will be just a bit more secure.
In a previous post, I’d started talking about the Open Watcom compiler and its usage in the DOS environment. In today’s post, I’m going to walk through writing assembly code inside of your C/C++ that you’ll compile with the Watcom compiler.
Using the DOS api
When it comes to basic interrupt invocation or I/O port work, there’s no reason why the API provided by the dos.h header won’t suffice. It’s allows you to write C code, but directly invoke I/O ports and interrupts. Once you want to perform some custom logic, you’ll be reaching for planting assembly code directly into your code.
Here’s an example using the dos.h api. In this example, we’re going to request a key press from the user using keyboard service’s int 16h and print out the captured scan and ascii codes:
#include<stdio.h>
#include<dos.h>intmain(intargc,char*argv[]){unionREGSr;/* ah = 00h, int 16h "read key stroke" */r.x.eax=0x0000;int386(0x16,&r,&r);/* write the results to stdout */printf("scan code = %d\n",r.h.ah);printf("ascii = %d\n",r.h.al);return0;}
The call to int386 takes a register set as inputs and outputs, so that we can see the CPU state after the interrupt was executed.
Inlined
So, what does that look like inlined?
#include<stdio.h>intread_key_stroke();#pragma aux read_key_stroke = \
"int 0x16" \
value [eax];
intmain(intargc,char*argv[]){intkey=read_key_stroke();/* extract the ascii & scan code */intascii=key&0xff,scan=key>>8&0xff;/* write the results to stdout */printf("scan code = %d\n",scan);printf("ascii = %d\n",ascii);return0;}
Without needing to manage the registers anymore, we’ve cleaned up a little bit of the code. There is a little bit of alien syntax to deal with though.
#pragma aux
The basic structure of an inline assembly function using the #pragma aux syntax goes like this:
#pragma aux name_of_your_function =
. . . assembly code in here . . .
modify [ regs ]
value [ reg ]
parm [ regs ]
You start your function off optionally with a header definition. It’s been omitted in this example, but I’ve added one above for read_key_stroke.
The assembly code itself gets quoted and then terminates with three optional instructions.
modify allows you to tell the compiler which registers are going to get clobbered when the function runs. This is so it can do the appropriate save management of these registers to the stack.
modify [ eax ebx ecx ]
This line says that eax, ebx and ecx all get clobbered when this function runs.
value allows you to nominate which register has the return value in it.
value [ eax ]
This line says that the return value is in eax. As with read_key_stroke above, the value of eax is then fed into the int return value for the function.
parm allows you to nominate registers that will take the values of parameters passed in.
parm [ eax ] [ ebx ] [ ecx ]
If we were to implement a function that performs addition, we’d need two arguments to be passed in:
int add_ints(int a, int b);
#pragma aux add_ints = \
"add eax, ebx" \
parm [ eax ] [ ebx ] \
value [ eax ];
Passing parameters is fairly straight forward. You’re free to use EAX, EBX, ECX, EDX, EDI and ESI but you are not able to use EBP.
Being able to bundle blocks of your code (and data to some extent) into library files is quite a productive step forward when developing applications. Being able to port these pieces around means a higher level of code-reuse, and a less number of times you’ll spend re-writing the same stuff.
In today’s post, I’ll take you through creating a very minimal library. We’ll create a library module from this code and I’ll also show you how to consume it.
Howdy!
Our example library will expose one function, called greet. greet will take in a person’s name and will print a greeting to the console. Here’s the header:
Making a library is all about compiling your code to produce object files and then bundling your object files into a library file. So, the first step is to compile greeting.c into an object file:
C:\SRC> wcc386 greeter.c
After this, you’ll now have GREETER.OBJ in your project folder. You can turn this into a library with the following:
C:\SRC> wlib greeter +greeter
The command itself says invoke wlib to create (or modify) a library called greeter (the .lib extension is handled for us). Finally the +greeter says that we want to add greeter.obj into the library. We’ll now have a .LIB file that we can link against.
Consuming the library
Writing code that actually uses the library is as easy as including the header and calling functions. Here’s a test:
I’ve grabbed the dos bundle from the Open Watcom FTP site and installed it into DosBox. The only problem with this setup, it that I much prefer to use a text editor that’s outside of the DOS environment (like emacs/sublime, etc.) DosBox sometimes has a bit of difficulty picking up file system changes that have been mounted in.
Shift + Ctrl + F4 (documented as just Ctrl + F4) forces DosBox to refresh its mounts.
Very handy.
The Tools
There are a bucket of binaries that are bundled with the installation.
Utility
Description
wasm.exe
Assembler
whelp.exe
Help Command Line
wmake.exe
Make utility
wcl386.exe
Compile and Link
wpp386.exe
Optimizing compiler
wcc386.exe
Optimizing compiler
wd.exe
Debugger
wlib.exe
Library manager
wlink.exe
Linker
dos32a.exe
DOS32A extender
wdis.exe
Disassembler
For convenience, we’ll use wcl386.exe as this will perform the compilation and linking step in one for us.
Compiling and Linking
Prior to compilation and linking, things will go a lot smoother if you’ve prepared your environment variables correctly.
SET PATH C:\WATCOM\BINW;%PATH%;
SET INCLUDE=C:\WATCOM\H;
SET WATCOM=C:\WATCOM
SET EDPATH=C:\WATCOM\EDDAT
SET WIPFC=C:\WATCOM\WIPFC
Open up your favorite editor and create a hello world application, called hello.cpp.
C:\SRC> wcl386 hello.cpp
Open Watcom C/C++32 Compile and Link Utility Version 1.9
Portions Copyright (c) 1988-2002 Sybase, Inc. All Rights Reserved.
Source code is available under the Sybase Open Watcom Public License.
See http://www.openwatcom.org/ for details.
wpp386 HELLO.CPP
DOS/4GW Protected Mode Run-time Version 1.97
Copyright (c) Rational Systems, Inc. 1990-1994
Open Watcom C++32 Optimizing Compiler Version 1.9
Portions Copyright (c) 1989-2002 Sybase, Inc. All Rights Reserved.
Source code is available under the Sybase Open Watcom Public License.
See http://www.openwatcom.org/ for details.
HELLO.CPP: 7 lines, included 1160, no warnings, no errors
wlink @__wcl__.lnk
DOS/4GW Protected Mode Run-time Version 1.97
Copyright (c) Rational Systems, Inc. 1990-1994
Open Watcom Linker Version 1.9
Portions Copyright (c) 1985-2002 Sybase, Inc. All Rights Reserved.
Source code is available under the Sybase Open Watcom Public License.
See http://www.openwatcom.org/ for details.
loading object files
searching libraries
creating a DOS/4G executable
We can now run our application:
C:\SRC> hello.exe
DOS/4GW Protected Mode Run-time Version 1.97
Copyright (c) Rational Systems, Inc. 1990-1994
Hello, world
What is DOS/4GW?
To a lot of us, the DOS/4GW is a very familiar banner that we saw when we’d fire up one of our favorite games. But, what is it?
DOS/4G is a 32-bit DOS extender developed by Rational Systems (now Tenberry Software). It allows DOS programs to eliminate the 640 KB conventional memory limit by addressing up to 64 MB of extended memory on Intel 80386 and above machines.
It’s the resident binary that gets packaged with your compiled application that facilitates access to the computers’ full array of resources. Without it, you’d be stuck with what DOS provides you by default.
Conclusion
Well, it’s always nice to go over this old stuff. In my next posts, I’ll cover inline assembly and mode 13/x to get a head start on writing DOS games in the 90’s!
Now that we’ve got a driver up and running, we can use a library like sqlalchemy to run some queries. Before we can do that though, we need to install python’s odbc bindings pyodbc.
pip install pyodbc sqlalchemy
We can now start running some queries.
importurllibimportsqlalchemyassacstr=urllib.quote_plus('DRIVER=FreeTDS;SERVER=host;PORT=1433;DATABASE=db;UID=user;PWD=password;TDS_Version=8.0;')engine=sa.create_engine('mssql+pyodbc:///?odbc_connect='+cstr)forrowinengine.execute('SELECT 1 AS Test;'):printrow.Test