{"author_url":"https://blog.hatena.ne.jp/hcr/","published":"2005-07-09 00:00:00","image_url":null,"blog_title":"Misc. about Computer Science (\u8de1\u5730)","title":"","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fhcr.hatenadiary.org%2Fentry%2F20050709\" title=\" - Misc. about Computer Science (\u8de1\u5730)\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","width":"100%","provider_url":"https://hatena.blog","author_name":"hcr","provider_name":"Hatena Blog","categories":[],"url":"https://hcr.hatenadiary.org/entry/20050709","height":"190","version":"1.0","blog_url":"https://hcr.hatenadiary.org/","type":"rich","description":"[Tools] Sticky ssh tunnel \u305d\u306e2\u5148\u65e5(id:hcr:20050707)\uff0cssh\u30bb\u30c3\u30b7\u30e7\u30f3\u3092\u5f35\u308a\u3063\u3071\u306a\u3057\u306b\u3059\u308b\u30b9\u30af\u30ea\u30d7\u30c8\u3092\u66f8\u3044\u3066\u307f\u305f\u306e\u3067\u3059\u304c\uff0c\u3084\u3063\u3071\u308a\u7a7a\u306e\u30d1\u30b9\u30d5\u30ec\u30fc\u30ba\u306f\u5f37\u5ea6\u7684\u306b\u4e0d\u5b89\u306a\u306e\u3067\uff0cssh-agent\u5bfe\u5fdc\u3057\u3066\u307f\u307e\u3057\u305f\uff0e(\u300cssh-agent \u3067\u5feb\u9069 ssh \u751f\u6d3b (.ja)\u300d\u306e\u30b9\u30af\u30ea\u30d7\u30c8\u3092\u53c2\u8003\u306b\u3057\u3066\u3044\u307e\u3059\uff0e)\u30b9\u30af\u30ea\u30d7\u30c8\u3092\u8d77\u52d5\u3057\u305f\u6642\u306b\uff0cssh-agent\u304c\u8d77\u52d5\u3057\u3066\u3044\u306a\u3044\u5834\u5408\uff0cssh-agent\u3092\u8d77\u52d5\u3057\u3066\u30d1\u30b9\u30d5\u30ec\u30fc\u30ba\u3092\u5165\u529b\u3057\u307e\u3059\uff0e\u4e00\u5ea6\u5165\u529b\u3059\u308b\u304b\uff0cssh-agent\u304c\u8d77\u52d5\u6e08\u307f\u3067\u79d8\u5bc6\u9375\u3092\u767b\u9332\u6e08\u307f\u306e\u5834\u5408\u306f\uff0c\u30d1\u30b9\u30d5\u30ec\u30fc\u30ba\u306e\u5165\u529b\u306f\u4e0d\u8981\u3067\u3059\uff0e\u3053\u308c\u3067\uff0cssh tunnel\u751f\u6d3b\u3082\u4e00\u5b89\u2026"}