Some findings for windows users:
I’ve configured key authentication on my raspberry pi (see here, chapter 4.9) and disabled password authentication (chapter 4.11).
- Downloaded the files, as indicated by hupo (first entry of this post), I needed to disable my virus scanner, as these files are not trusted.
- install the programs, openssh first, you don’t need ssh server, only the client
Since password authentication won’t work (disabled) you need to change the permission on your local copy of the file id_rsa (instructions recorded on windows 7), because openssh refuses to key authenticate, if the key is accessible by multiple users:
don’t mess this up, you will lose access to the file!
- step one: right click, properties, security, edit, add, add your windows username, check names, ok, assign full control to yourself, apply.
Just to be on the safe side, close the ‘properties’ dialog and open it again. Verify your windows account is there and has full control!
- step two: advanced, change permissions, uncheck ‘Include inheritable permissions from this objects parent’, apply, ok, ok
There should be only one user (your windows username) in the ‘group or user names’ list.
Now open a command prompt, if your system is UAC enabled, right click and ‘run as administrator’
CD into the folder, holding the id_rsa file (the authentication key)
ssh -i id_rsa firstname.lastname@example.org “sudo tail -f /var/log/lighttpd/access.log” | logstalgia --sync
(replace the IP address)
browse to http://192.168.1.114/admin to see the results in Logstalgia (replace the IP address)
remember, if you edit or recreate this file, the permissions will be gone. By default, it’s bad practice to assign permissions on the file level (should always use folder), but since openssh is so picky about these permissions …
hope this helps someone…