Mount port 80 of the external host (remote server home.local) to the port 8080of the local host. The -N flag prevents the initiation of an interactive session.
Also called SSH Reverse tunneling. Redirects the remote server's port to the local host's port. The client initiates the connection, then a tunnel is created (a socket listener is initiated by the server at the defined port) to forward incoming traffic to the server back to the client. It can be achieved with the -R flag. For example:
In order to make this work, it's also necessary to adjust the GatewayPortsdefault setting
sudo sed -i 's/#\?GatewayPorts.*/GatewayPorts yes/' /etc/ssh/sshd_configsudo service ssh restart
When, for example, traffic is blocked by your ISP or your organization, but an outbound ssh connection is allowed, then a SOCKS5 proxy server can be setup that allows traffic to be forwarded from whatever protocol/type to any address. The client takes initiative and starts a SOCKS5 proxy at the server side. He defines a local address where his browser could point to to allow unrestricted access.
ssh -D localhost:6000 [email protected]
torsocks <application>. For example:Or you could do the same using:
The TOR instance should be up and running on your client at port 9050.
Blogpost by teleport
The following list contains an overview of all zettels that have been created with the same tags assigned.
listfrom #SSH