Skip to main content.

Reverse SSH tunneling

2014-08-27

Live demo in BSD Now Episode 052. | Originally written by TJ for bsdnow.tv | Last updated: 2014/08/27

NOTE: the author/maintainer of the tutorial(s) is no longer with the show, so the information below may be outdated or incorrect.

We've done a number of SSH tutorials in the past, but most of them rely on the fact that you have a certain level of control on the network. In some cases, you need to be able to access a system that's behind a firewall. This guide will show you how to do just that - reversing the connection and accessing an internal system from the outside. The only requirement in this case is that the firewall allows outbound SSH traffic. You'll have to have access to the machine behind the firewall at some point for this to work. The -R switch will play a key role in this (very short) tutorial. Since we'll be reversing the connection, be sure your client system has a publicly-accessible sshd running. On the system behind the firewall, run the following:

$ ssh -fN -R 9000:localhost:22 user@clientip

Replace "clientip" with the IP of your system and "22" with the port on which you run sshd. It's recommended to run that command in tmux so it doesn't get lost. You might want to consider running sshd on port 443, so it looks similar to normal SSL traffic. See our stunnel tutorial for more ideas there. Now move back to the client system, and we'll make the reverse connection like so:

$ ssh -p 9000 user@127.0.0.1

While it may appear to be connecting on the loopback device, it's actually using the already-established connection made by the internal machine. You'll need to use the username and password/key that you normally would for the internal system. Some recommended settings to have in the client's /etc/ssh/sshd_config:

ClientAliveInterval 300
TCPKeepAlive yes

With these, the internal system will send a packet to the client every five minutes to keep the connection from dying due to inactivity. One problem with this setup is, of course, if the first connection dies. Another possible issue is if your client's IP changes. While not much can be done about the first one (aside from maybe a cron job to try and re-establish the connection), there is a good way to handle the second situation. If you use something like SSH chaining, you can leave the internal system connected to a dedicated server whose IP doesn't ever change. From there, connect to the server, then to localhost.

Latest News

New announcement

2017-05-25

Hi, Mr. Dexter. Also, we understand that Brad Davis thinks there should be more real news....

Two Year Anniversary

2015-08-08

We're quickly approaching our two-year anniversary, which will be on episode 105. To celebrate, we've created a unique t-shirt design, available for purchase until the end of August. Shirts will be shipped out around September 1st. Most of the proceeds will support the show, and specifically allow us to buy...

New discussion segment

2015-01-17

We're thinking about adding a new segment to the show where we discuss a topic that the listeners suggest. It's meant to be informative like a tutorial, but more of a "free discussion" format. If you have any subjects you want us to explore, or even just a good name...

How did you get into BSD?

2014-11-26

We've got a fun idea for the holidays this year: just like we ask during the interviews, we want to hear how all the viewers and listeners first got into BSD. Email us your story, either written or a video version, and we'll read and play some of them for...


Episode 220: Opening ZFS in 2017

2017-11-15

Direct Download:HD VideoMP3 AudioTorrent This episode was brought to you by Headlines The First PS4 Kernel Exploit: Adieu The First PS4 Kernel Exploit: Adieu Plenty of time has passed since we first demonstrated Linux running on the PS4. Now we will step back a bit and explain how we managed to jump...

Episode 219: We love the ARC

2017-11-08

Direct Download:HD VideoMP3 AudioTorrent This episode was brought to you by Headlines Papers We Love: ARC: A Self-Tuning, Low Overhead Replacement Cache Ever wondered how the ZFS ARC (Adaptive Replacement Cache) works? How about if Bryan Cantrill presented the original paper on its design? Today is that day. Slides It starts by looking back at a fundamental paper...

Episode 218: A KRACK in the WiFi

2017-11-01

Direct Download:HD VideoMP3 AudioTorrent This episode was brought to you by Headlines FreeBSD 10.4-RELEASE Available FreeBSD 10.4-RELEASE is out. The FreeBSD Project dedicates the FreeBSD 10.4-RELEASE to the memory of Andrey A. Chernov. Some of the highlights: 10.4-RELEASE is the first FreeBSD release to feature full support for eMMC storage, including eMMC partitions, TRIM...

Episode 217: Your questions, part II

2017-10-25

Direct Download:HD VideoMP3 AudioTorrent This episode was brought to you by Headlines OpenBSD 6.2 Released OpenBSD continues their six month release cadence with the release of 6.2, the 44th release On a disappointing note, the song for 6.2 will not be released until December Highlights: Improved hardware support on modern platforms including ARM64/ARMv7 and octeon,...