To make it quick, I wish I had known about port forwarding and tunneling earlier. With this blog post, I try to understand it better myself and share some experiences and tips with you.
Topics: use cases, configuration, SSH jumphosts, local/remote/dynamic port forwarding, and limitations
SSH tunneling and port forwarding can be used to forward TCP traffic over a secure SSH connection from the SSH client to the SSH server, or vice versa. TCP ports or UNIX sockets can be used, but in this post I’ll focus on TCP ports only.
I won’t go into details, but the following post should show enough examples and options to find use in your day-to-day work.
There are many more use cases, but this overview should give you a sense of possibilities.
Before we start: the options of the following examples and be combined and configured to suit your setup. As a side note: if the bind_address
isn’t set, localhost will be the default
AllowTcpForwarding yes
GatewayPorts
on the SSH server:GatewayPorts yes
Remember to restart the ssh server service.
Transparently connecting to a remote host through one or more hosts.
ssh -J user@REMOTE-MACHINE:22 -p 22 user@10.99.99.1
Side note: The port addressing can be removed, if the default port 22 is used!
On REMOTE-MACHINE as jumphost:
[user@REMOTE-MACHINE]$ ss | grep -i ssh
tcp ESTAB 0 0 167.135.173.108:ssh 192.160.140.207:45960
tcp ESTAB 0 0 10.99.99.2:49770 10.99.99.1:ssh
167.135.173.108
- public IP of REMOTE-MACHINE92.160.120.207
- public IP of LOCAL-MACHINE10.99.99.2
- internal IP of REMOTE-MACHINE10.99.99.1
- internal IP of REMOTE-WEBAPPssh -J user@REMOTE-MACHINE:22,user@ANOTHER-REMOTE-MACHINE:22 -p 22 user@10.99.99.1
ssh -L 10.10.10.1:8001:localhost:8000 user@REMOTE-MACHINE
127.0.0.1 - - [30/Dec/2022 18:05:15] "GET / HTTP/1.1" 200
ssh -L 8001:10.99.99.1:8000 user@REMOTE-MACHINE
10.99.99.2 - - [30/Dec/2022 21:28:42] "GET / HTTP/1.1" 200
ssh -R 8000:localhost:8001 user@REMOTE-MACHINE
ssh -R 8000:10.10.10.2:8001 user@REMOTE-MACHINE
ssh -R 10.99.99.2:8000:10.10.10.2:8001 user@REMOTE-MACHINE
Important: GatewayPorts yes
must be enabled on the SSH server to listen on another interface than the loopback interface.
To forward more than one port, SSH uses the SOCKS protocol. This is a transparent proxy protocol and SSH makes us of the most recent version SOCKS5.
Default port for SOCKS5 server is 1080 as defined in RFC 1928.
The client must be configured correctly to use a SOCKS proxy. Either on the application or OS layer.
ssh -D 10.10.10.1:5555 user@REMOTE-MACHINE
curl
on a ‘LOCAL’ client to test the correct connection/path:curl -L -x socks5://10.10.10.1:5555 brrl.net/ip
I won’t go into detail, but you can create a bi-directional TCP tunnel with the -w
flag. The interfaces must be created beforehand, and I haven’t tested it yet.
-w local_tun[:remote_tun]
-fN
:-f
- run in the background-N
- no shellssh -fN -L 8001:127.0.0.1:8000 user@REMOTE-MACHINE
Others than that: use screen or some other tools.
user@pleasejustwork:~$ ps -ef | grep ssh
[...]
user 19255 1 0 11:40 ? 00:00:00 ssh -fN -L 8001:127.0.0.1:8000 user@REMOTE-MACHINE
[...]
kill 19255
I won’t go into detail, but there are different ways to keep the SSH connection alive.
Both options can be set on the client or server, or both.
ClientAliveInterval
will send a request every n
seconds to keep the connection alive:ClientAliveInterval 15
ClientAliveCountMax
is the number of heartbeat requests sent after not receiving an respond from the other side of the connection before terminating the connection:ClientAliveCountMax 3
3
is the default, and setting it to 0
will disable connection termination. In this example, the connection would drop after around 45 seconds without any responds.There are mutliple ways to do it; autossh, scripts, cronjobs, and so on.
This is beyond this post and I might write about in the future.
SSH depends on a reliable delivery to be able to decrypt everything correctly. UDP does not offer any reliability and is therefore not supported and recommended to use over the SSH tunnel.
That said, there are ways to do it as described in this post. I still need to test it.
It lowers the throughput due to more overhead and increases the latency. On connections with packet loss or high latencies (e.x. satellite) it can cause a TCP meltdown.
This post is a great write-up.
Nevertheless, I’d been using OpenVPN-over-TCP for a while, and it worked flawlessly. Less throughput than UDP, but reliable. So, it highly depends on your setup.
Overall, it is not a VPN replacement. SSH tunneling can be used as such, but a VPN is better suited for better performance.
If you do not need those features, it is recommended to turn them of. Threat actors could use said features to avoid firewalls and other security measures.
The inspiration of this blog post are the following unix.stackexchange answer and blog post of Dirk Loss.
Thanks to Frank and ruffy for valuable feedback!