ssh hack: connect directly to machine via a firewall boxPublished on 17 November 2008
It's common to have to ssh to firewall / gateway machine, then ssh to the machine you want to work on within a server network.
Typically you'd do this from your local machine:
I finally got bored of doing this, and created the following file: /usr/bin/sssh
Now I can use the
sssh command to connect to hosts using the firewall machine as a proxy. Like most good hacks, this uses netcat.
Will connect me directly to a machine on the server network, via the firewall box. Seeing as it passes all parameters to ssh (the
$* bit) you can do port forwards and X-forwarding as usual too:
This lets me tunnel the port for a PostgreSQL running on my development vm (
my-vm) in a single command. I have all my keys installed, so no passwords needed - I estimate this will save me about 60 seconds every day.
Recent 10 Articles
- BigWig: A better Erlang webtool (spawnfest entry)
- Erlang rebar tutorial: generating releases and upgrades
- Erlang/OTP releases: rebar, release_handler, .appup, etc
- Rewriting Playdar: C++ to Erlang, massive savings
- Erlang talk at London Hackspace
- Anti-RDBMS: A list of distributed key-value stores
- How we use IRC at Last.fm
- Getting to know ejabberd and writing modules
- ssh hack: connect directly to machine via a firewall box
- A Million-user Comet Application with Mochiweb, Part 3
[ See all 18 articles ]