[TriLUG] sftp/ssh to boxes behind a firewall

Michael Rothwell michael at rothwell.us
Wed Apr 4 10:32:11 EDT 2007


You could use ssh as a SOCKS proxy (ssh -D) and then use:
- socks-aware programs (e.g., firefox)
- tsocks ( http://tsocks.sourceforge.net/ ) to access your network's  
internal resources using non-SOCKS-aware programs.
- ssh with the "ProxyCommand" option and a helper, see http:// 
zippo.taiyo.co.jp/~gotoh/ssh/connect.html

You could also run PPP over SSH to give your remote machine an ip  
address on your internal network, when ssh/sftp as normal. This is  
using TCP over TCP, though, so it can be a little shaky.


On Apr 4, 2007, at 8:16 AM, Roy Vestal wrote:

> I'm looking for the best/easiest way to do this.
>
> I have a few machines behind my firewall at home. I have 1 port  
> setup for ssh/sftp to one machine. However, i have a second machine  
> I need to get to from time to time.
>
> Currently, I ssh to machine 1, then have to ssh to machine 2. Is  
> there anyway, using ssh to create a kind of tunnel like I can with  
> vnc over ssh, that will allow me to directly ssh/sftp to the second  
> machine?  For example, if I have a document on machine 2, I  
> currently ssh to machine 1, sftp the document from machine 2 to  
> machine 1, then sftp the document from machine 1 to the workstation  
> I'm on. Is there a better/easier way that is still using ssh/sftp?
>
> TIA,
> Roy
> -- 
> TriLUG mailing list        : http://www.trilug.org/mailman/listinfo/ 
> trilug
> TriLUG Organizational FAQ  : http://trilug.org/faq/
> TriLUG Member Services FAQ : http://members.trilug.org/services_faq/




More information about the TriLUG mailing list