[TriLUG] sftp/ssh to boxes behind a firewall
Michael Rothwell
michael at rothwell.us
Wed Apr 4 10:32:11 EDT 2007
You could use ssh as a SOCKS proxy (ssh -D) and then use:
- socks-aware programs (e.g., firefox)
- tsocks ( http://tsocks.sourceforge.net/ ) to access your network's
internal resources using non-SOCKS-aware programs.
- ssh with the "ProxyCommand" option and a helper, see http://
zippo.taiyo.co.jp/~gotoh/ssh/connect.html
You could also run PPP over SSH to give your remote machine an ip
address on your internal network, when ssh/sftp as normal. This is
using TCP over TCP, though, so it can be a little shaky.
On Apr 4, 2007, at 8:16 AM, Roy Vestal wrote:
> I'm looking for the best/easiest way to do this.
>
> I have a few machines behind my firewall at home. I have 1 port
> setup for ssh/sftp to one machine. However, i have a second machine
> I need to get to from time to time.
>
> Currently, I ssh to machine 1, then have to ssh to machine 2. Is
> there anyway, using ssh to create a kind of tunnel like I can with
> vnc over ssh, that will allow me to directly ssh/sftp to the second
> machine? For example, if I have a document on machine 2, I
> currently ssh to machine 1, sftp the document from machine 2 to
> machine 1, then sftp the document from machine 1 to the workstation
> I'm on. Is there a better/easier way that is still using ssh/sftp?
>
> TIA,
> Roy
> --
> TriLUG mailing list : http://www.trilug.org/mailman/listinfo/
> trilug
> TriLUG Organizational FAQ : http://trilug.org/faq/
> TriLUG Member Services FAQ : http://members.trilug.org/services_faq/
More information about the TriLUG
mailing list