by opsdisk on 1/15/22, 1:24 PM with 25 comments
by crims0n on 1/15/22, 3:14 PM
Years ago I worked in a SOC doing managed services for a major telco provider, and for some reason they thought that we didn't have the need to do any kind of SSH tunneling to manage routers/switches/firewalls. They kept blocking it at various layers, and we kept having to find more and more creative ways to get around it. I think at one point we were hosting our own PAC files local to our machines, building three layers of tunnels (the last of which being a dynamic SOCKS tunnel), and using a portable browser (because we couldn't be trusted with admin!) with FoxyProxy (or similar) to finally reach our destination.
by np1810 on 1/15/22, 4:59 PM
This book does discuss autossh [1] which I came to know about recently while setting up my dynamic home ip (w/ CG-NAT) as the exit node in a wireguard network to overcome geo-restrictions on streaming services when traveling... :p
autossh [1] is such a simple and useful utility, wish I had known about it earlier when any connection changes in VPN/WiFi used to break my ssh tunnels to the corporate network during development...
If you're a frequent user of ssh tunnels, do check out autossh... ;)
by tomxor on 1/15/22, 3:17 PM
... although for the later purpose it's no where near as CPU efficient as wiregaurd, but with non root access to any SSH server it can get you around barriers in a pinch with only TCP 443 available, and effectively "VPN" multiple potentially conflicting subnets at the same time - I've not seen any other tool that can do the latter so effortlessly.
by anderspitman on 1/15/22, 9:27 PM
by chx on 1/15/22, 6:02 PM
by stonecharioteer on 1/16/22, 6:30 AM
by egberts1 on 1/15/22, 10:00 PM
by mlnhd on 1/15/22, 5:09 PM