Home IT Linux Windows Database Network Programming Server Mobile  
           
  Home \ Server \ Sshuttle A VPN-based transparent proxy that uses ssh     - Getting Started with Linux system to learn: how to install the Shrew Soft IPsec VPN on Linux (Linux)

- C # compiler to achieve functional use in the runtime (Programming)

- Wireshark basic introduction and learning TCP three-way handshake (Linux)

- Memcache explain in detail (Server)

- How to use tmpfs in RHEL / CentOS 7.0 (Linux)

- C + + secondary pointer memory model (pointer array) (Programming)

- How to use the TF / SD card making Exynos 4412 u-boot boot disk in Mac (Linux)

- Why not use the ifconfig command under RedHat Linux 5 (Linux)

- sudoers file parsing (Linux)

- ASM Management - How to Rename diskgroup (Database)

- Spring multi data source configuration (Programming)

- Java synchronization mechanism: synchronized, wait, notify (Programming)

- How to clear the v $ archived_log view expiration information (Database)

- Open Ubuntu system updates (Linux)

- Python implementation Bursa transition model (Programming)

- Java Learning: elegant string (Programming)

- Django url () function Detailed (Programming)

- Linux settings Java_home (Linux)

- ORA-01157 & ORA-01110 Troubleshooting (Database)

- Ease of use "Explain Shell" script to understand Shell command (Linux)

 
         
  Sshuttle A VPN-based transparent proxy that uses ssh
     
  Add Date : 2017-08-31      
         
       
         
  Sshuttle allows you to create a VPN connection from your computer to any remote server via ssh, as long as your server supports python2.3 or later. You must have local root privileges, but you can have a regular account on the server side.

You can run multiple sshutles on one machine at the same time to connect to different servers, so you can use multiple VPNs at the same time, and sshuttle can forward all traffic from your subnet to the VPN.

Install sshuttle in Ubuntu

Enter the following command in the terminal

Sudo apt-get install sshuttle
 

Use sshuttle

Sshuttle syntax

Sshuttle [options ...] [- r [username @] sshserver [: port]] [subnets]
 

Option Details

-r, -remote = [username @] sshserver [: port]

The remote host name and optional user name, used to connect to the remote server ssh port number. Such as example.com, testuser @ example.com, testuser @ example.com: 2222 or example.com:2244.

Sshuttle example

In the machine using the following command:

Sudo sshuttle -r username @ sshserver 0.0.0.0/0-vv
When started, sshuttle creates an ssh session to the server specified by -r. If -r is lost, it runs the client and server locally, which is sometimes useful in tests.

After connecting to the remote server, sshuttle will upload its (python) source code to the remote server and execute. Therefore, you do not need to install sshuttle on the remote server, and there is no sshuttle version conflict between the client and the server.

More examples in the manual

Proxy All local connections for local testing, not using ssh:

$ Sudo sshuttle -v 0/0
Starting sshuttle proxy.
Listening on ( '0.0.0.0', 12300).
[Local sudo] Password:
Firewall manager ready.
C: connecting to server ...
S: available routes:
S: 192.168.42.0/24
C: connected.
Firewall manager: starting transproxy.
C: Accept: '192.168.42.106': 50035 -> '192.168.42.121': 139.
C: Accept: '192.168.42.121': 47523 -> '77 .141.99.22 ': 443.
... etc ...
^ C
Firewall manager: undoing changes.
KeyboardInterrupt
C: Keyboard interrupt: exiting.
C: SW # 8: 192.168.42.121: 47523: deleting
C: SW # 6: 192.168.42.106: 50035: deleting
Test connections to remote servers, automatically guessing hostnames and subnets:

$ Sudo sshuttle -vNHr example.org
Starting sshuttle proxy.
Listening on ( '0.0.0.0', 12300).
Firewall manager ready.
C: connecting to server ...
S: available routes:
S: 77.141.99.0/24
C: connected.
C: seed_hosts: []
Firewall manager: starting transproxy.
Hostwatch: Found: testbox1: 1.2.3.4
Hostwatch: Found: mytest2: 5.6.7.8
Hostwatch: Found: domaincontroller: 99.1.2.3
C: Accept: '192.168.42.121': 60554 -> '77 .141.99.22 ': 22.
^ C
Firewall manager: undoing changes.
C: Keyboard interrupt: exiting.
C: SW # 6: 192.168.42.121: 60554: deleting
     
         
       
         
  More:      
 
- Incremental garbage collection mechanism for Ruby 2.2 (Programming)
- TypeScript basic grammar (Programming)
- Category prevent DoS attacks against Linux (Linux)
- Linux system Iptables Firewall User Manual (Linux)
- Cobbler batch install Ubuntu / CentOS system (Linux)
- PostgreSQL Stream Configuration (Database)
- Oracle archive log deletion (Database)
- Ubuntu 12.04 installation instructions under GAMIT10.40 (Linux)
- Java Graphics2D Paint (Programming)
- About enhanced Linux / Unix server system security program (Linux)
- php How to prevent being injected (Linux)
- C ++ free store and heap (Programming)
- How to remove the Linux memory Cache, Buffer and swap space (Linux)
- How to create a someone project on github (Linux)
- Linux System Getting Started Learning: Linux in the last command (Linux)
- It is time to upgrade your gulp 4.0 (Programming)
- The Gitlab migrated to Docker container (Server)
- Linux itself disguised illusion strengthen security (Linux)
- Intrusion analysis and prevention tools Knark under Linux platform (Linux)
- Ubuntu 12.04 installation DHCP Server (Server)
     
           
     
  CopyRight 2002-2016 newfreesoft.com, All Rights Reserved.