Home IT Linux Windows Database Network Programming Server Mobile  
           
  Home \ Server \ Sshuttle A VPN-based transparent proxy that uses ssh     - OpenGL Superb Learning Notes - Depth Texture and Shadows (Programming)

- OpenSUSE GPG Comments (Linux)

- CentOS 6.4 OpenNebula installation (Linux)

- VMWare virtual machine without rebooting way to add virtual disk (Linux)

- Java, hashcode, equals and == (Programming)

- JDK installation under CentOS (Linux)

- Linux System Getting Started Learning: DeVeDe installed on Linux to create a video DVD (Linux)

- GitHub multiplayer co-development configuration (Linux)

- Linux permissions Detailed (Linux)

- for (int a: i) the use of the Java programming (Programming)

- Python console achieve progress bar (Programming)

- Linux Security trust with users (Linux)

- RHEL7 unattended automatic installation DHCP + TFTP + SYSLINUX + TFTP + Kickstart (Linux)

- Nonstandard IMP-00010 error processing one case (Database)

- Shell Scripting Interview Questions (Programming)

- I use the desktop environment in GNU / Linux combination tool (Linux)

- Linux common commands ll namely ls -l --color = auto (Linux)

- Java NIO in the world (Programming)

- Installation CD audio file extraction tool Flacon (Linux)

- To generate a certificate using OpenSSL under Linux (Server)

 
         
  Sshuttle A VPN-based transparent proxy that uses ssh
     
  Add Date : 2017-08-31      
         
       
         
  Sshuttle allows you to create a VPN connection from your computer to any remote server via ssh, as long as your server supports python2.3 or later. You must have local root privileges, but you can have a regular account on the server side.

You can run multiple sshutles on one machine at the same time to connect to different servers, so you can use multiple VPNs at the same time, and sshuttle can forward all traffic from your subnet to the VPN.

Install sshuttle in Ubuntu

Enter the following command in the terminal

Sudo apt-get install sshuttle
 

Use sshuttle

Sshuttle syntax

Sshuttle [options ...] [- r [username @] sshserver [: port]] [subnets]
 

Option Details

-r, -remote = [username @] sshserver [: port]

The remote host name and optional user name, used to connect to the remote server ssh port number. Such as example.com, testuser @ example.com, testuser @ example.com: 2222 or example.com:2244.

Sshuttle example

In the machine using the following command:

Sudo sshuttle -r username @ sshserver 0.0.0.0/0-vv
When started, sshuttle creates an ssh session to the server specified by -r. If -r is lost, it runs the client and server locally, which is sometimes useful in tests.

After connecting to the remote server, sshuttle will upload its (python) source code to the remote server and execute. Therefore, you do not need to install sshuttle on the remote server, and there is no sshuttle version conflict between the client and the server.

More examples in the manual

Proxy All local connections for local testing, not using ssh:

$ Sudo sshuttle -v 0/0
Starting sshuttle proxy.
Listening on ( '0.0.0.0', 12300).
[Local sudo] Password:
Firewall manager ready.
C: connecting to server ...
S: available routes:
S: 192.168.42.0/24
C: connected.
Firewall manager: starting transproxy.
C: Accept: '192.168.42.106': 50035 -> '192.168.42.121': 139.
C: Accept: '192.168.42.121': 47523 -> '77 .141.99.22 ': 443.
... etc ...
^ C
Firewall manager: undoing changes.
KeyboardInterrupt
C: Keyboard interrupt: exiting.
C: SW # 8: 192.168.42.121: 47523: deleting
C: SW # 6: 192.168.42.106: 50035: deleting
Test connections to remote servers, automatically guessing hostnames and subnets:

$ Sudo sshuttle -vNHr example.org
Starting sshuttle proxy.
Listening on ( '0.0.0.0', 12300).
Firewall manager ready.
C: connecting to server ...
S: available routes:
S: 77.141.99.0/24
C: connected.
C: seed_hosts: []
Firewall manager: starting transproxy.
Hostwatch: Found: testbox1: 1.2.3.4
Hostwatch: Found: mytest2: 5.6.7.8
Hostwatch: Found: domaincontroller: 99.1.2.3
C: Accept: '192.168.42.121': 60554 -> '77 .141.99.22 ': 22.
^ C
Firewall manager: undoing changes.
C: Keyboard interrupt: exiting.
C: SW # 6: 192.168.42.121: 60554: deleting
     
         
       
         
  More:      
 
- MySQL5.6.17 compiler installation under CentOS (Database)
- Oracle 11g + RAC + RHEL6.5 + udev + ASM + PSU installation summary (Database)
- Servlet 3.0 interfaces of AsyncListener (Programming)
- VNC connection VMware vSphere ESXi 5.5 (Linux)
- OpenSUSE GPG Comments (Linux)
- Single-node Hadoop installation notes distributed pseudo & (Server)
- Nmcli based network management command-line tool (Linux)
- grep, egrep and regular expressions (Linux)
- Linux filtration empty file command summary (Linux)
- Linux IO redirection (Linux)
- CentOS 5.8 (64) Python 2.7.5 installation error resolved (Linux)
- To install Google Chrome browser under Ubuntu 14.04 LTS (Linux)
- Commentary Apache + Tomcat + JK implement Tomcat clustering and load (Server)
- Linux platform Oracle MySQL connection (Database)
- Linux installation beautify early experience (Linux)
- Bubble Sort Algorithms (Programming)
- Debian users to install FFmpeg 2.2.2 (Linux)
- How to recover deleted files in Linux systems (Linux)
- Linux instructions and examples GPG encryption and decryption (Linux)
- Ubuntu install Wireshark (Linux)
     
           
     
  CopyRight 2002-2016 newfreesoft.com, All Rights Reserved.