Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I would like to mention sshuttle if your access only is via a jumphost and you don't want to have to create a port forward for every single host/port you want to connect to on the internal network. It basically acs like a cheap VPN:

https://github.com/sshuttle/sshuttle

https://sshuttle.readthedocs.io/en/latest/overview.html



More votes for sshuttle!

It's a poor man's one way VPN: It inherits encryption/integrity/authentication (and some authorization) from ssh; It works incredibly well; For most practical network purposes it puts you on the computer you are sshuttlling to; And all it needs on that computer is the ability to ssh into it and some version of python - no special privileges or prior installations.

The bad: It only does TCP (and does some UDP magic to make DNS work, but not UDP in general). It's only one way (no one on the destination network can "call you back", as you don't have an IP on that network). The only config is which network addresses get routed across the sshuttle (no policy / rules / firewall / anything else). You appear to come from the computer you shuttled to (so, unlike a real VPN, for better or worse - no policy along the way can tell you are coming from outside)


Yep, sshuttle is awesome. It's also used under the covers by telepresence for connecting into a k8s cluster.

https://www.telepresence.io/




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: