SSH Tunneling Guide

SSH tunneling is a method for securely forwarding network traffic between a local machine and a remote server. It leverages the encryption of SSH (Secure Shell) to protect data in transit and is useful for secure remote access, bypassing firewall restrictions, or accessing services on a private network.

Introduction to SSH Tunneling

By creating an encrypted tunnel, SSH tunneling allows you to forward network connections through a secure channel. There are three primary methods of SSH tunneling:

Method Command Option Description
Local Port Forwarding -L Forwards a port from your local machine to a remote host and port.
Remote Port Forwarding -R Forwards a port from the remote server back to your local machine.
Dynamic Port Forwarding -D Creates a SOCKS proxy that dynamically forwards traffic.

Local Port Forwarding

Local port forwarding directs connections from a specified port on your local machine to a destination address and port on a remote network. This is useful for securely accessing remote services as if they were local.

Basic Syntax:

ssh -L [local_port]:[destination_host]:[destination_port] [user]@[ssh_server]

Example: Forward your local port 8888 to localhost:80 on the remote server server.example.com:

ssh -L 8888:localhost:80 [email protected]

After executing this command, browsing to http://localhost:8888 will securely tunnel your connection to the remote web server.

Remote Port Forwarding

Remote port forwarding enables a remote SSH server to forward a port to a host and port on your local machine. This is useful when you want to provide remote users access to a local service.

Basic Syntax:

ssh -R [remote_port]:[destination_host]:[destination_port] [user]@[ssh_server]

Example: Forward remote port 9000 on server.example.com to localhost:3000 on your local machine:

ssh -R 9000:localhost:3000 [email protected]

Remote users connecting to server.example.com on port 9000 will have their traffic tunneled to your local service running on port 3000.

Dynamic Port Forwarding

Dynamic port forwarding sets up a SOCKS proxy on your local machine. With this method, you can route traffic dynamically, allowing applications to send their data through the secure SSH tunnel.

Basic Syntax:

ssh -D [local_port] [user]@[ssh_server]

Example: Set up a SOCKS proxy on local port 1080:

ssh -D 1080 [email protected]

You can configure your web browser or other applications to use localhost:1080 as a SOCKS proxy to secure your traffic.

Using SSH Tunnels in PowerShell

On modern Windows systems, OpenSSH is available by default. You can run SSH tunneling commands directly in PowerShell. For instance, to start a local port forwarding tunnel:

ssh -L 8888:localhost:80 [email protected]

If you want to run the tunnel as a background process, you can use PowerShell's Start-Process:

Start-Process ssh -ArgumentList "-L 8888:localhost:80 [email protected]"

This command opens the tunnel in a separate process, allowing you to continue using the current session.

Alternative: Using PuTTY's Plink

If you prefer using PuTTY’s command-line tool plink.exe (for instance, if OpenSSH isn’t available), you can set up an SSH tunnel similarly. Make sure plink.exe is installed and available in your PATH.

Example (Local Port Forwarding):

plink.exe -L 8888:localhost:80 [email protected]

This command creates a tunnel where local port 8888 is forwarded to localhost:80 on the remote server.

Troubleshooting Tips

Conclusion

SSH tunneling is a powerful technique for securing network connections and bypassing network restrictions. Whether you are using local, remote, or dynamic port forwarding, these methods help you create encrypted paths for your data. Experiment with the different methods to find the one that best fits your workflow and security requirements.

Return to Home