![]() ![]() The serverĪlive messages are sent through the encrypted channel and there‐įore will not be spoofable. Messages is very different from TCPKeepAlive (below). ![]() It is important to note that the use of server alive If this threshold is reached while server alive messages areīeing sent, ssh will disconnect from the server, terminating the Sent without ssh(1) receiving any messages back from the server. Sets the number of server alive messages (see below) which may be This includes being reliable over several reboots of my home router, the VPS server, and the NAS.Īccording to man page for ssh_config: ServerAliveCountMax This has worked reliably for me for several months. R 4443:localhost:443 start and enable the SSH Tunnel service: sudo systemctl sudo systemctl start sudo systemctl enable rvice i /var/services/homes/foouser/.ssh/id_rsa \ I also have this command (the one that starts the SSH tunnel as a systemd process, if anyone is interested, here is the script: cat /etc/systemd/system/rvice the host that connects to my VPS) is behind my router the public IP address of my router frequently changes as it's DHCP assigned (from my ISP) so I stuck with "all hosts". Note: you could replace the * (which means apply this config to "all hosts") with a specific host - In my case my NAS (i.e. It is also worth adding some ssh config options to the server (in my case, on my VPS) as well by adding the following file if it doesn't already exist: ~]$ cat /home/foouser/.ssh/config - Specifies the user account foouser used to establish the remote port forwarding ssh session with the server.if either end is unable to bind and listen on a specified port). ExitOnForwardFailure - if set to "yes", the connection shall be terminated if ssh cannot set up all requested dynamic, tunnel, local, and remote port forwardings, (e.g.If this threshold is reached ssh will disconnect from the server, terminating the session. ServerAliveCountMax - the number of "server alive" messages which may be sent without reply from the server.ServerAliveInterval - the number of seconds that the client will wait before sending a "server alive" message to the server to keep the connection alive.-i /path/to/key - Specify the path to ssh key used to establish the ssh session, without this you will have to enter username (if not supplied) and password to establish the ssh session.In this case, it means forward port 80 of the remote server to port 8080 of the client. -R 8080:localhost:80 - Specifies that the given port on the remote (server) host is to be forwarded to the given host and port on the local side.-N - Do not execute a remote command this is useful for just forwarding ports.To create an SSH Tunnel, I issue the following command (from the NAS): ssh -NT -o ServerAliveInterval=60 -o ServerAliveCountMax=10 -o ExitOnForwardFailure=yes -i /var/services/homes/foouser/.ssh/id_rsa -R 8080:localhost:80 -R 4443:localhost:443 explain this command: This can easily be overcome by having the client (in my case, the VPS) "ping" the server (in my case, the NAS) using the keep alive option. However, I suffered from the SSH tunnel being "closed" due to inactivity (depsite the ssh process staying up). So to reach my NAS from the internet, I simply need to create an SSH tunnel between my NAS and my VPS, that reliably stays open all the time (for round the clock access). Therefore, to reach my NAS, I have a VPS (which I rent from OVH for a very small monthly cost), and that has a fixed public IP address. I have a NAS that I want to reach from the internet, I can't use port forwarding because my ISP uses CGNAT (my public IP is not really my public IP, I'm behind another router I don't have any control over). Upstart script on Ubuntu, where /etc/inittab is not available: start on net-device-up IFACE=eth0Įxec ssh -i /path/to/rsaKey -N -o "ServerAliveInterval 180" -R 55002:localhost:22 scriptįor those who don't want to (or) can't use AutoSSH. etc/inittab, to have access to a box shipped and installed in another country, behind NAT, without port forwarding to the box, you can configure it to create an ssh tunnel back to you: tun1:2345:respawn:/usr/bin/ssh -i /path/to/rsaKey -f -N -o "ServerAliveInterval 180" -R 55002:localhost:22 'sleep 365d' sleep 5 done) do not remove the sleep command, ssh may fail quickly and you'll respawn too many processes Always use ServerAliveInterval SSH option in case the tunnel issues are generated by expired NAT sessions.Īlways use a respawning method in case the connectivity goes down entirely, you have at least three options here: ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |