Service permettant de créer des tunnels SSH entre 2 machines derrière un NAT
go
Go to file
2023-09-25 22:12:14 -06:00
cmd/server feat: collect and display usage stats 2023-09-25 22:12:14 -06:00
http feat: collect and display usage stats 2023-09-25 22:12:14 -06:00
misc/packaging feat: collect and display usage stats 2023-09-25 22:12:14 -06:00
ssh feat: collect and display usage stats 2023-09-25 22:12:14 -06:00
stat feat: collect and display usage stats 2023-09-25 22:12:14 -06:00
.dockerignore feat: initial commit 2023-09-12 08:03:34 -06:00
.env.dist feat: add http server with a page serving service informations 2023-09-22 21:20:21 -06:00
.gitignore feat: collect and display usage stats 2023-09-25 22:12:14 -06:00
.goreleaser.yaml feat: collect and display usage stats 2023-09-25 22:12:14 -06:00
Dockerfile feat: initial commit 2023-09-12 08:03:34 -06:00
go.mod feat: add http server with a page serving service informations 2023-09-22 21:20:21 -06:00
go.sum feat: add http server with a page serving service informations 2023-09-22 21:20:21 -06:00
Makefile feat(packaging): add goreleaser recipe 2023-09-23 13:00:49 -06:00
modd.conf feat: add http server with a page serving service informations 2023-09-22 21:20:21 -06:00
mux_listener.go feat: add http server with a page serving service informations 2023-09-22 21:20:21 -06:00
options.go feat: collect and display usage stats 2023-09-25 22:12:14 -06:00
README.md feat: initial commit 2023-09-12 08:03:34 -06:00
server.go feat: collect and display usage stats 2023-09-25 22:12:14 -06:00

Rebound

Serveur utilisant le protocole SSH pour créer des tunnels TCP/IP.

Usage

Ouvrir un tunnel sur un port local

ssh -R 0:<target_address>:<target_port> root@rebound.lookingfora.name -p 2222

Se connecter à un tunnel ouvert

ssh -L <local_port>:0.0.0.0:1 <secret>@rebound.lookingfora.name -p 2222

Vous pourrez ensuite accéder au service sur 127.0.0.1:<local_port> comme si c'était <target_address>:<target_port>.