[ale] Robust Reverse Tunnels via SSH
Bob Toxen
transam at VerySecureLinux.com
Wed Aug 20 14:37:16 EDT 2008
One possibility is that IP Masquerading (NATing) is involved and after a
long period of inactivity, the Firewall drops the IP Masquerading
information.
Try adding the following line to /etc/rc.d/rc.local of your system
behind the Firewall:
echo 180 > /proc/sys/net/ipv4/tcp_keepalive_time
Bob Toxen
bob at verysecurelinux.com [Please use for email to me]
"Microsoft: Unsafe at any clock speed!"
-- Bob Toxen 10/03/2002
On Wed, Aug 20, 2008 at 11:50:40AM -0400, Greg Freemyer wrote:
> All,
>
> Does anyone know a recipe for "Robust Reverse Tunnels via SSH", or
> some other robust way to achieve reverse tunnels.
>
> === background
>
> I've seen a few posts about ssh agent forwarding, etc. That assumes
> you have at least one way through the firewall.
>
> I need to talk to a machine behind a firewall and I don't want to open
> up a port. ssh with the -R option puts in place a reverse tunnel to a
> gateway server. Exactly what I want to do.
>
> I've tried to set it up this weekend. It works, but it has not been
> very robust.
>
> I've seen comments online saying you can add an entry to crontab to
> address that. I've done that as well and I can see the new ssh
> sessions being initiated from the remote server on my gateway server,
> but when I try ssh to the gateway port, I get nothing more often than
> not. (It has worked a few times, so I have the basic concepts right.)
>
> Thanks
> Greg
> --
> Greg Freemyer
> Litigation Triage Solutions Specialist
> http://www.linkedin.com/in/gregfreemyer
> First 99 Days Litigation White Paper -
> http://www.norcrossgroup.com/forms/whitepapers/99%20Days%20whitepaper.pdf
>
> The Norcross Group
> The Intersection of Evidence & Technology
> http://www.norcrossgroup.com
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://mail.ale.org/mailman/listinfo/ale
More information about the Ale
mailing list