[ale] ssh -R (was Re: Have I been hacked?)
Chris Kleeschulte
chris.kleeschulte at it.libertydistribution.com
Tue Jan 13 10:06:11 EST 2009
Ed:
If you were referring to me as the 'Chris' in your last, then you are
most certainly welcome! Makes you wary of running untrusted code on
any machine, doesn't it?
Chris
On Jan 13, 2009, at 9:40 AM, Ed Cashin wrote:
> I'm mainly interested in ssh-ing into virtual machines running
> Linux on a Mac mini running VMware Fusion, at this time.
>
> Now that I can do that (Thanks, Chris!), I wanted to share the
> magic command.
>
> Background info:
>
> The office network is 192.168.1.0/24.
>
> My workstation's IP on the office network is 192.168.1.46.
> Its name is "meili".
>
> Meili's ssh daemon is listening on a non-standard port, 5555.
>
> The virtual machine is running CentOS, and VMware Fusion's
> NAT has assigned it the address 192.168.122.132. (The
> 192.168.122.132/24 network is a virtual network existing inside
> of the Mac mini.) The VM's name is "burke".
>
> The mac mini's IP on the office network doesn't figure into the
> command at all, so I won't mention it.
>
> At a shell prompt on burke, as ecashin, I run,
>
> ssh -p 5555 -v -N -T -R 1101:192.168.122.132:22 192.168.1.46
>
> ... or in English,
>
> ssh to meili's port 5555 and set up a tunnel from meili's
> localhost port 1101 to burke's port 22.
>
> Back at my workstation meili, I can ssh into burke as user
> ecashin via,
>
> ssh -p 1101 127.0.0.1
>
> --
> Ed Cashin <ecashin at noserose.net>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://mail.ale.org/mailman/listinfo/ale
More information about the Ale
mailing list