Если исходящие соединения относительно открыты, можно спросить ssh(1)
создать туннели для Вас.
ssh -R *:8888:localhost:80 username@proxyserver.example.com
Теперь, соединения с proxyserver.example.com:8888
должен быть передан Вашему локальному порту 80. Детали от ssh(1)
страница справочника:
-R [bind_address:]port:host:hostport
Specifies that the given port on the remote (server) host
is to be forwarded to the given host and port on the
local side. This works by allocating a socket to listen
to port on the remote side, and whenever a connection is
made to this port, the connection is forwarded over the
secure channel, and a connection is made to host port
hostport from the local machine.
Port forwardings can also be specified in the
configuration file. Privileged ports can be forwarded
only when logging in as root on the remote machine. IPv6
addresses can be specified by enclosing the address in
square braces or using an alternative syntax:
[bind_address/]host/port/hostport.
By default, the listening socket on the server will be
bound to the loopback interface only. This may be
overridden by specifying a bind_address. An empty
bind_address, or the address ‘*’, indicates that the
remote socket should listen on all interfaces.
Specifying a remote bind_address will only succeed if the
server's GatewayPorts option is enabled (see
sshd_config(5)).
If the port argument is ‘0’, the listen port will be
dynamically allocated on the server and reported to the
client at run time.
Эта информация хранится в / etc / passwd
:
myuser:x:1001:1001:My User,Room,8888888888,9999999999,Other:/home/myuser:/bin/bash