SSH Tunneling » History » Version 2

Version 1 (sph, 08/23/2010 05:49 PM) → Version 2/6 (sph, 08/23/2010 05:52 PM)

h1. SSH Tunneling

This is more of a quick howto for those who are already somewhat familiar with SSH tunneling. For more detailed information about SSH tunneling you can check your SSH client's manpage.

There are two ways to tunnel your client-core connection over SSH. You can either use static port forwarding or use a socks5 proxy.

h2. Static port forwarding

Forward local port 4242 to the correct on the core machine:

> <pre>$ ssh -L 4242:localhost:4242</pre>

The same can be achieved via PuTTY by entering _4242_ as source port and _localhost:4242_ as destination in the SSH > Tunnels tab.

In the client simply connect to localhost, port 4242.

h2. Socks 5 proxy

Modern SSH clients like OpenSSH and PuTTY can also use dynamic port forwarding by turning into a socks proxy. Quassel can then set up a connection to the core using this proxy.

> <pre>$ ssh -D 1080</pre>

In PuTTY, you can select the _Dynamic_ option and then add _1080_ in the SSH > Tunnels tab.

Now the client setup is a little bit more difficult since Qt 4.5 and earlier do not support hostname forwarding. You need to figure out the local IP address of the core as _127.0.0.1_ or _localhost_ will not work unfortunately.

Here is an example configuration: