Here’s a quick example for setting up reverse SSH tunnels on clients which can be controlled via the server from anywhere. This example presumes all the client computers has some sort of unique ID/hostname, like 9001, 9002, 9003, 9004 etc. Let’s say we have 10 clients stuck behind a firewall we’d like to access.
Start the SSH server on all clients like this:
ssh -R 1xxxx:localhost:22 email@example.com // replace xxxx with this client's unique id
Now we have all our clients setup with a reversed ssh tunnel.
If we’d like to ssh into id 9003 we run the following command from the server:
ssh user@localhost -p 19003
Lets ssh into 9005 instead:
ssh user@localhost -p 19005
user with a local user on the client machine.
I want to ssh into my Raspberry Pi. Local username is
- Step 1 – setup reverse ssh tunnel on the raspberry:
ssh -R 19999:localhost:22 firstname.lastname@example.org
- Step 2 – from my “it-db.com” server I run the following command:
ssh pi@localhost -p 19999
Combining with sshpass and autossh
sshpass -p "mypassword" autossh -R 19999:localhost:22 email@example.com