I want to use my computer as a SOCKS proxy. Do you just have to do ssh -D port_number hostname? Do I have to put my Linux username as the hostname?
- 81,893
- 383
1 Answers
tl;dr -- seek the bold text below.
Note: I use $ prefix for strings you have to substitute with your desired values. This syntax is not meant to be fully compatible with variables in any shell.
Usage of ssh -D is indeed like this:
ssh -D $port_number $hostname
or
ssh -D $port_number $username@$hostname
Where $hostname identifies some machine; it can be IP address, address resolvable via DNS or via /etc/hosts file or via ssh_config file etc. The first command will use your current (local) username unless your ssh_config file tells otherwise (by default it doesn't). You need to provide credentials (like $username and password when asked) valid to the $hostname machine.
This will open the $port_number TCP port on your local computer and establish a SOCKS server on it. Note you may not be allowed to open some ports as regular user, especially lower than 1024, use higher number then.
In general the situation without SOCKS proxy provided by ssh is like this:
A -> D
where A is a client (e.g. web browser), D is a server (e.g. web server). But with proxy this is as follows:
A -> B -> C -> D
where:
Arepresents a single client that usesB:$port_numberas SOCKS address; there may be many clients.Bis the machine wheressh -D $port_number Cruns and where the TCP$port_numberlistens for incoming connections from anyA.Cis the$hostnameBconnects to; communication that normally goes toDfromAnow reachesDfromC.Dis any server, it sees communication fromCand may not be aware thatAandBare involved; there may be many servers.
Some of these letters may refer to same machine in some particular usage cases. Obviously any case where A=C gives no direct advantage over simple A -> D connection, but there are other useful cases.
Let's say you run the ssh command shown above and you tell your local browser to use SOCKS at localhost:$port_number. This is the case where A=B. Your browser's traffic will be forwarded and sites you visit (D) will see communication coming from the $hostname (C) as if your browser run there.
If you'd like other computers to connect to your open port (A≠B, they will use $your_IP:$port_number as SOCKS server address) you need to:
- configure your firewall to allow incoming connections to TCP port
$port_number; - use
-goption withssh -D;
or
- tunnel each client e.g. via their own separate
sshconnection so their connections appear local (as ifA=B) to your already runningssh -D ...thus firewall doesn't interfere nor-gis necessary; this can be done byssh -L $some_port:localhost:$port_number $your_IPinvoked at their side orssh -R $some_port:localhost:$port_number $their_IPinvoked at your side; clients will uselocalhost:$some_portas SOCKS server address in their browsers.
There's no reason $hostname cannot be B's localhost; it can. In this case B=C. This is pointless when you use this SOCKS proxy with your local browser (A=B=C) but if you allow connections from the outside then it makes perfect sense. I guess this is what you want to do. The command may be:
ssh -g -f -N -D $port_number localhost
You may want to establish key-based authentication so this ssh connection from localhost to localhost doesn't ask for your password. The above remark regarding firewall stands. Anyone able to use $your_IP:$port_number as SOCKS server address will be seen by servers they visit as if they are at your computer.
Relevant fragments of man 1 ssh:
-D [bind_address:]port
Specifies a local "dynamic" application-level port forwarding. This works by allocating a socket to listen toporton the local side, optionally bound to the specifiedbind_address. Whenever a connection is made to this port, the connection is forwarded over the secure channel, and the application protocol is then used to determine where to connect to from the remote machine. Currently the SOCKS4 and SOCKS5 protocols are supported, andsshwill act as a SOCKS server. Only root can forward privileged ports. [...]
-f
Requestssshto go to background just before command execution. [...]
-g
Allows remote hosts to connect to local forwarded ports.
-N
Do not execute a remote command. This is useful for just forwarding ports. [...]
- 81,893