A good tool for managing ssh tunnels on OSX

I am looking for a good ssh tunnel management tool. I am currently using SSHTunnel (cocoa -sshtunnel), but it is not very safe, if you look at ps when connecting, you see the password in plain text. And there is no way to configure the private key file for each connection.

I also tried STM (http://projects.tynsoe.org/en/stm/index.php), however you cannot save your passwords and also not use the private key.

I am working on osx Snow Leopard. I use tunnels to forward remote ports. I have a local SVN server for website development, and checkout remotely. I cannot forward ports because I do not have access to the router.

What tools do you use?

+4
source share
4 answers

you should use the console and regular ssh for tunneling, at least what I always do. here is a small introduction on how to use it. saving passwords is really something that doesn't work there, but I always used the keys, so you no longer need to enter a password

ssh tunnel from console:

http://www.revsys.com/writings/quicktips/ssh-tunnel.html

login with authkeys:

http://linuxproblem.org/art_9.html

this is for both linux and bsd, but it should also work on mac os, I remember how to use it, maybe some option has another shortcut, if it doesnโ€™t work, look at man ssh

* EDIT

if you need gui (comment) try jellyfissh, it looks like it can do what you need

http://www.m-works.co.nz/jellyfissh.php

+2
source

I wrote my own tool for this, a tunnel boring machine . It does not store passwords, but works great with SSH keys in ~ / .ssh, and that is how I use it.

Itโ€™s possible that at some point Iโ€™ll take care of storing passwords - if you find that TBM works for you, but lacks some key function, such as password storage, do not hesitate to write the problem to GitHub or, for that matter, implement it and send me a pull request.

+2
source

SSH Tunnel Manager - This Tool Is Great!

+2
source

I use Terminal for this and it works very well. You can create a shell script for your colleagues that sets up tunnels with their username as an argument. Should it be easy enough to run them? For instance:

 #!/bin/sh username=$1 servdest=ssh.yoursshserver.com ssh -l ${username} -L 7777:${servdest}:7777 -L 2112:wiki.elsewhere.net:80 ${servdest} 
+1
source

Source: https://habr.com/ru/post/1368946/


All Articles