mirror of
https://github.com/ovh/the-bastion.git
synced 2026-05-09 08:25:27 +02:00
[GH-ISSUE #300] Ssh port forwarding? #73
Labels
No labels
answered
bug
documentation
enhancement
enhancement
feature
feature
kept-open-for-info
pull-request
question
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/the-bastion#73
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @fzyzcjy on GitHub (Apr 13, 2022).
Original GitHub issue: https://github.com/ovh/the-bastion/issues/300
Hi thanks for the project! I wonder whether ssh port forwarding is supported? For example, suppose there is an application in the private network using port 1234, and I want to communicate with that port directly at my local development machine. If the bastion is a normal server, I can use ssh port forward like
ssh the-bastion -L 1234:some-ip:1234and happily accesslocalhost:1234in my development machine.@speed47 commented on GitHub (Jun 24, 2022):
Hey @fzyzcjy , actually ssh port forwarding is explicitly disabled on the bastion, because it could be used as a way to bypass its logic entirely and punch a hole in the traceability feature.
For example you could redirect a remote ssh port to your own machine, through the bastion, then use this tunnel to access it remotely from your machine, without using the bastion logic anymore, and the bastion wouldn't be able to see anything.
Disabling port forwarding helps asserting that the accesses are exhaustively traced on your infrastructure (closes a possible loop-hole), and as traceability is one of the main missions of the bastion, that's why it has been done this way.
@fzyzcjy commented on GitHub (Jun 24, 2022):
Hi thanks for your reply!
My use case is mainly accessing Kubernetes in my cluster from my own computer. So is this feasible using the bastion (without using port forwarding)?
@shayneoneill commented on GitHub (Mar 18, 2025):
While I do get the reasoning, is there a way to say "Ok, I accept the risks, but I really need port forwarding!", or is it a feature that just isnt there?
Are there are bastion type products that feature this, if there isn't a way? I should also note that disabling it completely isn't really THAT great a protection. Theres nothing stopping someone from doing something like installing PPP or SLIP and going old school to get around..... Except that it kinda sucks.... But an attacker has a route even if the "official" channel of port forwards is cut off.