mirror of
https://github.com/sshuttle/sshuttle.git
synced 2024-11-24 17:04:36 +01:00
Update documentation
The output in the examples provided in the man page hadn't been updated as sshuttle changed its output over time. The example of testing sshuttle without a remote host was removed. It was the first example previously and it is something that is unlikely users will wish to do. Also: - Update some --help messages. - Manpage: Fix a typo. - Manpage: Mention that host specified with -r can be an ssh alias. - Eliminate variable only used once.
This commit is contained in:
parent
bc54ffe398
commit
851b26cb13
158
docs/manpage.rst
158
docs/manpage.rst
@ -10,8 +10,8 @@ Synopsis
|
|||||||
Description
|
Description
|
||||||
-----------
|
-----------
|
||||||
:program:`sshuttle` allows you to create a VPN connection from your
|
:program:`sshuttle` allows you to create a VPN connection from your
|
||||||
machine to any remote server that you can connect to via
|
machine to any remote server that you can connect to via ssh, as long
|
||||||
ssh, as long as that server has python 3.6 or higher.
|
as that server has a sufficiently new Python installation.
|
||||||
|
|
||||||
To work, you must have root access on the local machine,
|
To work, you must have root access on the local machine,
|
||||||
but you can have a normal account on the server.
|
but you can have a normal account on the server.
|
||||||
@ -31,22 +31,23 @@ Options
|
|||||||
.. option:: <subnets>
|
.. option:: <subnets>
|
||||||
|
|
||||||
A list of subnets to route over the VPN, in the form
|
A list of subnets to route over the VPN, in the form
|
||||||
``a.b.c.d[/width][port[-port]]``. Valid examples are 1.2.3.4 (a
|
``a.b.c.d[/width][port[-port]]``. Valid examples are 1.2.3.4 (a
|
||||||
single IP address), 1.2.3.4/32 (equivalent to 1.2.3.4),
|
single IP address) and 1.2.3.4/32 (equivalent to 1.2.3.4),
|
||||||
1.2.3.0/24 (a 24-bit subnet, ie. with a 255.255.255.0
|
1.2.3.0/24 (a 24-bit subnet, ie. with a 255.255.255.0 netmask).
|
||||||
netmask), and 0/0 ('just route everything through the
|
Specify subnets 0/0 to match all IPv4 addresses and ::/0 to match
|
||||||
VPN'). Any of the previous examples are also valid if you append
|
all IPv6 addresses. Any of the previous examples are also valid if
|
||||||
a port or a port range, so 1.2.3.4:8000 will only tunnel traffic
|
you append a port or a port range, so 1.2.3.4:8000 will only
|
||||||
that has as the destination port 8000 of 1.2.3.4 and
|
tunnel traffic that has as the destination port 8000 of 1.2.3.4
|
||||||
1.2.3.0/24:8000-9000 will tunnel traffic going to any port between
|
and 1.2.3.0/24:8000-9000 will tunnel traffic going to any port
|
||||||
8000 and 9000 (inclusive) for all IPs in the 1.2.3.0/24 subnet.
|
between 8000 and 9000 (inclusive) for all IPs in the 1.2.3.0/24
|
||||||
A hostname can be provided instead of an IP address. If the
|
subnet. A hostname can be provided instead of an IP address. If
|
||||||
hostname resolves to multiple IPs, all of the IPs are included.
|
the hostname resolves to multiple IPs, all of the IPs are
|
||||||
If a width is provided with a hostname that the width is applied
|
included. If a width is provided with a hostname, the width is
|
||||||
to all of the hostnames IPs (if they are all either IPv4 or IPv6).
|
applied to all of the hostnames IPs (if they are all either IPv4
|
||||||
Widths cannot be supplied to hostnames that resolve to both IPv4
|
or IPv6). Widths cannot be supplied to hostnames that resolve to
|
||||||
and IPv6. Valid examples are example.com, example.com:8000,
|
both IPv4 and IPv6. Valid examples are example.com,
|
||||||
example.com/24, example.com/24:8000 and example.com:8000-9000.
|
example.com:8000, example.com/24, example.com/24:8000 and
|
||||||
|
example.com:8000-9000.
|
||||||
|
|
||||||
.. option:: --method <auto|nat|nft|tproxy|pf|ipfw>
|
.. option:: --method <auto|nat|nft|tproxy|pf|ipfw>
|
||||||
|
|
||||||
@ -141,7 +142,10 @@ Options
|
|||||||
The remote hostname and optional username and ssh
|
The remote hostname and optional username and ssh
|
||||||
port number to use for connecting to the remote server.
|
port number to use for connecting to the remote server.
|
||||||
For example, example.com, testuser@example.com,
|
For example, example.com, testuser@example.com,
|
||||||
testuser@example.com:2222, or example.com:2244.
|
testuser@example.com:2222, or example.com:2244. This
|
||||||
|
hostname is passed to ssh, so it will recognize any
|
||||||
|
aliases and settings you may have configured in
|
||||||
|
~/.ssh/config.
|
||||||
|
|
||||||
.. option:: -x <subnet>, --exclude=<subnet>
|
.. option:: -x <subnet>, --exclude=<subnet>
|
||||||
|
|
||||||
@ -305,11 +309,8 @@ Arguments read from a file must be one per line, as shown below::
|
|||||||
--option2
|
--option2
|
||||||
value2
|
value2
|
||||||
|
|
||||||
Comments in config file
|
The configuration file supports comments for human-readable
|
||||||
.......................
|
annotations. For example::
|
||||||
|
|
||||||
It's possible to add comments in the configuration file. This allows annotating the
|
|
||||||
various subnets with human-readable descriptions, like::
|
|
||||||
|
|
||||||
# company-internal API
|
# company-internal API
|
||||||
8.8.8.8/32
|
8.8.8.8/32
|
||||||
@ -319,51 +320,96 @@ various subnets with human-readable descriptions, like::
|
|||||||
|
|
||||||
Examples
|
Examples
|
||||||
--------
|
--------
|
||||||
Test locally by proxying all local connections, without using ssh::
|
|
||||||
|
|
||||||
$ sshuttle -v 0/0
|
Use the following command to route all IPv4 TCP traffic through remote
|
||||||
|
(-r) host example.com (and possibly other traffic too, depending on
|
||||||
|
the selected --method). The 0/0 subnet, short for 0.0.0.0/0, matches
|
||||||
|
all IPv4 addresses. The ::/0 subnet, matching all IPv6 addresses could
|
||||||
|
be added to the example. We also exclude (-x) example.com:22 so that
|
||||||
|
we can establish ssh connections from our local machine to the remote
|
||||||
|
host without them being routed through sshuttle. Excluding the remote
|
||||||
|
host may be necessary on some machines for sshuttle to work properly.
|
||||||
|
Press Ctrl+C to exit. To also route DNS queries through sshuttle, try
|
||||||
|
adding --dns. Add or remove -v options to see more or less
|
||||||
|
information::
|
||||||
|
|
||||||
Starting sshuttle proxy.
|
$ sshuttle -r example.com -x example.com:22 0/0
|
||||||
Listening on ('0.0.0.0', 12300).
|
|
||||||
|
Starting sshuttle proxy (version ...).
|
||||||
[local sudo] Password:
|
[local sudo] Password:
|
||||||
firewall manager ready.
|
fw: Starting firewall with Python version 3.9.5
|
||||||
c : connecting to server...
|
fw: ready method name nat.
|
||||||
s: available routes:
|
c : IPv6 disabled since it isn't supported by method nat.
|
||||||
s: 192.168.42.0/24
|
c : Method: nat
|
||||||
c : connected.
|
c : IPv4: on
|
||||||
firewall manager: starting transproxy.
|
c : IPv6: off (not available with nat method)
|
||||||
c : Accept: 192.168.42.106:50035 -> 192.168.42.121:139.
|
c : UDP : off (not available with nat method)
|
||||||
c : Accept: 192.168.42.121:47523 -> 77.141.99.22:443.
|
c : DNS : off (available)
|
||||||
...etc...
|
c : User: off (available)
|
||||||
|
c : Subnets to forward through remote host (type, IP, cidr mask width, startPort, endPort):
|
||||||
|
c : (<AddressFamily.AF_INET: 2>, '0.0.0.0', 0, 0, 0)
|
||||||
|
c : Subnets to exclude from forwarding:
|
||||||
|
c : (<AddressFamily.AF_INET: 2>, '...', 32, 22, 22)
|
||||||
|
c : (<AddressFamily.AF_INET: 2>, '127.0.0.1', 32, 0, 0)
|
||||||
|
c : TCP redirector listening on ('127.0.0.1', 12299).
|
||||||
|
c : Starting client with Python version 3.9.5
|
||||||
|
c : Connecting to server...
|
||||||
|
user@example.com's password:
|
||||||
|
s: Starting server with Python version 3.6.8
|
||||||
|
s: latency control setting = True
|
||||||
|
s: auto-nets:False
|
||||||
|
c : Connected to server.
|
||||||
|
fw: setting up.
|
||||||
|
fw: iptables -w -t nat -N sshuttle-12299
|
||||||
|
fw: iptables -w -t nat -F sshuttle-12299
|
||||||
|
...
|
||||||
|
Accept: 192.168.42.121:60554 -> 77.141.99.22:22.
|
||||||
^C
|
^C
|
||||||
firewall manager: undoing changes.
|
|
||||||
KeyboardInterrupt
|
|
||||||
c : Keyboard interrupt: exiting.
|
c : Keyboard interrupt: exiting.
|
||||||
c : SW#8:192.168.42.121:47523: deleting
|
c : SW'unknown':Mux#1: deleting (1 remain)
|
||||||
c : SW#6:192.168.42.106:50035: deleting
|
c : SW#7:192.168.42.121:60554: deleting (0 remain)
|
||||||
|
|
||||||
Test connection to a remote server, with automatic hostname
|
|
||||||
|
Connect to a remote server, with automatic hostname
|
||||||
and subnet guessing::
|
and subnet guessing::
|
||||||
|
|
||||||
$ sshuttle -vNHr example.org
|
$ sshuttle -vNHr example.com -x example.com:22
|
||||||
|
Starting sshuttle proxy (version ...).
|
||||||
Starting sshuttle proxy.
|
[local sudo] Password:
|
||||||
Listening on ('0.0.0.0', 12300).
|
fw: Starting firewall with Python version 3.9.5
|
||||||
firewall manager ready.
|
fw: ready method name nat.
|
||||||
c : connecting to server...
|
c : IPv6 disabled since it isn't supported by method nat.
|
||||||
|
c : Method: nat
|
||||||
|
c : IPv4: on
|
||||||
|
c : IPv6: off (not available with nat method)
|
||||||
|
c : UDP : off (not available with nat method)
|
||||||
|
c : DNS : off (available)
|
||||||
|
c : User: off (available)
|
||||||
|
c : Subnets to forward through remote host (type, IP, cidr mask width, startPort, endPort):
|
||||||
|
c : NOTE: Additional subnets to forward may be added below by --auto-nets.
|
||||||
|
c : Subnets to exclude from forwarding:
|
||||||
|
c : (<AddressFamily.AF_INET: 2>, '...', 32, 22, 22)
|
||||||
|
c : (<AddressFamily.AF_INET: 2>, '127.0.0.1', 32, 0, 0)
|
||||||
|
c : TCP redirector listening on ('127.0.0.1', 12300).
|
||||||
|
c : Starting client with Python version 3.9.5
|
||||||
|
c : Connecting to server...
|
||||||
|
user@example.com's password:
|
||||||
|
s: Starting server with Python version 3.6.8
|
||||||
|
s: latency control setting = True
|
||||||
|
s: auto-nets:True
|
||||||
|
c : Connected to server.
|
||||||
|
c : seed_hosts: []
|
||||||
s: available routes:
|
s: available routes:
|
||||||
s: 77.141.99.0/24
|
s: 77.141.99.0/24
|
||||||
c : connected.
|
fw: setting up.
|
||||||
c : seed_hosts: []
|
fw: iptables -w -t nat -N sshuttle-12300
|
||||||
firewall manager: starting transproxy.
|
fw: iptables -w -t nat -F sshuttle-12300
|
||||||
hostwatch: Found: testbox1: 1.2.3.4
|
...
|
||||||
hostwatch: Found: mytest2: 5.6.7.8
|
|
||||||
hostwatch: Found: domaincontroller: 99.1.2.3
|
|
||||||
c : Accept: 192.168.42.121:60554 -> 77.141.99.22:22.
|
c : Accept: 192.168.42.121:60554 -> 77.141.99.22:22.
|
||||||
^C
|
^C
|
||||||
firewall manager: undoing changes.
|
|
||||||
c : Keyboard interrupt: exiting.
|
c : Keyboard interrupt: exiting.
|
||||||
c : SW#6:192.168.42.121:60554: deleting
|
c : SW'unknown':Mux#1: deleting (1 remain)
|
||||||
|
c : SW#7:192.168.42.121:60554: deleting (0 remain)
|
||||||
|
|
||||||
Run :program:`sshuttle` with a `/etc/sshuttle.conf` configuration file::
|
Run :program:`sshuttle` with a `/etc/sshuttle.conf` configuration file::
|
||||||
|
|
||||||
|
@ -11,6 +11,10 @@ Forward all traffic::
|
|||||||
sshuttle -r username@sshserver 0.0.0.0/0
|
sshuttle -r username@sshserver 0.0.0.0/0
|
||||||
|
|
||||||
- Use the :option:`sshuttle -r` parameter to specify a remote server.
|
- Use the :option:`sshuttle -r` parameter to specify a remote server.
|
||||||
|
One some systems, you may also need to use the :option:`sshuttle -x`
|
||||||
|
parameter to exclude sshserver or sshserver:22 so that your local
|
||||||
|
machine can communicate directly to sshserver without it being
|
||||||
|
redirected by sshuttle.
|
||||||
|
|
||||||
- By default sshuttle will automatically choose a method to use. Override with
|
- By default sshuttle will automatically choose a method to use. Override with
|
||||||
the :option:`sshuttle --method` parameter.
|
the :option:`sshuttle --method` parameter.
|
||||||
|
@ -201,7 +201,7 @@ class FirewallClient:
|
|||||||
|
|
||||||
def __init__(self, method_name, sudo_pythonpath, ttl):
|
def __init__(self, method_name, sudo_pythonpath, ttl):
|
||||||
self.auto_nets = []
|
self.auto_nets = []
|
||||||
python_path = os.path.dirname(os.path.dirname(__file__))
|
|
||||||
argvbase = ([sys.executable, sys.argv[0]] +
|
argvbase = ([sys.executable, sys.argv[0]] +
|
||||||
['-v'] * (helpers.verbose or 0) +
|
['-v'] * (helpers.verbose or 0) +
|
||||||
['--method', method_name] +
|
['--method', method_name] +
|
||||||
@ -224,7 +224,8 @@ class FirewallClient:
|
|||||||
|
|
||||||
if sudo_pythonpath:
|
if sudo_pythonpath:
|
||||||
elev_prefix += ['/usr/bin/env',
|
elev_prefix += ['/usr/bin/env',
|
||||||
'PYTHONPATH=%s' % python_path]
|
'PYTHONPATH=%s' %
|
||||||
|
os.path.dirname(os.path.dirname(__file__))]
|
||||||
argv_tries = [elev_prefix + argvbase, argvbase]
|
argv_tries = [elev_prefix + argvbase, argvbase]
|
||||||
|
|
||||||
# we can't use stdin/stdout=subprocess.PIPE here, as we normally would,
|
# we can't use stdin/stdout=subprocess.PIPE here, as we normally would,
|
||||||
|
@ -20,7 +20,7 @@ def main():
|
|||||||
return 1
|
return 1
|
||||||
|
|
||||||
if not opt.sudoers_filename:
|
if not opt.sudoers_filename:
|
||||||
log('--sudoers-file must be set or omited.')
|
log('--sudoers-file must be set or omitted.')
|
||||||
return 1
|
return 1
|
||||||
|
|
||||||
sudoers(
|
sudoers(
|
||||||
|
@ -132,6 +132,7 @@ def parse_ipport(s):
|
|||||||
|
|
||||||
|
|
||||||
def parse_list(lst):
|
def parse_list(lst):
|
||||||
|
"""Parse a comma separated string into a list."""
|
||||||
return re.split(r'[\s,]+', lst.strip()) if lst else []
|
return re.split(r'[\s,]+', lst.strip()) if lst else []
|
||||||
|
|
||||||
|
|
||||||
@ -219,7 +220,7 @@ parser.add_argument(
|
|||||||
default=[],
|
default=[],
|
||||||
type=parse_list,
|
type=parse_list,
|
||||||
help="""
|
help="""
|
||||||
capture and forward DNS requests made to the following servers
|
capture and forward DNS requests made to the following servers (comma separated)
|
||||||
"""
|
"""
|
||||||
)
|
)
|
||||||
parser.add_argument(
|
parser.add_argument(
|
||||||
@ -280,7 +281,7 @@ parser.add_argument(
|
|||||||
action="count",
|
action="count",
|
||||||
default=0,
|
default=0,
|
||||||
help="""
|
help="""
|
||||||
increase debug message verbosity
|
increase debug message verbosity (can be used more than once)
|
||||||
"""
|
"""
|
||||||
)
|
)
|
||||||
parser.add_argument(
|
parser.add_argument(
|
||||||
|
Loading…
Reference in New Issue
Block a user