At Repetitive IT we often use hybrid technologies to get POC out of the door and these resources are often a mix of Cloud/SaaS/Old Laptops/Raspberry PIs.
To get all of them in communication and to make all the automations work properly, we make abbundant use of reverse ssh tunnel connection locally as well as remotely.
Before Systemd we used and appreciated Djb Daemontools to keep the services running and restarting in case of malfunction, at today we integrate all in systemd with an easy to use script.
Before going forward you may need to verify that you have all the firewall rules in place and the correct private key to connect to your server, this is not part of this article but you may find some help here connect-to-an-ssh-server-without-password.
Once you are able to connect from your client to the remote server without using the password, you can then set up a new service in systemd to restart the connection in case it will drop for any given reason, and to make sure it is started at boot time.
1 – Create a service for each reverse tunnel you want to set up, and give it a meaningful name.
# touch /etc/systemd/system/reversetunnel.servername.service
This is a ‘Systemd Object’, a service in this case, as it will be used to start/stop/restart/reload a specific daemon or service like Apache or like in this case an ssh reverse tunnel.
We also need to make sure, Systemd understands the nature of the object and that’s why it is important to append ‘.service’ at the end of the name
2 – open the file with your favourite text editor and copy paste the following
[Unit] Description=Describe what this service is for After=network.target [Service] Type=simple ExecStart=/usr/bin/ssh -g -N -T -o VerifyHostKeyDNS=no -o "ServerAliveInterval 10" -o StrictHostKeyChecking=no -o "ExitOnForwardFailure yes" -R 8090:localhost:8080 user@remoteserver -i /full/path/to/your/private/key Restart=always RestartSec=5s [Install] WantedBy=default.target
Let’s also explain it a bit
Description=Describe what this service is for
This line is to describe the service in a few words like Reverse SSH to server XWZ.com
This it is kind of a dependency, it means ‘start this service once the network.target is up and running and just to give you a complete piece of information a Target for Systemd is a group of resources
This is an indication for Systemd to consider the process successfully started once the main process is forked off
ExecStart=/usr/bin/ssh -g -N -T -o VerifyHostKeyDNS=no -o “ServerAliveInterval 10” -o StrictHostKeyChecking=no -o “ExitOnForwardFailure yes” -R 8090:localhost:8080 user@remoteserver -i /full/path/to/your/private/key
This is the actual command to start the reverse proxy, we are executing an ssh client against a server so let’s check out what are the options used on our command:
- /usr/bin/ssh is our executable
- -g Allows remote hosts to connect to local forwarded ports.
- -N Do not execute a remote command.
- -T Disable pseudo-terminal allocation
- -o Is a way to pass options to the ssh connection overriding the local ssh_config file
- -o VerifyHostKeyDNS=no Specifies whether to verify the remote key using DNS and SSHFP resource records
- -o StrictHostKeyChecking=no This flag is set to no to prevent the ssh client refusing connecting to the remote host in case there is an issue with the keys stored in the local ~/.ssh/known_hosts file
- -o “ServerAliveInterval 10” Timeout interval before closing the connection if there is no response
- -o “ExitOnForwardFailure yes” Exit with error if you cannot set-up the tunnel, even if the ssh connection is working properly
- -R 8090:localhost:8080 remoteuser@remoteserver Forward to port 8090 of the remote host localhost:8080 connecting with user remoteuser to remoteserver on port 22
- -i /full/path/to/your/private/key Use the private key at this path
There are multiple values for this config parameter, we are just going to use always as we want the reverse tunnel up all the time and if it is not up please retry till it is.
If the service drops wait 5 seconds before restarting it
This line means that this Service is assigned to the Target default, the one which is required by the system startup, it would be the equivalent in systemV of the rc.local in some respect.
3 – Save the file and use systemdctl to enable and start the new service
Don’t forget to tail the system logs to verify the connection is working properly; you will notice that ‘.service’ has disappeared from the end of the file, if everything is set up correctly it does not matter, systemd will understand what you are asking it to do.
# systemctl enable /etc/systemd/system/reversetunnel.servername # systemctl start /etc/systemd/system/reversetunnel.servername
Debug and tests
If all is gone right you should have:
On your local system your service running on port 8080 ( use ‘netstat -ntpl‘ to verify ) and an ssh connection to the remote host ( use ‘netstat -nat‘ and ‘ps xxaawwuuu | grep ssh | grep remoteuser‘ to verify )
On the remote server you should see a localhost service listening on 8090 ( use ‘netstat -ntpl‘ to verify ) and if you try to ‘telnet localhost 8090‘ you should be able to see a response from your local system
Questo articolo ha 2 commenti.
Thank you for this well explained and easy to understand tutorial 🙂
Thanks for the comment!