X-Original-To: alpine-devel@lists.alpinelinux.org Delivered-To: alpine-devel@mail.alpinelinux.org Received: from jeremythomerson.com (unknown [74.117.189.39]) by mail.alpinelinux.org (Postfix) with ESMTP id 1AB051AA20B6 for ; Sun, 16 Oct 2011 01:13:45 +0000 (UTC) Received: from mail-vw0-f54.google.com (mail-vw0-f54.google.com [209.85.212.54]) by jeremythomerson.com (Postfix) with ESMTP id 7B5C41C828 for ; Sat, 15 Oct 2011 20:23:04 -0500 (CDT) Received: by vws11 with SMTP id 11so2496506vws.13 for ; Sat, 15 Oct 2011 18:13:43 -0700 (PDT) Received: by 10.52.175.165 with SMTP id cb5mr5198698vdc.47.1318727623077; Sat, 15 Oct 2011 18:13:43 -0700 (PDT) X-Mailinglist: alpine-devel Precedence: list List-Id: Alpine Development List-Unsubscribe: List-Post: List-Help: List-Subscribe: MIME-Version: 1.0 Reply-To: jeremy@thomersonfamily.com Received: by 10.220.192.194 with HTTP; Sat, 15 Oct 2011 18:13:23 -0700 (PDT) From: Jeremy Thomerson Date: Sat, 15 Oct 2011 21:13:23 -0400 Message-ID: Subject: [alpine-devel] autossh / SSH Persistent Tunnel To: Alpine-devel Content-Type: multipart/alternative; boundary=bcaec51a8ec687710204af6033a9 --bcaec51a8ec687710204af6033a9 Content-Type: text/plain; charset=ISO-8859-1 Has anyone on this list tried using autossh [1] to keep a persistent SSH tunnel going? Or do you have a different / better approach to this or the following scenarios? Scenario 1: Where I live my router doesn't have access to a public IP - so I can't use openvpn like I used to for VPN connection to home. But, I need to have remote access to my file server at home, which is behind my router (NAT) which is behind another router for our building's network (also NAT). I would like my home (Alpine) file server (or possibly my Alpine router) to keep a persisten ssh connection to a remote (public) server that I have. Then when I'm remote I could ssh to my home file server (or router) through that public server. I suppose I might even be able to port forward OpenVPN (or similar... suggestions?) ports through this SSH tunnel so that I could connect vpn to the public server, which is really forwarding that traffic back to my home network.. giving me access to SMB file systems and printing remotely like I used to have. Scenario 2: I'm migrating an application from a single server to multiple servers soon for a friend. One server will be a web application server. The other will do background processing of files, reporting, etc. So, between the two I need: shared file system access, MySQL replication, and a connectivity between a couple other ports like ActiveMQ, etc. ActiveMQ could probably just be a firewall rule that only allows traffic between ServerA and ServerB. But for MySQL replication (and MySQL client access on port 3306) I'll want a secure tunnel. I don't want those ports open on the firewall at all. For the file mount between servers I was thinking of using sshfs. So, I'll need to at least set up a port forwarding tunnel for MySQL replication and client access. Do you have suggestions? AutoSSH? Other? Also, I don't have any real-world experience with sshfs. Any suggestions there? (These boxes will unfortunately not be Alpine, but all the ones in Scenario 1 above are Alpine boxes). [1] http://www.harding.motd.ca/autossh/ Many Thanks! Jeremy Thomerson --bcaec51a8ec687710204af6033a9 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Has anyone on this list tried using autossh [1] to keep a persistent SSH tu= nnel going? =A0Or do you have a different / better approach to this or the = following scenarios?

Scenario 1:
Where I live = my router doesn't have access to a public IP - so I can't use openv= pn like I used to for VPN connection to home. =A0But, I need to have remote= access to my file server at home, which is behind my router (NAT) which is= behind another router for our building's network (also NAT). =A0I woul= d like my home (Alpine) file server (or possibly my Alpine router) to keep = a persisten ssh connection to a remote (public) server that I have. =A0Then= when I'm remote I could ssh to my home file server (or router) through= that public server.

I suppose I might even be able to port forward OpenVPN = (or similar... suggestions?) ports through this SSH tunnel so that I could = connect vpn to the public server, which is really forwarding that traffic b= ack to my home network.. giving me access to SMB file systems and printing = remotely like I used to have.

Scenario 2:
I'm migrating an application = from a single server to multiple servers soon for a friend. =A0One server w= ill be a web application server. =A0The other will do background processing= of files, reporting, etc. =A0So, between the two I need: shared file syste= m access, MySQL replication, and a connectivity between a couple other port= s like ActiveMQ, etc. =A0ActiveMQ could probably just be a firewall rule th= at only allows traffic between ServerA and ServerB. =A0But for MySQL replic= ation (and MySQL client access on port 3306) I'll want a secure tunnel.= =A0I don't want those ports open on the firewall at all. =A0For the fi= le mount between servers I was thinking of using sshfs.

So, I'll need to at least set up a port forwarding = tunnel for MySQL replication and client access. =A0Do you have suggestions?= =A0AutoSSH? =A0Other? =A0Also, I don't have any real-world experience = with sshfs. =A0Any suggestions there? =A0(These boxes will unfortunately no= t be Alpine, but all the ones in Scenario 1 above are Alpine boxes).

Ma= ny Thanks!
Jeremy Thomerson
--bcaec51a8ec687710204af6033a9-- --- Unsubscribe: alpine-devel+unsubscribe@lists.alpinelinux.org Help: alpine-devel+help@lists.alpinelinux.org ---