Determining the reverse port tunnels
Darren Tucker
dtucker at zip.com.au
Wed Apr 22 11:31:46 AEST 2015
On Wed, Apr 22, 2015 at 9:43 AM, Cary FitzHugh <cary.fitzhugh at gmail.com>
wrote:
> Hi all,
>
> If I were to connect to a system with a command like this:
>
> ssh -R *:0:localhost:3000 user at server
>
> Is there any way for openssh to tell my shell what ports it opened for me?
>
> i.e. what port on server is my localhost:3000 exposed to?
>
> I know that there is a stderr / stdout printout of the port, but wonder if
> there is a way to know in my shell. Maybe an env var?
There's no general way to do this: port forwards can be added and deleted
at any time but the environment variables can only be set and shell startup
time.
> Maybe some grepping of netstat?
>
The parent process ID of your shell is the sshd that's listening, so
something like this should work:
lsof -p $PPID | grep LISTEN
or the equivalent with netstat if your platform can map port numbers to
PIDs.
The cleanest solution is probably using a control socket which returns the
port number to the client., something like
ssh -N -MS /tmp/ctl yourserver &
port=`ssh -S /tmp/ctl -O forward -R 0:127.0.0.1:22 yourserver`
ssh -S /tmp/ctl yourserver command --port $port
ssh -S /tmp/ctl -O exit yourserver
--
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69
Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.
More information about the openssh-unix-dev
mailing list