Skip to content


SSH proxy

  • Create socket proxy via SSH

    ssh -D 8080 -N sshusername@sshserver
  • Configure your browser to socket proxy on localhost:8080

  • Or run chromium via
    chromium-browser --temp-profile --proxy-server="socks5://"

Reverse tunnel

  • Run SSH on target machine (behind NAT)
  • Create tunnel to forwarding server

    ssh -R 5022:localhost:22 forwardinguser@forwardingserver
  • Connect to the forwarding server

    ssh youruser@forwardingserver
  • Connect to the target machine via the reverse tunnel (on forwarding server)

    ssh localuser@localost -p 5022


- <>
- <>

SSH server without passwords

  • Install ssh server

    sudo apt install openssh-server
  • Put your public keys into $HOME/.ssh/authorized_keys

  • Open /etc/ssh/sshd_config with your favourite editor
  • Find a line with PermitRootLogin and change it to

    PermitRootLogin no
  • Find a line with PasswordAuthentication and change it to

    PasswordAuthentication no
  • Restart SSH server

    sudo systemctl restart sshd.service