4
I am using a linux server on the net and reverse port forwarding to connect to machines behind firewalls.
- From
Remote
I reverse forward Port 22 tosome_port
onMiddle
- From
Home
I ssh intouser@Middle
on portsome_port
Lets say I am careful to compare host keys and fingerprints of Remote
and Home
.
- Can an attacker on
Middle
see my unencrypted traffic? (Well I guess that would be a no) - Can an attacker
on
Middle
Fake the whole thing somehow and let me reveal my secrets? (keys, passphrase, stuff like that) - What it boils down to: How vulnerable is that setup?
Intuitively I would say, that there's not much they can do, since Middle
does not see any unencrypted traffic, but I am still not entirely sure.
yeah. My head hurts, too... these tunnel, reverse tunnel and auth things are never crystal clear to me. – AndreasT – 2011-06-05T22:51:58.067