On Tue, 14 Dec 1999, Atro Tossavainen wrote:

> > I have the following setup:
> > Machine A (which I am on) has access to machine B and the rest of the
> > internal net.
> >
> > Machine B has sshd running on it and has access to the outside world.
> >
> > Machine C I'd like to ssh to.
>
> No tunneling required. Just force tty allocation in the first session:
>
>       A% ssh -t B ssh C
>
> and you're in business.

But that would allow an intruder on B to compromise your session to C. If you use a 
tunnel like so:

A% ssh -o 'ProxyCommand ssh B nc C 22' C

then your session is encrypted and authenticated from A to C. This assumes that you 
have netcat (nc) installed on machine B. Here is one way to do it if you can't install 
something like netcat on B.

A% ssh -f -L2000:C:22 B sleep 12
A% ssh -p 2000 localhost

Amanda.

Reply via email to