# NO VPN? NO PROBLEM! USING SSH TUNNELS FOR REMOTE ACCESS TO CLOSED NETWORKS 

## Rationale

Corporate and academic networks are closed by design, with routers
and firewalls forwarding and filtering content going to and from
the wider internet.  For security reasons this is an absolute
necessity, as the guardkeeping prevents unwanted incoming connections
to the networked devices.

However, it is often necessary to connect to internal devices or
services from the outside.  This could be the case if an employee
needs to access a shared database on the company network, or a
subscription website only allows full access from a certain range
of IP addresses.  Network administrators usually offer virtual
private network (VPN) access to achieve such goals.  Unfortunately,
VPN access occasionally requires particular software that may not
work on all operating systems.  In other cases, the network
administrators may enforce strict requirements to the remote systems
before allowing VPN access.

  ###### Closed Network ######
  #                          #
  #  +----------+      +----------+             +----------+
  #  |  Office  |      | Router/  |      ?      | Outside  |
  #  | Computer |<~~~~>| Firewall |    ?   ?    | Computer |
  #  +----------+      +----------+             +----------+
  #                          #
  ############################

So what do you do if you need outside access to a network, have no
administrative rights over the router and firewall, and cannot (or
don't want to) access via VPN?  Fortunately, OpenSSH, the widely
used secure shell (SSH) implementation, offers simple and secure
solutions to this problem.  Almost all Linux/BSD/UNIX/MacOS systems
come with OpenSSH preinstalled, so you might already have it on
your system.

If you can access the closed network from the outside via SSH, this
makes things straightforward as described in Scenario 1 below.  If
not, see Scenario 2.


## Scenario 1: SSH access available from the outside

Some networks are configured to allow outsiders to connect to an
internal SSH server through port forwarding on the network router:

  ###### Closed Network ######
  #                          #
  #  +----------+      +----------+      +----------+
  #  |  Office  |  SSH | Router/  |  SSH | Outside  |
  #  | Computer |<~~~~~| Firewall |<~~~~~| Computer |
  #  +----------+      +----------+      +----------+
  #                          #
  ############################

For the purposes described here, this is an ideal situation since
it is easy to create a tunnel that connects the outside computer
with the internal network via SSH.  The following command creates
the tunnel when executed on the outside computer:

    $ ssh -D 1337 -C -N company-domain.com

Note that the port number specified with the -D option should be
greater than 1000 when running as an unpriviledged (non-root) user.
The -C option turns on compression, which is useful for slow network
connections at the cost of little CPU overhead.

With the SSH tunnel in place, you can make most webbrowsers and
other network programs on the outside computer use the tunnel for
all their network traffic by pointing them to the SOCKSv5 proxy
"socks://localhost:1337".  This allows access from programs on the
outside computer to any device within the closed network.  Connections
to the wider internet utilizing the tunnel will originate from an
IP address associated with the closed network, achieving the
objectives stated above.


## Scenario 2: SSH access unavailable from the outside

Unfortunately, outside SSH access to corporate networks is becoming
increasingly rare.  However, the OpenSSH toolset again offers a
solution if you have a persistent SSH server outside of the network
at your disposal:

  ###### Closed Network ######
  #                          #
  #  +----------+      +----------+      +---------+      +---------+
  #  |  Office  |  SSH | Router/  |  SSH | Outside |  SSH | Outside |
  #  | Computer |<~~~~>| Firewall |<~~~~>| Server  |<~~~~~| Laptop  |
  #  +----------+      +----------+      +---------+      +---------+
  #                          #
  ############################

As long as you can initiate *outgoing* SSH connections from inside
the closed network to your outside SSH server, you can create a
reverse ssh tunnel and utilize it in a similar manner as in the
previous scenario.  On the office computer, create a reverse tunnel
to the outside server:

    $ ssh -f -N -R 10022:localhost:22 outside-server.com

As long as the above command runs, you can initiate new SSH connections
from the outside server to the office computer with the command
`ssh -p 10022 localhost`.  If you're working from an outside laptop,
you can utilize this reverse tunnel to connect to the office computer
and network.  Add the following configuration to `~/.ssh/config`
on the outside laptop:

    Host office_computer
        ProxyCommand ssh -q outside-server.com nc localhost 10022

With the above configuration, it is very easy to establish a SSH
connection from the outside laptop to the office computer:

    $ ssh office_computer

As in the previous example, you can use this setup to create a SSH
tunnel all the way from the outside laptop to the office computer:

    $ ssh -D 1337 -C -N office_computer

Again, this creates a SOCKSv5 proxy that you can use for tunneling
network traffic from the outside laptop to the closed network.  It
is useful to automatically monitor the tunnel status using pgrep(1),
and reinitialize it if the ssh command unexpectedly quits.


References:

- OpenSSH: https://www.openssh.com/
- ssh(1) manual page: https://man.openbsd.org/ssh
- gramscii(1), used for drawings in this post: git://bitreich.org/gramscii

Thanks to KatolaZ for feedback on this post.