-
Notifications
You must be signed in to change notification settings - Fork 9
Bastion (jump host) support? #31
Comments
I could attempt to support it, but I don't have a setup like that readily available to test against. (I also have other things I'd rather spend me free time on than this extension at the moment.) I'll gladly accept a PR for it though. I did find a library for parsing ssh_config, though I didn't find anything that would automatically make ssh2 honor ssh_config. I'll make another issue to see if I can at least read the settings I do support from it though. |
I'm unlikely to get to it either, because of other obligations. I'll point out that you don't really need a bastion set up to test. It's basically hopping from any host with an sshd to another host with an sshd running. Even two ports on the same machine. |
Hi! Thanks for the excellent extension. It made my life a lot easier. Would you like to restart work on this issue/associated PR. I have a setup that can be used for testing; and having this (proxy jump capability) would be great :) |
Have you tested whether jump hosts work with the official x11 forwarding support yet? Since Microsoft added support for SSH forwarding to their Remote SSH extension, I do not plan to do any more work on the SSH part of this extension. |
It worked, our company switched to 2-factor and broke any chance of this
working the day after I submitted a PR, lol. But for a traditional
situation I think the PR comments were valid and this shouldn't be far from
a valid solution.
…On Thu, May 13, 2021, 20:10 Joel Spadin ***@***.***> wrote:
Have you tested whether jump hosts work with the official x11 forwarding
support yet?
Since Microsoft added support for SSH forwarding to their Remote SSH
extension
<https://github.com/microsoft/vscode-docs/blob/main/remote-release-notes/v1_54.md#ssh>,
I do not plan to do any more work on the SSH part of this extension.
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#31 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AA6W5LTBV77TM6BBAK3EFKTTNRS5TANCNFSM4RSYUSWQ>
.
|
I have a remote setup with an intervening bastion machine, a.k.a., a "jump host". I use a ProxyCommand in my ssh_config file to allow the Remote (SSH) extension to sail right through. But of course, the ssh2 process being launched by remote-x11 does not take its cues from the ssh_config file and the connection to the target machine fails, even with a manually specified host. That host is just not accessible without going through the bastion machine.
Any chance you can support bastion hosts? They're not that uncommon. ssh2 does have a connection hopping solution here: mscdex/ssh2#764. Also consider the https://github.com/Stocard/node-ssh-forward library that wraps the ssh2 jump host functionality reasonably neatly.
The text was updated successfully, but these errors were encountered: