SSH tunnels can provide secure connections through insecure or untrusted networks and may also be used to securely route through firewalls.
About This Guide
This guide began as a personal document to help me learn and remember how SSH tunnels work and has been several years incubating. If you find errors or think of additional examples that you believe would be helpful, I’d be delighted to know about them.
Terminology
Throughout this guide we use “SSH” to refer to the SSH protocol or the world of SSH things and use ssh
to refer to the ssh(1)
program itself. “We use ssh
and sshd
to make SSH connections.” The examples in this tutorial are based on OpenSSH 0.9.8 and later.
git-crypt
(
github) keeps your secrets safe in a git repository. It decrypts on checkout and encrypts at commit using standard git
hooks. Once configured, it is completely transparent.
I had a situation where the secrets were already in the repo and I needed to encrypt them (if you’re in this situation, you should also change your secrets because git log -p
).