-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Supporting ProxyJump / -J use cases #2
Comments
This would be very cool and worth supporting. I'll spend the afternoon pondering how we could go about implementing it. A few scattered thoughts / questions in no particular order:
Understanding the different ways people might want to use this functionality will help inform how we might need to implement it. |
After suggesting you reduce the security surface area of You cooooould make the proxy connection in |
Rethinking the problem: do we want to support We could do something like looking for an EC2 instance in the same account/region/VPC with the tag This solution would mean that users wouldn't need to know the ID of the jump host EC2 instance. 🤔 EDIT: I suppose you don't want to use the jump host when you have direct connectivity.. |
Another thought… what about jumphosts for which both the proxy and target require key upload? (For example, I connect this way when not on my office network.)
To make matters more challenging, the OpenSSH 7.9p1 man page section for
ProxyJump
states:Plus, there's no token for the jump host name, not even in OpenSSH 8.0.
The text was updated successfully, but these errors were encountered: