packages/net/sshtunnel/files/uci_sshtunnel
Sergey Ponomarev 28e8daf726 sshtunnel: simplify command composition
Remove append_params and use shell expressions instead e.g. ${port:+-p $port}.

Note that we can't do that with ProxyCommand because it has to be quoted.

The order of options was changed from more important like hostname to just static -nN.

The CompressionLevel option is removed from SSH2.

Signed-off-by: Sergey Ponomarev <stokito@gmail.com>
2023-12-27 17:31:33 +00:00

60 lines
2 KiB
Text

# Password auth is not possible so only Public Key auth must be used.
# Set "option IdentityFile" to the file from which the identity (private key) is read.
# By default the OpenSSH client checks for /root/.ssh/id_rsa, /root/.ssh/id_ed25519 and /root/.ssh/id_ecdsa
# See https://openwrt.org/docs/guide-user/services/ssh/sshtunnel
#config server example
# option user root
# option hostname server.example.com
# option port 22
# option retrydelay 1
# option CheckHostIP yes
# option Compression no
# option IdentityFile /root/.ssh/id_rsa
# option LogLevel INFO
# option PKCS11Provider /lib/pteidpkcs11.so
# option ServerAliveCountMax 3
# option ServerAliveInterval 0
# option StrictHostKeyChecking accept-new
# option TCPKeepAlive yes
# option VerifyHostKeyDNS yes
# tunnelR(emote) - when the connection will be initiated to the R(emote) endpoint at
# remoteaddress:remoteport and then forwarded to localaddress:localport
#
#config tunnelR http
# option server example
# option remoteaddress *
# option remoteport 9009
# option localaddress 192.168.1.13
# option localport 80
# tunnelL(ocal) - when the connection will be initiated to the L(ocal) endpoint at
# localaddress:localport and then forwarded to remoteaddress:remoteport
#
#config tunnelL test
# option server example
# option localaddress *
# option localport 1022
# option remoteaddress secretserver.example.com
# option remoteport 22
# tunnelD(ynamic) - when the connection will be initiated with the SOCKS4 or SOCKS5 protocol
# to the local endpoint at localaddress:localport and then forwarded over the remote host
#
#config tunnelD proxy
# option server example
# option localaddress *
# option localport 4055
# tunnelW - creates TUN/TAP devices on client and server to establish a VPN tunnel between them
# vpntypes:
# point-to-point = TUN
# ethernet = TAP
#
#config tunnelW proxy
# option server example
# option vpntype point-to-point|ethernet
# option localdev any|0|1|2|...
# option remotedev any|0|1|2|...