v1.0.0340.0 MB
MIT
strict
core20
Client to start an SSH tunnel
This snap starts an SSH tunnel by running the ssh command as a service.
The service is disabled by default.
Configure and then start the client as described below:
Copy your SSH key(s) to the root user, e.g.:
Connect the ssh-keys interface to access keys and the ssh command:
Set the destination:
Set the destination ssh server port:
Pass arguments to the client:
The above example is for TCP remote forwarding; listening on port 9901 on the
remote server, to tunnel traffic to the client on port 22, on the localhost.
For more details, refer to the OpenSSH client manual: https://man7.org/linux/man-pages/man1/ssh.1.html
Start and enable the service:
Check the logs:
Found issues or need help? Go to: https://github.com/TinyIoT/ssh-tunnel/issues
The service is disabled by default.
Configure and then start the client as described below:
Copy your SSH key(s) to the root user, e.g.:
sudo cp .ssh/id_ed25519* /root/.ssh/Connect the ssh-keys interface to access keys and the ssh command:
sudo snap connect ssh-tunnel-client:ssh-keys :ssh-keysSet the destination:
sudo snap set ssh-tunnel-client destination="user@example.com"Set the destination ssh server port:
sudo snap set ssh-tunnel-client port="8022"Pass arguments to the client:
sudo snap set ssh-tunnel-client args="-R 9901:localhost:22" The above example is for TCP remote forwarding; listening on port 9901 on the
remote server, to tunnel traffic to the client on port 22, on the localhost.
For more details, refer to the OpenSSH client manual: https://man7.org/linux/man-pages/man1/ssh.1.html
Start and enable the service:
sudo snap start --enable ssh-tunnel-clientCheck the logs:
sudo snap logs -f ssh-tunnel-clientFound issues or need help? Go to: https://github.com/TinyIoT/ssh-tunnel/issues
Update History
v1.0.0 (34)13 Dec 2025, 09:47 UTC
26 Feb 2022, 15:55 UTC
10 May 2024, 19:47 UTC
13 Dec 2025, 09:47 UTC