bastion
warpgate
bastion | warpgate | |
---|---|---|
3 | 21 | |
33 | 3,402 | |
- | 3.4% | |
10.0 | 8.1 | |
about 5 years ago | about 2 months ago | |
Go | Rust | |
MIT License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
bastion
-
U.S. Arcteryx Outlet restocked. sort of
REI Arc Pata and more all use same company for recommerce (https://trove.com/) but obvi ARC is the only 1 to axe all the consumer support/protection
-
Warning For Trading Into Patagonia Worn Wear
Classic Worn Wear. Unfortunately (or fortunately) this is not a Patagonia company, rather it is "Trove Recommerce" https://trove.com/. They have a terrible track record for customer service and draconian policies when it comes to managing their websites (and others like ReGear, Levi's, etc...)
-
Warpgate: Smart SSH bastion that works with any SSH client
At a previous role I made something similar [0] in Golang, but used SSH certificates to manage authentication. This had the added benefit of logging the user connection information in each server’s auth.log based on the generated private key and signed (but short lived) certificate used for auth in the session.
I had it so that a user needed to login to the service with their GSuite account every 24H, and each login required 2fa as well. SSH sessions were recorded in asciicast format (which seems to be used here as well) and there was an audit log to track connections. They could be joined in real time and disconnected from a simple admin interface. The ACL system was a pretty basic method of using regex for defining auth rules.
Worked pretty well and helped with compliance audits we were completing at the time. I think the benefits here of being in Rust is definitely performance and memory safety. Granted, The Go implementation was pretty fast and safe as well. Go made it pretty easy to implement due to the SSH implementation in the standard library.
[0] https://github.com/notion/bastion
warpgate
-
SSH With SSO
It's rather for access control with like, 50+ clients. Possibly with access control. I'm currently testing with warpgate
-
Exposer son pod à distance dans Kubernetes ou OpenShift avec Rust …
GitHub - warp-tech/warpgate: Smart SSH, HTTPS and MySQL bastion that needs no client-side software
-
SSH Tunnel Forwarder Recommendations
Do know about https://github.com/warp-tech/warpgate
- Warpgate 0.4 (an SSH/HTTP bastion) now can securely proxy MySQL as well
- Warpgate 0.4 (a Rust SSH/HTTP bastion) now can securely proxy MySQL as well
-
What are you using for Remote Desktop + SSH client?
Warpgate for SSH access to all my hosts in an efficient and secure way. For clients I use Shelly on iOs, as it supports keys and quick commands, and built-in ssh on mac/windows/whatever.
- Looking for ideas on how to create CLI tool to ssh to remote machine and run user-supplied commands
What are some alternatives?
Pomerium - Pomerium is an identity and context-aware reverse proxy for zero-trust access to web applications and services.
russh - Rust SSH client & server library
fcdemo3 - Un exemple d'implémentation du bouton FranceConnect sur le site web d'un fournisseur de services
sso-wall-of-shame - A list of vendors that treat single sign-on as a luxury feature, not a core security requirement.
agent - A small, reliable, and cross-platform gateway to secure your infrastructure using Runops.
nodejs-ex - node.js example
tarssh - A simple SSH tarpit inspired by endlessh
sshportal - :tophat: simple, fun and transparent SSH (and telnet) bastion server
chisel - A fast TCP/UDP tunnel over HTTP
rathole - A lightweight and high-performance reverse proxy for NAT traversal, written in Rust. An alternative to frp and ngrok.
Eugeny