the-bastion
sshportal
the-bastion | sshportal | |
---|---|---|
5 | 7 | |
1,424 | 1,688 | |
2.0% | - | |
8.7 | 1.0 | |
15 days ago | 5 days ago | |
Perl | Go | |
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
the-bastion
-
SSH With SSO
My company developed its own open source solution for that: https://github.com/ovh/the-bastion
-
Best jumphost software?
GitHub: https://ovh.github.io/the-bastion/
-
Internet access control and logging for each user on a multiuser remote access linux server
You can setup something like The Bastion https://github.com/ovh/the-bastion on some intermediate host. And your untrusted users will be connecting through it to your server. You will have their full tty session logged.
- Show HN: Automatic proxy setup for SSH'able boxes that have no network access
-
OVH NetSec Setup
I don’t know if that would fall into what you’re looking for: https://github.com/ovh/the-bastion
sshportal
-
🥇 The ultimate kubernetes homelab setup
sshportal (https://github.com/moul/sshportal) is in my mind, a ssh gateway. It's a little cumbersome to setup but it accomplishes routing ssh the way we'll want within a kubernetes cluster with replication.
-
Searching for a ssh program that syncs the clients
Or use a jump host as an intermediary. Or use https://github.com/moul/sshportal
-
What VPN services are you using?
Adding this as a possible tool to use in a jump host scenario: https://github.com/moul/sshportal
- SSHPortal - Jump host/Jump server without the jump, aka Transparent SSH bastion
-
Do I need an SSH jump server?
I use SSHPortal as a jump server, mostly for the fact that I can have one entrypoint/key into my servers without needing to remember hostnames or IP addresses. It also allows me to federate access for others who need it either on a temporary or more permanent basis. For cloud hosts where external firewalls (not on the machine) are present, we can lock SSH down to only the jump host.
-
Team based SSH clients
Just leave it here sshportal
-
SSH reverse proxy
Check out sshportal, it's a tool to multiplex access to lots of other little SSH servers (which could be running in containers on your machine): https://github.com/moul/sshportal This is commonly called a 'bastion host' if you're googling around for more related stuff. There's a lot of other interesting SSH-related stuff in this list too: https://github.com/moul/awesome-ssh
What are some alternatives?
Gravitational Teleport - The easiest, and most secure way to access and protect all of your infrastructure.
leapp - Leapp is the DevTool to access your cloud
bless - Repository for BLESS, an SSH Certificate Authority that runs as a AWS Lambda function
fwknop - Single Packet Authorization > Port Knocking
teleport - Virtual KVM for macOS
postgresqltuner - Simple script to analyse your PostgreSQL database configuration, and give tuning advice
teleport - A WebXR teleport for three.js
Cluster SSH - Cluster SSH - Cluster Admin Via SSH
ssh - Easy SSH servers in Golang
warpgate - Smart SSH, HTTPS and MySQL bastion that requires no additional client-side software
rospo - 🐸 Simple, reliable, persistent ssh tunnels with embedded ssh server