@@ -47,7 +47,7 @@ entire subnet to the VPN.
47
47
not from outside machines. If you want to accept
48
48
connections from other machines on your network (ie. to
49
49
run sshuttle on a router) try enabling IP Forwarding in
50
- your kernel, then using ` --listen 0.0.0.0:0 ` .
50
+ your kernel, then using ` --listen 0.0.0.0:0 ` .
51
51
52
52
-H, --auto-hosts
53
53
: scan for remote hostnames and update the local /etc/hosts
@@ -63,26 +63,26 @@ entire subnet to the VPN.
63
63
all running copies. Third, if you're only routing a
64
64
few subnets over the VPN, you probably would prefer to
65
65
keep using your local DNS server for everything else.
66
-
66
+
67
67
-N, --auto-nets
68
68
: in addition to the subnets provided on the command
69
69
line, ask the server which subnets it thinks we should
70
70
route, and route those automatically. The suggestions
71
71
are taken automatically from the server's routing
72
72
table.
73
-
73
+
74
74
--dns
75
75
: capture local DNS requests and forward to the remote DNS
76
76
server.
77
-
77
+
78
78
--python
79
- : specify the name/path of the remote python interpreter.
79
+ : specify the name/path of the remote python interpreter.
80
80
The default is just ` python ` , which means to use the
81
81
default python interpreter on the remote system's PATH.
82
82
83
83
-r, --remote=* [ username@] sshserver[ : port ] *
84
84
: the remote hostname and optional username and ssh
85
- port number to use for connecting to the remote server.
85
+ port number to use for connecting to the remote server.
86
86
For example, example.com,
[email protected] ,
87
87
[email protected] :2222, or example.com:2244.
88
88
@@ -102,7 +102,7 @@ entire subnet to the VPN.
102
102
: print more information about the session. This option
103
103
can be used more than once for increased verbosity. By
104
104
default, sshuttle prints only error messages.
105
-
105
+
106
106
-e, --ssh-cmd
107
107
: the command to use to connect to the remote server. The
108
108
default is just ` ssh ` . Use this if your ssh client is
@@ -111,12 +111,12 @@ entire subnet to the VPN.
111
111
112
112
--seed-hosts
113
113
: a comma-separated list of hostnames to use to
114
- initialize the ` --auto-hosts ` scan algorithm.
114
+ initialize the ` --auto-hosts ` scan algorithm.
115
115
` --auto-hosts ` does things like poll local SMB servers
116
116
for lists of local hostnames, but can speed things up
117
117
if you use this option to give it a few names to start
118
118
from.
119
-
119
+
120
120
--no-latency-control
121
121
: sacrifice latency to improve bandwidth benchmarks. ssh
122
122
uses really big socket buffers, which can overload the
@@ -132,16 +132,16 @@ entire subnet to the VPN.
132
132
trying to control). This option disables the latency
133
133
control feature, maximizing bandwidth usage. Use at
134
134
your own risk.
135
-
135
+
136
136
-D, --daemon
137
137
: automatically fork into the background after connecting
138
138
to the remote server. Implies ` --syslog ` .
139
-
139
+
140
140
--syslog
141
141
: after connecting, send all log messages to the
142
142
` syslog ` (3) service instead of stderr. This is
143
143
implicit if you use ` --daemon ` .
144
-
144
+
145
145
--pidfile=* pidfilename*
146
146
: when using ` --daemon ` , save sshuttle's pid to
147
147
* pidfilename* . The default is ` sshuttle.pid ` in the
@@ -159,7 +159,7 @@ entire subnet to the VPN.
159
159
automatically run ` sudo ` or ` su ` to start the firewall
160
160
manager, but the core of sshuttle still runs as a
161
161
normal user.
162
-
162
+
163
163
--hostwatch
164
164
: (internal use only) run the hostwatch daemon. This
165
165
process runs on the server side and collects hostnames for
@@ -176,7 +176,7 @@ Test locally by proxying all local connections, without using ssh:
176
176
177
177
Starting sshuttle proxy.
178
178
Listening on ('0.0.0.0', 12300).
179
- [local sudo] Password:
179
+ [local sudo] Password:
180
180
firewall manager ready.
181
181
c : connecting to server...
182
182
s: available routes:
@@ -230,7 +230,7 @@ there. Thus, you don't need to install sshuttle on the
230
230
remote server, and there are never sshuttle version
231
231
conflicts between client and server.
232
232
233
- Unlike most VPNs, sshuttle forwards sessions, not packets.
233
+ Unlike most VPNs, sshuttle forwards sessions, not packets.
234
234
That is, it uses kernel transparent proxying (`iptables
235
235
REDIRECT` rules on Linux, or ` ipfw fwd` rules on BSD) to
236
236
capture outgoing TCP sessions, then creates entirely
@@ -282,4 +282,3 @@ and reboot.
282
282
# SEE ALSO
283
283
284
284
` ssh ` (1), ` python ` (1)
285
-
0 commit comments