02-05-2021



When you connect to a server via SSH, most of the time you don't provide any port information. And in such cases, your connection goes to the port 22 of the SSH server. You can change the default port from 22 a port number of your choice using the following steps: Open the /etc/ssh/sshdconfig file for editing. You can either change the port number on that machine to 26. Either edit /etc/ssh/sshdconfig & don't forget to restart SSH (service sshd restart) or leave it on 22, but forward port 26 on the router to port 22 on the second machine. Also, don't forget to change any firewall settings on the second machine to allow the connections through.

  1. Windows Openssh Server Change Port
  2. Openssh Server Port Change

I will go through 2 important topics in ssh which is Port Forwarding and connecting to a server via a Jump Server in the middle.

Port forwarding (port mapping)

Openssh Server Port

It simply means redirects a communication request from one address (IPadd) and port number combination to another IPadd and port number.

The main usage of Port Forwarding is to let 2 systems to communicate (through any kind of services) which are usually located in 2 different networks:

  • Private network (protected/masquered network)
  • Public network.

It is a general terms and can be used in ssh, Linux, Network and many other applications. No matter where it is used, port forwarding can be categorized in 3 groups which I will go through them in the context of ssh:

SSH server by default listens to port 22 and you don't have to manually specify the port number on your SSH client if you're connecting to the default port. You'll have to manually specify the port number when you're connecting to non-standard SSH ports using the -p option or by adding the port information in your SSH client's configuration file. To connect to an SSH server, type the following command into the terminal, replacing username with your username on the SSH server and ssh.server.com with the host name or IP address of the SSH server: ssh username@ssh.server.com. This command will connect to the SSH server on port 22, which is the default.

a. Local Port forwarding

It is the most common type of port forwarding which let a client to connect to the destination service (port) over ssh (port 22 by default). So we need to configure our ssh connection in a way that let ssh server in the destination to redirect our data to the specified service(port) there for us. In another word, our expection from ssh server is that he/she redirect the traffics that comes from our clinet (local port) to the destination port (service).

So the main target is following:

Windows Openssh Server Change Port

Make remote resources accessible on your local system as your were in remote location.

Our only advantage is the fact that we use ssh for this purpose since our assumption is that communication over ssh is already possible (firewalls let the ssh traffics to pass through)!

The first and main question that should be asked is following:

The service that we want to access is located at the same server as SSH Server or is located in another server which is accessable from SSH server.

The command is :

ssh -L SourcePort:Something:DestinationPort Username@SSH-server-add

If the service that we want to access is located at the same system as SSH Server, then we must replace Something with localhost (or 127.0.0.1)

ssh -L SourcePort:localhost:DestinationPort Username@SSH-server-add

If the service that we want to access is located at a system other than SSH Server itself, then we must replace Something with the IPadd (name) of that system which is hosting or service:

ssh -L SourcePort:IPadd-Hosting-Service:DestinationPort Username@SSH-server-add

From our clinet side when we want to access the service, will always use following combination:

Openssh Server Port Change

localhost:SourcePort

example:

  • our client is system A
  • The destination System with SSH server is B
  • Another system hosting a service which is accessable from B is C

A -> ip: 192.168.67.X
B -> ip: 40.71.34.X (hosting ssh server)
C -> ip: 40.72.34.Y

ssh connection to server B is possible as can be seen here: Cannot install vmware tools windows 7.

##telnet 40.71.34.X 22
Trying 40.71.34.X…
Connected to 40.71.34.X.
Escape character is ‘^]’.

I want to access to the special service called Splunk in System B through Web which is available on port 8000 but somehow blocked and can not be accesed directly, As can be seen here:

##telnet 40.71.34.X 8000
Trying 40.71.34.X…

So I want to take advantage of Local Port forwarding for this purpose by using following command which “-L” basically tell ssh that we are doing local port forwarding:

#ssh -L 8888:localhost:8000 hrouhani@40.71.34.X

Magic hider. Port numbers less than 1024 or greater than 49150 are reserved for the system, any other port we can choose for the local system which i have chosen port 8888 here!

so now if I open a browser and do: https://localhost:8888 -> keep it in mind it depends on the target service how we can access it. For example if the service instead of web server (port 8000) was a remote desktop port (port 3389) then in the local system we open the remote desktop app (exp windows) and put: localhost:3389

So to understand even better, we forwarded localhost:8888 to the 40.71.34.X:8000 which is used when we want to have access to a service in the remote system (target system which is ssh server).

So basically the command will tell the ssh-server (system B) that please redirect the traffics to the service which is located on your own system (by using localhost)!

Now imagine the scenario that the service (same as before splunk web server) that we want to access is not located at the same system as ssh-server (system B), but it is located in another system (system C) which is accessable from system B. So now we change our command in a way that tell SSH-Server please redirect the traffics to the System C for Us:

#ssh -L 8888:IPadd-of-SystemC:8000 hrouhani@40.71.34.X

I just emphasis one more time that no matter where the service is located (in B or C), from client side we use always following to access:

localhost:8888

b. Remote Port forwarding

The only difference is that we want to let somebody from the target server (server who is ssh server (system B)) to connect a service in our local system (A). So it is just another way around. Let’s stick to the same example with this difference that Splunk (web server) is installed in our local system (system A) and we want to let guys from outside (system B which is ssh-server) to connect to it. We do exactly the same command except changing the flag from -L to -R:

#ssh -R 8888:localhost:8000 hrouhani@40.71.34.X

sow now if somebody sitting at System B and open his browser and put: https://localhost:8888 then he has access to our local splunk server (web server) through ssh even though IP address 192.168.67.X is not routable (private IP add).

so in summary in Local Port forwarding somebody want to access a service at target system (system who is hosting ssh server (B)) which is A -> B and in Remote port forwarding somebody from target system (system who is hosting ssh server (B))
want to have a access to a serivice in System A. Keep it in mind that in both casses we run the mentioned commands from System A since System B is hosting the ssh server.

So in both cases direct access to whatever Services (like Web, Remote Desktop…) from either Server A or from Server B is not possible (for whatever reason) and the only possibility is having SSH from a Client (A) To a Target Server (B which is hosting ssh server). In both cases offcourse SSH command with whatever flags (-L or -R) should be run from Clinet (ssh client)! The Only things that differenciate between Local port forwarding (-L) and Remote Port forwarding (-R) is depend on service which we want to access is located in which one, if located in Target server (ssh server) then simply Local port forwarding otherwise Remote port forwading!

c. Dynamic Port forwarding

It is not much useful.

********************

Connecting with ssh to a server via a Jump server in the middle

So from my computer I need to connect first to mxtcag0110 and from there to lxtcag0120 which I do not have direct access due to Firewall Blockage. There are several ways of doing that which I will go through all of them here:

  • My Sytsme is A
  • mxtcag0110 is B (Jump Server)
  • lxtcag0120 is C

1. ProxyJump:

This is the most secure method because encryption is end-to-end. In addition to whatever other encryption goes on, the end points of the chain encrypt and decrypt each other’s traffic. So the traffic passing through the intermediate hosts is always encrypted. But this method cannot be used if the intermediate hosts deny port forwarding.

From command-line it can be used using ssh with -J flag which basically instruct the ssh to connect first to the jump server and then establish a TCP forwarding (forwarding port 22 to the target server) to the Target server from there.

ssh -J mxtcag0110.rouhani.org lxtcag0120.rouhani.org

It is very important to keep in mind that if we want to have passwordless ssh by using keys, we need to copy the Public key of our system (A) to both Jumper server (B) and Target server (C) authorized_keys.

And if the username and port on any system is different we can specify them:

ssh -J username@B:port username@C:port

We can also put the above command in .ssh/config file to make the life easier by only using: -> “ssh lxtcag0120”

Host mxtcag0110
HostName IPadd

Host lxtcag0120
Hostname IPadd
ProxyJump mxtcag0110
IdentityFile ~/.ssh/id_rsa -> refer to Private key

2. Taking advantage of ProxyCommand.

The idea here is to use the stdio forwarding. Previously we needed to install netcat in the Jump server that provides the capability of stdio forwarding for us, but in the new version of openssh we have this capability simply by adding -W flag. Therefore I explain here with the newer version of the Openssh which should be the case by you as well.

ssh -o ProxyCommand=”ssh -W %h:%p mxtcag0110″ lxtcag0120 -> keep it in mind that %h:%p stand for Host:Port. If the private is somewhere other than .ssh/ with different name as standard (id_rsa) we can specify it by using: ssh -i ~/.ssh/nameOfthePrivateKey

We can also can config file here like following:

Port

#cat .ssh/config
Host mxtcag0110
HostName mxtcag0110.rouhani.org

Host lxtcag0120
HostName lxtcag0120.rouhani.org
IdentityFile ~/.ssh/id_rsa
Port 22
User hrouhan
ProxyCommand ssh -q -W %h:%p mxtcag0110

Important: In both above methods, it is necessary that the public key of the A (our system) being inserted in the Target system (C) authorized_key otherwise it dose not work. So basically here we use only the key that is located in our system (which connection being initiated). Now let’s look at different scenario in 3 method by using ssh agent.

3. Using ssh agent

what is the main usage of the ssh agent: ssh-agent is a background program that handles passwords for SSH private keys (some people protect their private key with password). The ssh-add command prompts the user for a private key password and adds it to the list maintained by ssh-agent. Pes 5 download. Once you add a password to ssh-agent, you will not be prompted for it when using SSH or scp to connect to hosts with your public key.

To activate the ssh agent:
eval `ssh-agent` -> Make sure you use the backquote (`), located under the tilde (~), rather than the single quote (‘).

and to add the private key password (its the key that our private key with that encrypted, to hide our key)
ssh-add -> it will refer to the .ssh/id_rsa by default otherwise we need to specify the private key location

I put both of them in my home directory .bashrc.

and also to kill the ssh agent when I am logout I put following in .bash_logout:
kill $SSH_AGENT_PID

Now let’s come back to our main topic which is connection from system A to the system C over our jump server whic is system B:

Here if in system B we have different keys (public/private pair) we can pu the public key of the B in authorized_key file of the C!

ssh -A -t mxtcag0110.rouhani.org ssh -A -t lxtcag0120.rouhani.org -> -A flag will activate the ssh agent

The SSH (Secure Shell) default port number is port 22. With the GSW SSH Server you can change the port number to the port of your choice.
Important: Be sure that you also change the port number on the SSH clients to the same port number configured on the SSH Server.
The SSH Port number is configured by modifying the following registry key: usGSWSSHDPort which is a number.
The key is:

  • For Win x64:HKEY_LOCAL_MACHINESOFTWAREWow6432NodeGeorgia SoftWorksGSW_SSHDParametersusGSWSSHDPort
  • For Win x86:HKEY_LOCAL_MACHINESOFTWAREGeorgia SoftWorksGSW_SSHDParametersusGSWSSHDPort

The default value is 22.
This following is a procedure to change the registry key for the SSH port number.
1. Click the Start button at the bottom left corner of your screen
2. Click RUN
3. Type REGEDIT
4. Click OK
5. Select Registry Key:

  • For Win x64:HKEY_LOCAL_MACHINESOFTWAREWow6432NodeGeorgia SoftWorksGSW_SSHDParametersusGSWSSHDPort
  • For Win x86:HKEY_LOCAL_MACHINESOFTWAREGeorgia SoftWorksGSW_SSHDParametersusGSWSSHDPort

6. Select the menu item Edit and then click on Modify
7. Enter the new value for the usGSWSSHDPort and click OK

Watch How to Change the SSH Server Port Number on Windows

The new value will take effect when the GSW SSHD service is restarted

Back to SSH Server FAQ
Document Number: FAQ-SSH-EX005001081519