skipped 281 lines 282 282 {"Status":"connected","ID":"ae92b6535a30566cbae122ebb2a5e754dd58f0ca","IP":"[::1]:52608","HostName":"user.computer","Timestamp":"2022-06-12T12:23:40.626775318+12:00"}% 283 283 ``` 284 284 285 + ### Tuntap 286 + 287 + RSSH and SSH support creating tuntap interfaces that allow you to route traffic and create pseudo-VPN. 288 + It does take a bit more setup than just a local or remote forward (`-L`, `-R`), but in this mode you can send `UDP` and `ICMP`. 289 + 290 + 291 + First set up a tun (layer 3) device on your local machine. 292 + ``` 293 + sudo ip tuntap add dev tun0 mode tun 294 + sudo ip addr add 172.16.0.1/24 dev tun1 295 + sudo ip link set dev tun0 up 296 + 297 + # This will defaultly route all non-local network traffic through the tunnel 298 + sudo ip route add 0.0.0.0/0 via 172.16.0.1 dev tun0 299 + ``` 300 + 301 + Install a client on a *remote* machine, this **will not work** if you have your RSSH client on the same host as your tun device. 302 + ``` 303 + ssh -J your.rssh.server.com:3232 user.wombo -w 0:any 304 + ``` 305 + 306 + 307 + This has some limitations, it is only able to send UDP/TCP/ICMP, and not arbitrary layer 3 protocols. ICMP is best effort and may use the remote hosts `ping` tool, as ICMP sockets are privileged on most machines. 308 + This also does not support `tap` devices, e.g layer 2 VPN, as this would require administrative access. 285 309 286 310 # Help 287 311 skipped 16 lines