Skip to main content

A Python-based SSH forced-command gatekeeper for remote callbacks.

Project description

ssh-backchannel

WARNING. This is vibe coded. Review before use.

Sometimes I want to do things on my local machine from a remotes machine I am ssh'd into. ssh-backchannel provides a means to do so - in a moderately secure way. It allows you to run a local command from a remote machine, while asking for confirmation from your local machine.

Architecture

A limited ssh key is created and passed to other machines when you log in. This key can only run a command which asks you for permission before running commands.

Alternatives and prior work

If you are happy with it you could use ssh auth forwarding and just ssh into your machine. This adds a little more security since you must approve each command.

If you just want to write to your clipboard there are tools which use OSC escape codes to send data via your terminal. The only downside is that you need to set up terminal to handle deal with this. I do not like debugging this sort of stuff.

Caveat

This only works if your host can be reached from the remote machine and may involve openning your machine ot the internet or using a VPN / being on the same subnet. Reverse proxying would probably be the easiest fix.

It is assumed that there is only one user who consistently uses a machine.

This only with X11.

Alternatively, you could use reverse proxying in your ssh config.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

ssh_backchannel-1.2.0.tar.gz (3.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

ssh_backchannel-1.2.0-py3-none-any.whl (4.3 kB view details)

Uploaded Python 3

File details

Details for the file ssh_backchannel-1.2.0.tar.gz.

File metadata

  • Download URL: ssh_backchannel-1.2.0.tar.gz
  • Upload date:
  • Size: 3.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.3

File hashes

Hashes for ssh_backchannel-1.2.0.tar.gz
Algorithm Hash digest
SHA256 320ae0233c1d7fc13425ffbdf170b472ff0a7db8e8217ef48fc985d0302e6051
MD5 c57e6766f2c68d3ba4c74cb93b387f07
BLAKE2b-256 b1f9dd91cef1357cc397085cc274340f152797993d73850e283b9439c856be50

See more details on using hashes here.

File details

Details for the file ssh_backchannel-1.2.0-py3-none-any.whl.

File metadata

File hashes

Hashes for ssh_backchannel-1.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 ca511d1e7d1e7190f8f308faee8868061a87c1ade6028752f6caae11f92d6e3f
MD5 f717db75c73d94c6081f458e6b09a126
BLAKE2b-256 4a8ac985c1efb2aa2c83a3271222d76f70ef0d10cea2349ea29cea6308f2856a

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page