Using an SSH Bastion Host21 November 2015 · Filed in Education
Secure Shell, or SSH, is something of a “Swiss Army knife” when it comes to administering and managing Linux (and other UNIX-like) workloads. In this post, I’m going to explore a very specific use of SSH: the SSH bastion host. In this sort of arrangement, SSH traffic to servers that are not directly accessible via SSH is instead directed through a bastion host, which proxies the connection between the SSH client and the remote servers.
At first, it may sound like the use of an SSH bastion host is a pretty specialized use case. In reality, though, I believe this is a design pattern that can actually be useful in a variety of situations. I plan to explore the use cases for an SSH bastion host in a future blog post.
This diagram illustrates the concept of using an SSH bastion host to provide access to Linux instances running inside some sort of cloud network (like an OpenStack Neutron tenant network or an AWS VPC):
Let’s take a closer look at the nuts and bolts of actually setting up an SSH bastion host.
First, you’ll want to ensure you have public key authentication properly configured, both on the bastion host as well as the remote instances. This is a topic that has been discussed extensively in other locations (here, for example), so I won’t cover it here in any great detail. You can use the same key for both the bastion host and the remote instances, or different keys; you’ll just need to ensure that the keys are loaded by
ssh-agent appropriately so they can be used as needed. (Note that the use of public key authentication isn’t strictly required, but it’s something you really should do.)
Next, you’ll want to ensure that name resolution is working—both from the client to the bastion as well as from the bastion to the remote instances. The bastion host is going to use the hostname specified on the
ssh command line, so if it can’t resolve the name the connection will fail.
Finally, you’ll want to configure the
ProxyCommand setting for the remote instances in your SSH configuration file. For example, let’s say that you had a remote instance named “private1” and you wanted to run SSH connections through a bastion host called “bastion”. The appropriate SSH configuration might look something like this:
Host private1 IdentityFile ~/.ssh/rsa_private_key ProxyCommand ssh [email protected] -W %h:%p Host bastion IdentityFile ~/.ssh/bastion_rsa_key
With this configuration in place, when you type
ssh [email protected] SSH will establish a connection to the bastion host and then through the bastion host connect to “private1”, using the specified keys. The user won’t see any of this; he or she will just see a shell for “private1” appear. If you dig a bit further, though (try running
who on the remote node), you’ll see the connections are coming from the bastion host, not the original SSH client. Handy, eh?
In a future blog post, look for me to explore one or more examples of where using an SSH bastion host might be very useful (or even necessary).
I found this article to be extraordinarily helpful while working through the details of an SSH bastion host configuration.
UPDATE 13 Sep 2016: I’ve removed the references to the need for SSH agent forwarding, as it turns out this isn’t required (despite indications otherwise from other tutorials). See this follow-up post for more information.Tags: CLI · Linux · Networking · SSH · Security Previous Post: Technology Short Take #56 Next Post: Bootstrapping Cloud Instances into Ansible