[Feature Request] SSH Port Forwarding Support
grps
PROOP

14 days ago

Summary

I like to request the implementation of SSH Port Forwarding (Local, Remote, and Dynamic tunneling) to enable secure, encrypted access to private services and internal network resources through an SSH connection.

This feature would allow users to securely access internal applications, databases, development environments, and restricted services without exposing them publicly to the internet.

Background

SSH (Secure Shell) is widely used for encrypted remote administration. One of its most powerful capabilities is port forwarding, which creates encrypted tunnels between local and remote machines.

There are three common modes:

  1. Local Port Forwarding (-L)
    Forward a local port to a remote service.

  2. Remote Port Forwarding (-R)
    Expose a local service to a remote server securely.

  3. Dynamic Port Forwarding (-D)
    Create a SOCKS proxy for flexible, encrypted traffic routing.

Currently, users must rely on external tools or custom configurations to achieve this functionality.

Why SSH Port Forwarding Is Important for Private Access

1. Secure Access to Internal Services

Many services (databases, admin panels, internal APIs) are intentionally not exposed to the public internet. SSH port forwarding allows secure access without changing firewall rules or opening new public endpoints.

Example:

  • Accessing a private PostgreSQL database

  • Connecting to an internal web dashboard

  • Viewing an application running on localhost of a remote server

All traffic remains encrypted via SSH.

2. Minimizes Attack Surface

Instead of exposing services on public ports:

  • No additional public IP exposure

  • No need to open firewall rules

  • No need to configure reverse proxies

  • No need for VPN in lightweight use cases

The service remains private and accessible only to authenticated SSH users.

3. End-to-End Encryption

SSH tunnels provide:

  • Encrypted transport layer

  • Strong authentication (keys, certificates)

  • Protection against packet sniffing

  • Secure access over untrusted networks (public Wi-Fi, ISP networks)

This is especially critical for:

  • Database credentials

  • Admin interfaces

  • Internal development environments

4. Simplifies Development & Debugging

Developers can:

  • Access staging servers locally

  • Connect to remote databases as if they were local

  • Debug services running inside private VPCs

  • Safely test production replicas

This removes friction and improves productivity.

5. Compliance & Security Best Practices

SSH tunneling supports:

  • Zero-trust access models

  • Principle of least privilege

  • Avoiding publicly exposed management interfaces

  • Reduced need for full-network VPN access

Many security standards recommend avoiding public exposure of sensitive services whenever possible.

Proposed Implementation
Required Capabilities

  • Support for Local Port Forwarding (-L)

  • Support for Remote Port Forwarding (-R)

  • Support for Dynamic Port Forwarding (-D, SOCKS5)

  • Configurable via UI and CLI

  • Optional:

    • Port forwarding profiles

    • Auto-reconnect

    • Logging and monitoring

    • Access control restrictions

Business Value

  • Increased enterprise adoption

  • Improved security posture

  • Reduced support overhead from insecure workarounds

  • Competitive parity with industry-standard SSH tools

  • Better developer experience

Conclusion

SSH Port Forwarding is a foundational security feature that enables secure, encrypted access to private infrastructure without increasing public exposure.

Implementing this capability will:

  • Improve security

  • Enable private access

  • Reduce infrastructure risk

  • Enhance developer productivity

  • Align with modern zero-trust principles

Under Review

0 Threads mention this feature

2 Replies

niffler92
FREE

7 days ago

Desperately needed


niffler92

Desperately needed

relaxedguy
PRO

5 days ago

Thirded. Also a simple file tranfer widget or allowed command.


Loading...