I've got this problem that whenever I try to tunnel a Port using ssh and localhost.run using:-
ssh -R 80:localhost:8080 ssh.localhost.run
I get this:-
** your connection id is 95c80293-xxxx-4c49-8ec4-4xxxxxxxxxxx, please mention it if you send me a message about an issue. **===============================================================================Welcome to localhost.run!Head over to https://twitter.com/localhost_run and give us a follow for thehottest SSH port forwarded local dev env news.**You need a SSH key to access this service.**Github has a great howto, follow along with it to get prepared for the change:https://help.github.com/en/github/authenticating-to-github/generating-a-new-ssh-key-and-adding-it-to-the-ssh-agent**CUSTOM DOMAINS ARE HERE AND I'M SO EXCITED**I've been working hard on custom domains and I'm soft launching the customdomain plan option to existing users. If you own a domain name that you'd likelocalhost.run on visit https://admin.localhost.run/ to look at the planand set it up.===============================================================================Connect to http://root-e092f6aa.localhost.run{"domain": "root-e092f6aa.localhost.run", "listen_port": 80, "status": "success", "message": "Connect to http://root-e092f6aa.localhost.run"}
But when I go to http://root-e092f6aa.localhost.run
it says Something went wrong opening the port forward, check your SSH command output for clues!
And in the terminal it is written connect_to localhost port 8080: failed.
I also ran ssh -vvv localhost
It shows :-
OpenSSH_8.3p1 Debian-1, OpenSSL 1.1.1g 21 Apr 2020debug1: Reading configuration data /etc/ssh/ssh_configdebug1: /etc/ssh/ssh_config line 19: include /etc/ssh/ssh_config.d/*.conf matched no filesdebug1: /etc/ssh/ssh_config line 21: Applying options for *debug2: resolving "localhost" port 22debug2: ssh_connect_directdebug1: Connecting to localhost [::1] port 22.debug1: Connection established.debug1: identity file /home/kali/.ssh/id_rsa type -1debug1: identity file /home/kali/.ssh/id_rsa-cert type -1debug1: identity file /home/kali/.ssh/id_dsa type -1debug1: identity file /home/kali/.ssh/id_dsa-cert type -1debug1: identity file /home/kali/.ssh/id_ecdsa type -1debug1: identity file /home/kali/.ssh/id_ecdsa-cert type -1debug1: identity file /home/kali/.ssh/id_ecdsa_sk type -1debug1: identity file /home/kali/.ssh/id_ecdsa_sk-cert type -1debug1: identity file /home/kali/.ssh/id_ed25519 type -1debug1: identity file /home/kali/.ssh/id_ed25519-cert type -1debug1: identity file /home/kali/.ssh/id_ed25519_sk type -1debug1: identity file /home/kali/.ssh/id_ed25519_sk-cert type -1debug1: identity file /home/kali/.ssh/id_xmss type -1debug1: identity file /home/kali/.ssh/id_xmss-cert type -1debug1: Local version string SSH-2.0-OpenSSH_8.3p1 Debian-1debug1: Remote protocol version 2.0, remote software version OpenSSH_8.3p1 Debian-1debug1: match: OpenSSH_8.3p1 Debian-1 pat OpenSSH* compat 0x04000000debug2: fd 3 setting O_NONBLOCKdebug1: Authenticating to localhost:22 as 'kali'debug3: send packet: type 20debug1: SSH2_MSG_KEXINIT sentdebug3: receive packet: type 20debug1: SSH2_MSG_KEXINIT receiveddebug2: local client KEXINIT proposaldebug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-cdebug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,ssh-ed25519,sk-ssh-ed25519@openssh.com,rsa-sha2-512,rsa-sha2-256,ssh-rsadebug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.comdebug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.comdebug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1debug2: compression ctos: none,zlib@openssh.com,zlibdebug2: compression stoc: none,zlib@openssh.com,zlibdebug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug2: peer server KEXINIT proposaldebug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.comdebug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.comdebug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1debug2: compression ctos: none,zlib@openssh.comdebug2: compression stoc: none,zlib@openssh.comdebug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug1: kex: algorithm: curve25519-sha256debug1: kex: host key algorithm: ecdsa-sha2-nistp256debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: nonedebug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: nonedebug3: send packet: type 30debug1: expecting SSH2_MSG_KEX_ECDH_REPLYdebug3: receive packet: type 31debug1: Server host key: ecdsa-sha2-nistp256 SHA256:omteMgqLQrYTg6UmnCyNsT9FLa2gKrvGn0yj6XL0RiEThe authenticity of host 'localhost (::1)' can't be established.ECDSA key fingerprint is SHA256:omteMgqLQrYTg6UmnCyNsT9FLa2gKrvGn0yj6Xxxxxx.Are you sure you want to continue connecting (yes/no/[fingerprint])? yesWarning: Permanently added 'localhost' (ECDSA) to the list of known hosts.debug3: send packet: type 21debug2: set_newkeys: mode 1debug1: rekey out after 134217728 blocksdebug1: SSH2_MSG_NEWKEYS sentdebug1: expecting SSH2_MSG_NEWKEYSdebug3: receive packet: type 21debug1: SSH2_MSG_NEWKEYS receiveddebug2: set_newkeys: mode 0debug1: rekey in after 134217728 blocksdebug1: Will attempt key: /home/kali/.ssh/id_rsa debug1: Will attempt key: /home/kali/.ssh/id_dsa debug1: Will attempt key: /home/kali/.ssh/id_ecdsa debug1: Will attempt key: /home/kali/.ssh/id_ecdsa_sk debug1: Will attempt key: /home/kali/.ssh/id_ed25519 debug1: Will attempt key: /home/kali/.ssh/id_ed25519_sk debug1: Will attempt key: /home/kali/.ssh/id_xmss debug2: pubkey_prepare: donedebug3: send packet: type 5debug3: receive packet: type 7debug1: SSH2_MSG_EXT_INFO receiveddebug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com>debug3: receive packet: type 6debug2: service_accept: ssh-userauthdebug1: SSH2_MSG_SERVICE_ACCEPT receiveddebug3: send packet: type 50debug3: receive packet: type 51debug1: Authentications that can continue: publickey,passworddebug3: start over, passed a different list publickey,passworddebug3: preferred gssapi-with-mic,publickey,keyboard-interactive,passworddebug3: authmethod_lookup publickeydebug3: remaining preferred: keyboard-interactive,passworddebug3: authmethod_is_enabled publickeydebug1: Next authentication method: publickeydebug1: Trying private key: /home/kali/.ssh/id_rsadebug3: no such identity: /home/kali/.ssh/id_rsa: No such file or directorydebug1: Trying private key: /home/kali/.ssh/id_dsadebug3: no such identity: /home/kali/.ssh/id_dsa: No such file or directorydebug1: Trying private key: /home/kali/.ssh/id_ecdsadebug3: no such identity: /home/kali/.ssh/id_ecdsa: No such file or directorydebug1: Trying private key: /home/kali/.ssh/id_ecdsa_skdebug3: no such identity: /home/kali/.ssh/id_ecdsa_sk: No such file or directorydebug1: Trying private key: /home/kali/.ssh/id_ed25519debug3: no such identity: /home/kali/.ssh/id_ed25519: No such file or directorydebug1: Trying private key: /home/kali/.ssh/id_ed25519_skdebug3: no such identity: /home/kali/.ssh/id_ed25519_sk: No such file or directorydebug1: Trying private key: /home/kali/.ssh/id_xmssdebug3: no such identity: /home/kali/.ssh/id_xmss: No such file or directorydebug2: we did not send a packet, disable methoddebug3: authmethod_lookup passworddebug3: remaining preferred: ,passworddebug3: authmethod_is_enabled passworddebug1: Next authentication method: passwordkali@localhost's password: debug3: send packet: type 50debug2: we sent a password packet, wait for replydebug3: receive packet: type 52debug1: Authentication succeeded (password).Authenticated to localhost ([::1]:22).debug1: channel 0: new [client-session]debug3: ssh_session2_open: channel_new: 0debug2: channel 0: send opendebug3: send packet: type 90debug1: Requesting no-more-sessions@openssh.comdebug3: send packet: type 80debug1: Entering interactive session.debug1: pledge: networkdebug3: receive packet: type 80debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0debug3: receive packet: type 91debug2: channel_input_open_confirmation: channel 0: callback startdebug2: fd 3 setting TCP_NODELAYdebug3: ssh_packet_set_tos: set IPV6_TCLASS 0x10debug2: client_session2_setup: id 0debug2: channel 0: request pty-req confirm 1debug3: send packet: type 98debug1: Sending environment.debug3: Ignored env SHELLdebug3: Ignored env SESSION_MANAGERdebug3: Ignored env WINDOWIDdebug3: Ignored env QT_ACCESSIBILITYdebug3: Ignored env XDG_CONFIG_DIRSdebug3: Ignored env XDG_SESSION_PATHdebug3: Ignored env XDG_MENU_PREFIXdebug3: Ignored env LANGUAGEdebug3: Ignored env SSH_AUTH_SOCKdebug3: Ignored env DESKTOP_SESSIONdebug3: Ignored env SSH_AGENT_PIDdebug3: Ignored env XDG_SEATdebug3: Ignored env PWDdebug3: Ignored env XDG_SESSION_DESKTOPdebug3: Ignored env LOGNAMEdebug3: Ignored env QT_QPA_PLATFORMTHEMEdebug3: Ignored env XDG_SESSION_TYPEdebug3: Ignored env PANEL_GDK_CORE_DEVICE_EVENTSdebug3: Ignored env XAUTHORITYdebug3: Ignored env XDG_GREETER_DATA_DIRdebug3: Ignored env HOMEdebug1: Sending env LANG = en_US.utf8debug2: channel 0: request env confirm 0debug3: send packet: type 98debug3: Ignored env LS_COLORSdebug3: Ignored env XDG_CURRENT_DESKTOPdebug3: Ignored env XDG_SEAT_PATHdebug3: Ignored env XDG_SESSION_CLASSdebug3: Ignored env TERMdebug3: Ignored env USERdebug3: Ignored env COLORFGBGdebug3: Ignored env DISPLAYdebug3: Ignored env SHLVLdebug3: Ignored env XDG_VTNRdebug3: Ignored env XDG_SESSION_IDdebug3: Ignored env XDG_RUNTIME_DIRdebug3: Ignored env QT_AUTO_SCREEN_SCALE_FACTORdebug3: Ignored env XDG_DATA_DIRSdebug3: Ignored env PATHdebug3: Ignored env GDMSESSIONdebug3: Ignored env DBUS_SESSION_BUS_ADDRESSdebug3: Ignored env _JAVA_OPTIONSdebug3: Ignored env _debug2: channel 0: request shell confirm 1debug3: send packet: type 98debug2: channel_input_open_confirmation: channel 0: callback donedebug2: channel 0: open confirm rwindow 0 rmax 32768debug3: receive packet: type 99debug2: channel_input_status_confirm: type 99 id 0debug2: PTY allocation request accepted on channel 0debug2: channel 0: rcvd adjust 2097152debug3: receive packet: type 99debug2: channel_input_status_confirm: type 99 id 0debug2: shell request accepted on channel 0Linux kali 5.5.0-kali2-686-pae #1 SMP Debian 5.5.17-1kali1 (2020-04-21) i686The programs included with the Kali GNU/Linux system are free software;the exact distribution terms for each program are described in theindividual files in /usr/share/doc/*/copyright.Kali GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extentpermitted by applicable law.
I am trying to do a WAN attack on my test PC. I don't have a router so I use this. I used NGROK before but it's domain port changed every time so I tried using this. Please Help Me.
I also used sudo systemctl status ssh
and got:-
sudo systemctl status ssh● ssh.service - OpenBSD Secure Shell server Loaded: loaded (/lib/systemd/system/ssh.service; disabled; vendor preset: disabled) Active: active (running) since Sat 2020-08-08 06:33:12 EDT; 11min ago Docs: man:sshd(8) man:sshd_config(5) Process: 2455 ExecStartPre=/usr/sbin/sshd -t (code=exited, status=0/SUCCESS) Main PID: 2456 (sshd) Tasks: 1 (limit: 4560) Memory: 4.0M CGroup: /system.slice/ssh.service└─2456 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startupsAug 08 06:33:18 kali sshd[2459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=::1 user=rootAug 08 06:33:20 kali sshd[2459]: Failed password for root from ::1 port 51100 ssh2Aug 08 06:36:37 kali sshd[2522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=::1 user=rootAug 08 06:36:39 kali sshd[2522]: Failed password for root from ::1 port 51160 ssh2Aug 08 06:38:02 kali sshd[2522]: Failed password for root from ::1 port 51160 ssh2Aug 08 06:38:07 kali sshd[2522]: Failed password for root from ::1 port 51160 ssh2Aug 08 06:38:07 kali sshd[2522]: Connection closed by authenticating user root ::1 port 51160 [preauth]Aug 08 06:38:07 kali sshd[2522]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=::1 user=rootAug 08 06:39:33 kali sshd[2546]: Accepted password for kali from ::1 port 51162 ssh2Aug 08 06:39:33 kali sshd[2546]: pam_unix(sshd:session): session opened for user kali by (uid=0)
Thanks in Advance for Help.