From: | David Bear <David(dot)Bear(at)asu(dot)edu> |
---|---|
To: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
Cc: | Steve Crawford <scrawford(at)pinpointresearch(dot)com>, pgsql-admin(at)postgresql(dot)org |
Subject: | Re: tunneling through ssh |
Date: | 2004-08-19 23:26:10 |
Message-ID: | 20040819232610.GF23172@asu.edu |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-admin |
On Wed, Aug 18, 2004 at 09:21:54PM -0400, Tom Lane wrote:
> David Bear <David(dot)Bear(at)asu(dot)edu> writes:
> > and on the ssh'd terminal tunnel session:
> > --------
> > $ channel 3: open failed: administratively prohibited: open failed
> > -------
>
> Perhaps a firewalling problem? Look at your kernel packet filtering
> setup ... it's not uncommon for even local-loopback traffic to be
> aggressively filtered by default, and none of the people who set these
> things up think port 5432 is a standard service :-(
>
thanks for all the suggestions. The solution was to tunnel
'localhost' -- the key is knowing which localhost localhost is
referring too.. so, here's what I did.
ssh -L 4001:localhost:5432 iddwb(at)dbsrv1
This allows postgresql to listen on the 'localhost' interface..
thanks for all the replies.
--
David Bear
phone: 480-965-8257
fax: 480-965-9189
College of Public Programs/ASU
Wilson Hall 232
Tempe, AZ 85287-0803
"Beware the IP portfolio, everyone will be suspect of trespassing"
From | Date | Subject | |
---|---|---|---|
Next Message | David Bear | 2004-08-19 23:29:30 | long term persistent tunnels |
Previous Message | Joe Conway | 2004-08-19 17:10:29 | Re: [HACKERS] SRPM for 8.0.0 beta? |