mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2026-04-25 09:25:55 +03:00
[GH-ISSUE #344] SSH and HTTPS Support? #303
Labels
No labels
awaiting feedback
bug
cannot reproduce
dns provider request
duplicate
enhancement
enhancement
enhancement
good first issue
help wanted
invalid
need more info
no certbot plugin available
product-support
pull-request
question
stale
troll
upstream issue
v2
v2
v2
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-proxy-manager-NginxProxyManager#303
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @FantaBlueMystery on GitHub (Mar 30, 2020).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/344
Can you add SSH Support? (Nice to have)
For example by my SSH-Proxy
@Thijmen commented on GitHub (Apr 11, 2020):
I am already forwarding SSH with streams, would this help you?
@FantaBlueMystery commented on GitHub (Apr 14, 2020):
Hi there
Thanks for the answer! Your answer would only be a part
because according to the protocol "$ ssl_preread_protocol" it would have to be divided into "TLSv1.2", "TLSv1.3", "TLSv1.1", "TLSv1.0" and the "default" for the ssh.
All this would be necessary to separate the HTTPS and SSH on one port (443). If it could then be separated by domain, that would be wonderful.
Would that be possible with the streams in the UI? Can you set the stream again on port 443? It would be important that only one port is present on the outside.
@Thijmen commented on GitHub (Apr 14, 2020):
Is that even possible, @FantaBlueMystery ?
@FantaBlueMystery commented on GitHub (Apr 14, 2020):
yes clearly see my first post, currently I have another nginx before npm that uses this config and on 'server 10.8.0.15:443;' forward to the npm
:)
@gustavosbarreto commented on GitHub (May 13, 2020):
Hi @FantaBlueMystery, did you know ShellHub? I think you can configure NGINX Proxy Manager to work together ShellHub for SSH access.
I'm doing some tests with NGINX Proxy Manager and ShellHub to provide HTTPS access.
@FantaBlueMystery commented on GitHub (May 13, 2020):
Hello @gustavosbarreto thanks for the info, I didn't know "shellhub" until now. It looks very interesting e.g. with "web-based user interface".
But here it would also be the case that it should be accessible using the SSH protocol. As an example, we would use sftp or the Ansible program.
But I'll still have a look at "shellhub". But I think to get the destination a port on the router you still can't get without the settings like in my first post.
Port 22 (or another ssh port) should not be visible from the outside. Therefore, a camouflage via https (443) is ingenious, since you can determine the HTTPs server and SSH in the internal network at the same time based on the domain (subdomaining).
@ursus69 commented on GitHub (Apr 16, 2021):
Has there been any advancement on this enhancement?
It would make it the ultimate NGinx project if we could make this happen!
almost all the businesses blocks other ports than 80 and 443, so this will allow me to connect to my home undetected.
If we could also add other streams like VPN over 443 it will be great!
Cordially
@ursus69 commented on GitHub (Apr 16, 2021):
How do you achieve this? which docker image you use for your head Nginx with streams?
Cheers!
@FantaBlueMystery commented on GitHub (Apr 18, 2021):
Hey @ursus69 sorry for my late answer:
docker-compose.yml
Edit your nginx.conf and add:
Simple and fast :)
@ursus69 commented on GitHub (Apr 22, 2021):
Many thanks @FantaBlueMystery, I t works like a charm!
@fdelucchijr commented on GitHub (Apr 28, 2021):
This is an exiting enhancement!!! It would add an extra layer of security for my network!
Praying to see it in NPM soon!
@litio2001 commented on GitHub (Jun 8, 2021):
Do you know when this new enhancement will be available in the docker NPM image?
thanks in advance for the wonderful development!!
@chaptergy commented on GitHub (Jun 8, 2021):
I don't think this code snippet will ever be officially added to NPM unless someone creates a pull request adding this and creating a user interface where this is configurable. As it is now, this is very specific for one ssh server, and the file would have to be edited manually anyways, so there is no point in adding it. You would have to add this nginx config inside your container yourself.
@fdelucchijr commented on GitHub (Jun 14, 2021):
This comment make me kind of sad, but its acceptable. I get an alternative.
Using Cloudflare's Argo Tunnels make this so easy! also provides TLS secure connection, IP hidding, DDNS, CGNAT Bypass and other amazing features.
For ssh with WebRender you can use this guide: This
To use the setup with the ssh cli (ProxyJump) you can use this
And, of you think this offers you a ProxyJump to far away when your locally you can use this amazing blog
KEEP IN MIND that this heavely relies in Cloudflare/LetsEncrypt DNS certificates and (in this instruction) Docker.
@mriksman commented on GitHub (Oct 19, 2021):
We just need a way to enter/edit the
streamblock manually. Do not need a full blown GUI for it. Just click the 'Add Stream' button, have a tab that says 'Manual Entry', enter your code, and click save.@stefanwerfling commented on GitHub (Mar 1, 2023):
Hello everyone, I'm a big fan of NPM!
I've started to write my own software for this implementation and I'm still looking for testers, whoever is interested can take a look at the whole thing.
I'm just posting this because the idea isn't being picked up. The whole thing is still under development. I use it for myself already in a live test. You can find it through my profile.
@marky421 commented on GitHub (Jan 26, 2024):
Can this feature be used to enable SSH support? Would the streams feature come into play? I'm hoping to only have ports 80/443 open on my firewall but I want to be able to SSH and host some https sites.
https://nginxproxymanager.com/advanced-config/#custom-nginx-configurations
@stefanwerfling commented on GitHub (Jan 29, 2024):
@marky421 I do not fully understand the question.
The example above shows how an SSH protocol can be placed over the HTTPS port.
Nginx looks at which protocol applies to TLS and directs it to the appropriate upstream.
If none of the protocols match, the default target is the SSH server.
Magic :)
@github-actions[bot] commented on GitHub (Aug 31, 2024):
Issue is now considered stale. If you want to keep it open, please comment 👍
@albeec13 commented on GitHub (Jan 24, 2025):
@
See my reply in the linked thread here: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/646#issuecomment-2613387551
tl;dr is you can use
/data/nginx/custom/stream.confto accomplish what you want, but only if you have NO other proxy hosts using 443 defined in the standard NPM GUI. You can define them usinig the OP'sssl_preread_server_namemethod above, but I'm not sure if that and theupstreamdirectives are sufficient for getting ssl certs and such working for an HTTPS server without a standardhttp{ server { ... } }nginx block/directive.This can, however, be easily accomplished with a standalone (non-NPM) nginx install on a linux server or small docker instance as I explain in the message linked above.
@stefanwerfling commented on GitHub (Jan 26, 2025):
@albeec13 Why are you reposting an answer that has been clarified for a long time? Your example, which came later, explains the same context.
It's clear that if npm doesn't build an interface for this, this issue will only be closed if it is rejected. That's okay too. Then you can put your own config or a pre-nginx in front of it.
:)
@albeec13 commented on GitHub (Jan 27, 2025):
I was running into a similar problem and decided to respond to this existing thread instead of starting a new one. Moreover, there were two important distinctions between my response and others I've seen which are:
./custom/stream.conf, you will not be able to use other proxy hosts on 443 from the normal GUI route in NPMI felt these were important/useful to the next person who may run into this issue. If it's not of use to you, no need to snark about it.
@stefanwerfling commented on GitHub (Jan 28, 2025):
@albeec13 Okay, I understand, then we got off on the wrong foot.
Apart from npm, this is possible and this is also what my app is aiming for.
As with the 443 port, you also carry out “domain splitting” on the 80 port, i.e. a map to different upstreams. For example, all domains that point to the 80 port are directed to the upstream 127.0.0.1:10080.
There the 10080 waits for a response depending on the domain with
each of these "servers" has a location /.well-know/ entry.
Now you could ask yourself how the original client IP gets to the server.
This is also easy, in the
"proxy_protocol" is activated and on the
Activated. Now the client IPs will also be passed on.
@albeec13 commented on GitHub (Jan 28, 2025):
No worries!
I'll have to check that out, thanks!
Cool, I was not aware of the proxy_protocol directive, I'll need to look into that some more. Thanks!
@komodikkio commented on GitHub (May 21, 2025):
I'm trying to achieve this using a custom/stream.conf, but looks like i'm missing something.
When i try to connect via ssh -p 443 i get this errors:
This is my custom/stream.conf file, for the ssh upstream i use the docker IP which i can connect to using the shell from the NPM container:
Thanks a lot for any help you can give me, it'll be really appreciated
@stefanwerfling commented on GitHub (May 22, 2025):
@komodikkio
I've created an overview of the route for you. If no suitable domain is specified, your browser will default to "ssh," which it won't be able to do (it won't understand because it's an SSH protocol). "https" upstream is empty and cannot be reached.
On the upstream "ssh," I see that you're specifying port "8443," which not sounds like the SSH server. Please check this again; the normal SSH port is 22. If there's a web server behind 8443, it won't understand SSH and will respond with a "Bad Request."
I hope this helps you.
@komodikkio commented on GitHub (May 22, 2025):
Hi Stefan, thanks for the provided oveview.
What is failing to me it's the ssh connection when i call, from public, the NPM's port 443
When i try to ssh to mypublic ip:443 i get this 400 Bad Request output on the ssh shell.
On the ssh upstream i specified the 8443 port because the service it's listening on a custom port :)
netstat -tunlp |grep 8443
tcp 0 0 0.0.0.0:8443 0.0.0.0:* LISTEN 26969/sshd: /usr/sb
At the momento i'm not trying to reach an https service via browser, i'm trying just the SSH connection
Thanks again for getting back to me
@stefanwerfling commented on GitHub (May 22, 2025):
@komodikkio
Then we have to check everything individually to see where the problem lies :) :
2.1 Is there perhaps another server with 443? Try using a different port, 1443, and test that.
2.2 Try "https2" with a different web server, does a different page appear in the browser?
Based on the answer, we can rule out whether there is another configuration for the 443
@komodikkio commented on GitHub (May 22, 2025):
@stefanwerfling
here's the test's results
1 Yes, ssh reply if i try to connect from NPM's container to the ip:8443 port
2 in the container i can find the stream config under the /data/nginx/custom/stream.conf file. Does this mean it has been loaded, right?
2.1 there's something else exposed by NPM on 443 port, but i can't figure what
Running netstat on the host:
If i try to open it, from the host or from the container, using the browser or curl, i get an error:
On the 80/tcp port i find the default page of nginx stating: "Congratulations! You've successfully started the Nginx Proxy Manager."
I think there's something like a default nginx page defined somewhere also for 443/tcp, but can't find it, and maybe the unrecognized name arise because there's not a SSL cert configured anywhere
2.2 tryed to map http2 to the NPM management page at :81, but can't get it work. I think because that's http only
I don't know what's going on but i'm thinking that, even if I could make it work, loosing the chance to use NPM's gui for managing websites and SSL certificates makes it a bit "wasted"
@stefanwerfling commented on GitHub (May 22, 2025):
@komodikkio
Okay, if you don't want to destroy the NPM 443 config, you'll have to move this server to a different port, 9443. I've made you another diagram.
Process: The router redirects the 443 port from the public IP to 9443, which splits the protocol and redirects it internally to 443. 443 is not listed externally (it is not published in Docker).
$ssl_preread_server_nam You can leave it out, because It is take care of the names, unless you have a server that issues itself a certificate with Let's Encrypt, in which case you'll need this block. Then you can also point it to your NPM 443 by default.
Problem: You now have 9443 as your pre-proxy, so you're losing the client's IP address because the server always shows 127.0.0.1 as the client's IP address. To fix this, you need to enable the proxy protocol. The link tells you what you need to do. But you'll also need to find the 443 config again, where you configure it so that you now receive everything with the proxy protocol header.
https://github.com/NginxProxyManager/nginx-proxy-manager/issues/344#issuecomment-2618540067
good luck! :)
@komodikkio commented on GitHub (May 22, 2025):
Thanks @stefanwerfling that would be great.
Sadly i'm on oracle cloud free tier, so i can't do port forwarding but just open/close a port.
I could try to enable the port forwarding on the host itsaelf using iptables
@github-actions[bot] commented on GitHub (Dec 9, 2025):
Issue is now considered stale. If you want to keep it open, please comment 👍