ssh -N -T -oExitOnForwardFailure=yes -L 3306:localhost:3306 firstname.lastname@example.org
But sometimes, the remote service runs on a UNIX-domain socket, not on a TCP socket -- for example, debian's default configuration for postgresql is to have it listen only on a UNIX domain socket in /var/run/postgresql, and use SO_PEERCRED with a simple system account == psql account mapping scheme to authenticate users without needing any extra credentials. This is not quite as simple to forward over ssh, but it's doable as long as socat is installed on both your local host and on the remote postgres server.
Here's one way to do it if $SOCKET_DIR points to the full path of a directory under the user's control (this is all one command, split across lines for easier reading):
socat "UNIX-LISTEN:$SOCKET_DIR/.s.PGSQL.5432,reuseaddr,fork" \ EXEC:'ssh email@example.com socat STDIO UNIX-CONNECT\:/var/run/postgresql/.s.PGSQL.5432'Then, you'd connect with something like:
psql "user=remoteuser host=$SOCKET_DIR"Each such psql connection will trigger an ssh connection to be made. Of course, this won't work well if ssh has to prompt for passwords, but you should be using ssh-agent anyway, right?
There are at least a couple nice features of being able to use postgresql from a local client like this: