// use case

Replace ssh -R reverse tunnels with one command

ssh -R works if you have a public-IP server with sshd open and configured for GatewayPorts. Most people don't. lrok does the same job — make a private port reachable from the internet — without you running a server.
  1. Pick the local port to expose

    Anything: 22, 5432, 6379, 8080.

  2. Tunnel

    $ lrok tcp 22
      Forwarding tcp://tcp.lrok.io:30007  ->  tcp://127.0.0.1:22
  3. SSH from the other side

    $ ssh -p 30007 user@tcp.lrok.io

// why lrok for this

No public-IP server to maintain, no sshd config, no firewall rules. The TCP port is allocated dynamically; rebind by re-running the command.

Related workflows