The Azure Relay Bridge (azbridge
) is a simple command line tool that allows
creating TCP, UDP, HTTP, and Unix Socket tunnels between any pair of hosts,
allowing to traverse NATs and Firewalls without requiring VPNs, only using
outbound HTTPS (443) Internet connectivity from either host. Neither of those
hosts must be running in Azure; the Azure Relay helps facilitating the
connection.
Using this tool requires a Microsoft Azure subscription and an Azure Relay namespace. Active Azure Relay ("Hybrid Connections") listeners are charged hourly. Namespaces and relays are not chnarged for while not in use; please review the pricing FAQ.
NOTE: Azure Relay is a fully supported cloud service that has been around for well over a decade, but this tool is not covered by Azure product support. Issues must be filed here and there is no guaranteed reaction time for addressing any such issues.
This README document illustrates some simple usage scenarios. For further details, including installation instructions, please read the Overview document. The various configuration options are detailed even further in the Config document.
Private Network A│ │Private Network B
│ │
│ │
│ │
TCP:16161 │ │ TCP:16161
┌──────────┐ ┌────────┐ │ │ ┌────────┐ ┌────────────┐
│ │ │ │ │ │ │ │ │ │
│ Client ├──────►azbridge├─┼──────┐ ┌─┼───►azbridge├────► Database │
│ │ │ │ │ │ │ │ │ │ │ │
└──────────┘ └────────┘ │ │ └────────┘ └────────────┘
┌──▼─┴───┐
│ db │
│ │
│ │
└────────┘
Azure Relay
Namespace
azbridge \ azbridge \
-L 16161:db \ -T db:16161 \
-e sb://mydemo.servicebus.windows.net -e sb://mydemo.servicebus.windows.net
If you run a database server somewhere in your own datacenter that you need to
reach from a cloud application, azbridge
can make that database server
securely reachable from the cloud application without you having to make any
changes on your on-premises network, as long as azbridge
running on or near
the database server machine can establish an outbound HTTPS/WebSocket connection
to the Azure Relay namespace.
In the example above, there's a bridge running on the same machine as the
client, listening on local TCP port 16161 and binding that port to the "db"
Hybrid Connection relay on the "mydemo" namespace with the -L
option.
On the database machine, the bridge is bound in the reverse, mapping "db" to the
local TCP port 16161 as a client connecting to the database with the -T
option. All traffic through the bridge is forwarded end-to-end.
The required Azure Relay resource (the Hybrid Connection) can be set up with a few lines of script (showing BASH syntax):
export _NS=mydemo
# create resource group
az group create --name $_NS --location westeurope
# create relay namespace
az relay namespace create -g $_NS --name $_NS
# create the hybrid connection endpoint 'db'
az relay hyco create -g $_NS --namespace-name $_NS --name db
# grant the current user "owner" permission
az role assignment create \
--assignee $(az ad signed-in-user show --query "id" --output tsv) \
--role "Azure Relay Owner" \
--scope $(az relay namespace show -g $_NS --name $_NS --query "id" --output tsv)
In a real deployment, you can authenticate with AAD using the az login
command
and then use the that security context with the ´azbridge` tool. You can also use an
environment
credential
or managed identities.
If using AAD is not an option, you can use the native authentication scheme of
the Azure Relay. You can create specific access rights with an associated token
credential for each relay or you can do so globally at the namespace level. The
following two script lines create a "listen" and a "send" rule that can be used
to either run a listener or a sender on the "db" Hybrid Connection. You could
also combine those rights into one rule by specfying --rights Listen Send
az relay hyco authorization-rule create -g mydemo --hybrid-connection-name db \
--namespace-name mydemo -n send --rights Send
az relay hyco authorization-rule create -g mydemo --hybrid-connection-name db \
--namespace-name mydemo -n listen --rights Listen
The created rule's keys can then be obtained by running
az relay hyco authorization-rule keys list --hybrid-connection-name db \
--namespace-name mydemo -g mydemo -n send
The command will return the primary and secondary signing keys and connection strings:
{
"keyName": "send",
"primaryConnectionString": "Endpoint=sb://mydemo.servicebus.windows.net/;SharedAccessKeyName=send;SharedAccessKey={base64 key};EntityPath=db",
"primaryKey": "{base64 key}",
"secondaryConnectionString": "Endpoint=sb://mydemo.servicebus.windows.net/;SharedAccessKeyName=send;SharedAccessKey={base64 key};EntityPath=db",
"secondaryKey": "{base64 key}"
}
You can either use a connection string with the azbridge -x "{connection string}"
option and omit the -e
endpoint option, or you can specify the name
of the rule with -K
and the value of the key with -k
. Specifying an
authorization rule skips the AAD authentication.
For most scenarios involving TLS, it is important for the hostnames to match the subject name of the presented certificates during the TLS handshake.
When the bridge is used on the client side, you can configure DNS names of the target services in the local hosts file, picking a unique IPv4 address out of the 127.x.x.x range for each service, and then configuring a local forwarder for the respective target address.
Mind that the 127.x.x.x is fully available for local endpoints, meaning you can
bind a TCP port 443 listener simultaneously to 127.0.0.2 and 127.0.0.3 without
conflicts. On MacOS only, you must explicitly enable those addresses using, for
instance, sudo ifconfig lo0 alias 127.0.0.2 up
.
Addresses in the 127.x.x.x range can only be reached on that local machine,
shielding the client from exposing TCP bridges to others. For instance, for
reaching the remote SQL Server sql.corp.example.com
, you would add an IP
address like 127.1.2.3
to the "hosts" file as 127.1.2.3 sql.corp.example.com
, and then use a local forwarder configuration that refers
to the 127.1.2.3
address, for example azbridge -L 127.1.2.3:1433:relay
.
Any client connections from that machine to sql.corp.example.com
will then be
redirected to the azbridge
exposed endpoint. The machine connected via the
remote azbridge
which has this actual DNS name on its own network and
therefore presents a matching TLS certificate through the tunnel.
To make that easy, the package install in Linux will register two BASH
extensions for adding and removing entries from the /etc/hosts
file:
addhost {ipaddress} {name}
- adds an IP address with the given hostname to "hosts"removehost {name}
- removes the entry for the given hostname
On Windows, the installation path includes three scripts:
Add-Hostnames.ps1 {ipaddress} {name}
- adds an IP address with the given hostname to "hosts"Remove-Hostnames.ps1 {name}
- removes the entry for the given hostnameGet-Hostnames.ps
- lists all hostnames
All these scripts must be run with admin privileges because the hosts
file is
protected.
You can obviously also bind to a private network address of the host on which
azbridge
runs, like azbridge -L 192.168.0.6:1433:relay
, and enter that
address into the private network's DNS.
The remote forwarder end of the azbridge
tunnel in the above example is
configured as -T db:16161
, which forwards to TCP port 16161 on the local
machine.
Private Network A│ │Private Network B
│ │
│ │
127.0.0.8 │ │ sql.corp.example.com
TCP:16161 │ │ │ TCP:16161
┌──────────┐ ┌────────┐ │ │ ┌────────┐ │ ┌────────────┐
│ │ │ │ │ │ │ │ │ │ │
│ Client ├──────►azbridge├─┼──────┐ ┌─┼───►azbridge├──│──► Database │
│ │ │ │ │ │ │ │ │ │ │ │ │
└──────────┘ └────────┘ │ │ └────────┘ │ └────────────┘
┌──▼─┴───┐ │
│ db │
│ │
│ │
└────────┘
azbridge \ azbridge \
-L sql.corp.example.com:16161:db -T db:sql.corp.example.com:16161
(hosts file: sql.corp.example.com 127.0.0.8)
The bridge can also be configured to point to other hosts on the same network,
specifiying their hostname in the binding expression, like -T db:sql.corp.example.com:16161
Occasionally, you will need to connect to multiple targets behind the same
network boundary. azbridge
can realize this using a single listener that only
gets charged once. The established connections remain completely independent.
Private Network A│ │Private Network B
│ │ sql1.corp.example.com
│ │ TCP:16161
│ │ ┌────────────┐
│ │ │ │ │
┌──────────┐ ┌────────┐ │ │ ┌────────┐ │ ┌───► Database │
│ │ │ │ │ │ │ │ │ │ │ │
│ Client ├──────►azbridge├─┼──────┐ ┌─┼───►azbridge├──│──┤ └────────────┘
│ │ │ │ │ │ │ │ │ │ │ │ ┌────────────┐
└──────────┘ └────────┘ │ │ └────────┘ │ │ │ │
┌──▼─┴───┐ │ └───► Database │
│ db │ │ │
│ │ └────────────┘
│ │ TCP:16161
└────────┘ sql2.corp.example.com
hosts file:
sql1.corp.example.com 127.0.0.8
sql2.corp.example.com 127.0.0.9
To multiplex connections to multiple targets, you can use "logical ports" with
azbridge
. Logical ports are used to distinguish connections through the Relay
tunnel and they are specified on the command line.
The command azbridge -L "127.0.0.8:16161/sql1;127.0.0.8:16161/sql2:db" -e [...]
binds a listener on 127.0.0.8:16161 to logical port "sql1" and a listener
on 127.0.0.9:16161 to logical port "sql2"; both listeners are bound to the
Hybrid Connection db
specified after the last :
.
On the remote side, and given the scenario above, the targets are bound with the
command azbridge -T db:sql1/sql1.corp.example.com:16161;sql2/sql2.corp.example.com:16161
.
Logical ports are construct of azbridge
and there's no limit on how many you
can have.
Cloud App Network │ │Restaurant Network
│ │
│ │
│ │
│ │ HTTPS:443
┌─────────┐ │ │ ┌────────┐ ┌────────────┐
│ │ HTTPS:443│ │ │ │ │ "La Tavola"│
│ Cloud ├──────────┼──┐ ┌─┼───►azbridge├────► Restaurant │
│ App │ │ │ │ │ │ │ │ Order Sys │
└─────────┘ │ │ └────────┘ └────────────┘
┌──▼─┴───┐
│latavola│
│ │
│ │
└────────┘
Azure Relay
Namespace
azbridge \
-H latavola/https:443 \
-e sb://mydemo.servicebus.windows.net
If you run an order management app inside of a restaurant using a common DSL or
Cable connection that does not have a stable IP address and is firewalled, but
you need to be able to reach that app from a web-based portal or even from a
client device attached to a public wireless network to submit orders, azbridge
can help, either in the same way as shown above or as an HTTP proxy that only
needs to run on one side.
The diagram shows azbridge
functioning as a reverse proxy for HTTPS, making an
HTTP or HTTPS endpoint behind a firewall or even inside a container reachable
via the Azure Relay namespace's network and DNS integration and secured with an
optional (on-by-default) access control rule protecting the endpoint.
The azbridge only needs to be run on the receiver side since the Azure Relay
provides the HTTPS endpoint. Similar to the prior scenario, we need to set up
and configure Hybrid Connection, which is named "latavola" (name of the
assumed restaurant). The azbridge -H
command then binds to that relay with an
HTTP reverse proxy, which forwards incoming requests to the HTTPS listener on
the local target port 443. All HTTP headers, including the "Authorization"
header, are forwarded end-to-end.
The client in this example will connect to
https://mydemo.servicebus.windows.net/latavola
. By default, the endpoint
requires an extra layer of authorization at the relay, similar to HTTP proxy
authentication. The required parameters/headers are described in the protocol
guide,
and the token model is described in the authorization documentation.
You can turn off this protection at the relay endpoint and only rely on end-to-end authorization, even though it's not recommended to expose services behind firewalls that are not designed to be used as public endpoints in this way.
az relay hyco update -g mydemo --namespace-name mydemo --name latavola \
--requires-client-authorization false
The command azbridge -H latavola/https:443 -e sb://mydemo.servicebus.windows.net
will bind the external address to
https://mydemo.servicebus.windows.net/latavola
and will forward arriving
requests to https://localhost:443
│ │ Kubernetes Pod
┌─────────┐ │ │
│ Admin │ HTTPS:443 │ │
│ Tool A ├─────────────┼───┐ │
│ │ │ │ │
└─────────┘ │ │ │ ┌─────────┬───────────┐
TCP:17171 │ │ │ │ │ │
┌─────────┐ ┌────────┐ │ │ │ │ │ ┌───────┐ │
│ Admin │ │ │ │ │ │ │ ┌────┼─►Svc A │ │
│ Tool B ├─►azbridge├──┼───► │ │ │ │ └───────┘ │
│ │ │ │ │ │ ┌─┼───►azbridge │ │
└─────────┘ └────────┘ │ │ │ │ │ │ │ ┌───────┐ │
│ │ │ └────┼─►Svc B │ │
┌──▼─┴───┐ │ │ └───────┘ │
│ myctr │ │sidecar │ │
│ │ └─────────┴───────────┘
│ │
└────────┘
Azure Relay
Namespace
Using azbridge
in a Kubernetes sidecar container, you can reach APIs and
services running inside of containers in a cluster without having them exposed
via an Ingress controller.
See the OVERVIEW document for further details.