The TCP forwarding method is a little more resistant to interception on the intermediate hosts by someone with root privs, but this is pretty marginal in most situations.
Personally I would (and do, frequently) use a chain of ssh with agent forwarding to get this effect.
In reply to Re^3: ssh chain
by nigelm
in thread ssh chain
by shmem
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |