I have played with it, to see how it worked, but have never used it in production. To the best of my recollection, root access is indeed required in order to establish the tunnels.
The way to use an existing device is described in the ssh(1) man page, look at the syntax for the -w option. I can't recall if I tested that feature, or not.
|