Re: SSh Tunnel Over Squid
Corkscrew claims to be able to handle proxy
authentication, although the website says that the
feature is new and possibly imperfect.
--- marcos rocha <email@example.com> wrote:
> i think that if you enable proxy authentication you
> can dificult this.
> why ???
> because the proxy authentication must be provided
> before the tunnel is established.
> --- Robert Tasarz <firstname.lastname@example.org>
> > Hi,
> > On Sat, May 14, 2005 at 01:54:37PM +0800, Mike
> > Valvasori wrote:
> > > Putty (or OpenSSH or alternatives) will also
> > you to redirect
> > > a local port to one running on a remote host.
> > is all too easy
> > > to redirect to an FTP server running elsewhere
> > SSH over HTTP
> > > and move sensitive data. Squid handles this
> > well--if you specify
> > > a keepalive it is completely usable for almost
> > type of traffic,
> > > including RDP/ICA sessions where you think the
> > proxy would introduce
> > > some sort of latency.
> > Hmmm - in case of ftp it seems not so easy... but
> > you want to send
> > something outside and have ssh--why to bother with
> > ftp when you can use scp?
> > Or be creative--put WebDAV server somewhere
> > for example (accessible
> > by https of course) :).
> > > I have tried to work out a reasonable way to
> > this behaviour, but
> > > all solutions seem to impact on the usability of
> > the proxy server.
> > > Telnetting to the remote port will normally give
> > you an SSH header so
> > > maybe some sort of script running regularly,
> > testing connected hosts
> > > with remote port 443/80 (based on netstat output
> > perhaps), grepping
> > > for SSH and then cutting
> > (http://freshmeat.net/projects/tcpipcutter/)
> > > and blocking the remote host would work?
> > they change the SSH
> > > connection header :)
> > Or simply they put ssh session inside of ssl
> > Perfectly with key
> > autharization of both sides, so you even cannot
> > check what protocol they are
> > transmitting inside (ppp comes in mind) :).
> > In other words - give me one month, maybe less,
> > reasons to be desperate
> > enough and I'll write tunnel for sending ip
> > by http in both
> > directions as valid png pictures :) (and I'm
> > guessing someone must done
> > something similiar till now).
> > Sorry for not suggesting any solution, but I
> > don't see any good enough
> > for preventing all possible kinds of such abuses.
> > For me only method is policy
> > for personnel setting what they can do and
> > adequately restrictive consequences
> > for breaking it. And... not to strict rules on
> > firewall - then most of abuses
> > aren't too clever and easier to detect ;).
> > Regards,
> > Robert Tasarz.
> > --
> > To UNSUBSCRIBE, email to
> > debian-firewall-REQUEST@lists.debian.org
> > with a subject of "unsubscribe". Trouble? Contact
> > email@example.com
> Mail, cada vez melhor: agora com 1GB de espaço
> grátis! http://mail.yahoo.com.br
> To UNSUBSCRIBE, email to
> with a subject of "unsubscribe". Trouble? Contact
Do you Yahoo!?
Yahoo! Mail - Helps protect you from nasty viruses.