Re: TCP proxy for host on subnet
On Tue, Jun 06, 2017 at 12:49:35PM +0200, tomas@tuxteam.de wrote:
> On Tue, Jun 06, 2017 at 10:59:30AM +0100, Ron Leach wrote:
> > On 05/06/2017 14:08, Henning wrote:
> > >
> > >socat
> > >
> >
> > Henning, thank you for that. socat seems a very flexible package.
> >
> > Have you used it yourself, at all? I couldn't see from the
> > documentation how to terminate socat. I was planning to use a
> > variation of one of their examples, like this:
>
> I'm using it all the time, to have ssh access through a corporate
> firewall.
>
> Corporate firewalls and their priests tend to believe in Numerology,
> and for some $REASONS ports 80 and 443 are Good and all other ~65K
> are Evil. So I wrap my ssh connections in a port 443 tunnel --
> for good measure I wrap that in SSL (I don't even want to know
> whether our corporate firewall does stateful inspection, and I guess
> there's nobody in house who knows: some higher-order subcontractor
> perhaps [1]).
>
> Anyway, on my laptop "lappy" (some names changed, to protect
> the innocent:
>
Or the guilty one from getting fired fore blatantly violating corporate
rules?
Is that you they are writing about here?
https://arstechnica.com/security/2017/05/defense-contractor-stored-intelligence-data-in-amazon-cloud-unprotected/
-H
Reply to: