SSH Tunneling

From Robertjd

Jump to: navigation, search

Contents

[hide]

Credits

This information came from this post on the sf-lug mailing list:

http://linuxmafia.com/pipermail/sf-lug/2009q3/006990.html

Commands

Computer A is the proxy, the machine we wish to tunnel through. Machine B is the client who wishes to tunnel through A.

robert@B:~$ ssh -D9999 robert@A
robert@A's password:
Last login: Tue Nov 10 09:34:55 2009 from foo-at.nobodys.bar.com
robert@A:~$

That is it! Just let the login sit there. Machine B now has a local socket which is proxying through machine A. Now you can configure your socks client

Browser SOCKS configuration

Once you have your tunnel created, you need to give your browser the following configuration directives :

  • SOCKS host: localhost port: 9999

Firefox also defaults to SOCKS v5 and No Proxy for localhost, 127.0.0.1 - neither of these settings appear to cause any problems

Testing

If you are able to access pages with your browser after configuring the SOCKS parameters, you are now pulling the pages through your tunnel! You can verify this by visiting one of these "what is my ip" websites:

You should be showing up with the IP of machine A in our example

Personal tools