Tags

redhat
employment
ripple
interfaces
ncurses
ruby
refs
filesystems
retro gaming
raspberry pi
sinatra
3d printing
nethack
gcc
compiler
fedora
virtfs
project
gaming
vim
grep
sed
aikido
philosophy
splix
android
lvm
storage
bitcoin
projects
sig315
miq
db
polisher
meditation
hopex
conferences
omega
simulator
bundler_ext
rubygems
book review
google code in
isitfedoraruby
svn
gsoc
design patters
jsonrpc
rjr
aeolus
ohiolinuxfest
rome
europe
travel
brno
gtk
python
puppet
conference
fudcon
snap
html5
tips
ssh
linux
hardware
libvirt
virtualization
engineering expo
cloud
rpm
yum
rake
redmine
plugins
screencasting
jruby
fosscon
pidgin
gnome-shell
distros
notacon
presentation
rails
deltacloud
apache
qmf
passenger
syrlug
hackerspace
music
massive attack
crypto
backups
vnc
xsd
rxsd
x3d
mercurial
ovirt
qpid
webdev
haikus
poetry
legaleese
jquery
selenium
testing
xpath
git
sshfs
svg
ldap
autotools
pygtk
xmlrpc
slackware

Jun 15 2007 ssh

Tunneling SSH

(I’m in NYC working for Red Hat right now and am insanely busy. I’m having a great time and will describe everything in my blog in the near future).

Finally figured out ssh tunneling.

  1. Run your own ssh server (lets call it myserver.com)
  2. On the client side, run ssh -N -D 8000 myserver.com -N means dont run a program, eg. bash -D is the local port ssh will listen on

  3. Configure Firefox SOCKS PROXY (not a HTTP PROXY) to point to localhost:8000. Make sure its using Socks4 and you are not setting the http or other proxy fields (took me a while to figure that one out). Since this setting is far into the options settings, download an extension (addons.mozilla.org) to add a button or toolbar to control it.

Once everything is setup, all your web traffic should be tunneled over ssh. Modify the proxy settings for other programs as necessary.