![]() In the tree on the left side, navigate toĪnd create a new local tunnel with the source port 123 and the destination localhost:456. Start Putty and enter your usual connection settings (Hostname or IP address) To set it up with Putty ( local forward example) The script will use tsocks or ALL_PROXY variable: ALL_PROXY="socks5h://localhost:5000" tsocks scriptįor youtube-dl youtube-dl -proxy socks5://127.0.0.1:5000 Wget needs tsocks, because wget doesn’t support proxies. Or just curl -proxy socks5h://localhost:5000 tsocks thunderbirdĮasy to use with curl: ALL_PROXY="socks5h://localhost:5000" curl You can now start program with tsocks in front of it, so that it uses the socks proxy. ![]() Server = localhost # proxy-server (your host) more general: use tsocks application with a file /etc/nfĬontents of the config file: local = 192.168.1.0/255.255.255.0 # no proxy for local network You can now surf in the internet without anybody at the strange place knowing what you do. Now edit the following values: string localhost Type in the Firefox address bar: about:config If you want to tunnel your browser traffic (with Firefox for example), you do not only want to access ONE website (remotehost and port), but surf freely in the On your computer (your host) you do: ssh -D 5000 remotehost # or the equivalent option "dynamic" with puttyįor this you can edit your Firefox configuration, so that your browser uses your socks proxy. What does a Socks proxy do? It accepts all your requests and forwards it dynamically to the remote hosts and ports, that the original program wanted it to ( see examples below). Or you need to help it with some tricks ( see examples below). Your program using the tunnel needs to support socks proxies. D is like -L (local) but instead of fowarding to one and only one specific remotehost and port, SSH acts as a SOCKS proxy to the remotehost. Ssh -R sourcePort:forwardToHost:onPort connectToHost means: connect with ssh to connectToHost, and forward all connection attempts to the remote sourcePort to port onPort on the machine called forwardToHost, which can be reached from your local machine. remote: -R Specifies that the given port on the remote (server) host is to be forwarded to the given host and port on the local side.Ssh -L sourcePort:forwardToHost:onPort connectToHost means: connect with ssh to connectToHost, and forward all connection attempts to the local sourcePort to port onPort on the machine called forwardToHost, which can be reached from the connectToHost machine. local: -L Specifies that the given port on the local (client) host is to be forwarded to the given host and port on the remote side.If you are going to use the tunnel to connect with PuTTY to another server, you can actually set up the tunnel as a part of the session settings with use of plink as a proxy, see: PuTTY configuration equivalent to OpenSSH Prox圜ommand.The machine, where the ssh tunnel command is typed (or in your case: Putty with tunneling is started) is called »your host«. See also the PuTTY wish no-terminal-window. The -N translates to the option "Don't start a shell or command at all".īut it probably does not make sense with a GUI client to enable it, as you get a window anyway, you just cannot do anything with it. If you have any problems, use the PuTTY event log to investigate: So it's actually, what you claim to have tried. With the PuTTY, the -L 2000:SomeIp:2000 translates to: ![]() plink.exe -N -L 2000:SomeIp:2000 Using the command-line connection tool Plink ![]() With the plink.exe, you use the same arguments as with the OpenSSH ssh, except for the -f, which does not have an equivalent in Windows. With the PuTTY suite, you can set up a tunnel either using the PuTTY itself (GUI) or using the command-line tool plink.exe.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |