At this point, you may as well install/configure OpenVPN. kelly <kelly.black at penguinpackets.com> wrote: >If you are not averse to having Python installed the remote computer, >and can >live without UDP, you could give Sshuttle a try: > >https://github.com/apenwarr/sshuttle > >Works well for forwarding more than just a few ports - i.e. a whole >network - >(assuming you can run Python on the far end - think port forwarding). > >Kelly >KB0GBJ >> Sun Dec 02 2012 09:41:18 PM CST from "Justin Krejci" >><jus at krytosvirus.com> Subject: Re: [tclug-list] vnc/rdesktop >> >> To add to eriks socks proxy comments, firefox and perhaps other >browsers >>can also tunnel its DNS queries through the socks proxy as well for >added >>privacy. >> >> >>-------- Original message -------- >>From: Erik Anderson <erikerik at gmail.com> >>Date: >>To: TCLUG Mailing List <tclug-list at mn-linux.org> >>Subject: Re: [tclug-list] vnc/rdesktop >> >> >>On Sun, Dec 2, 2012 at 8:09 PM, Brian Wood <woodbrian77 at gmail.com> >wrote: >>> Does anyone know of examples of on line services that use >>> tunneling? I've not found much. >> >>No, but I suspect that's due to the fact that learning the few >>command-line flags for tunneling is a bit higher learning curve than >>most people are willing to put up with. That said, ssh tunnelling is >>*immensely* useful for day-to-day development/sysadmin type >>activities. >> >>I use it exclusively to connect to our EC2 cluster, in lieu of a >>full-fledged VPN. It's fast, simple, reliable, and doesn't require any >>additional configuration on the server side of things. >> >>As an example of how I use ssh tunneling on a near-daily basis: Sequel >>Pro, a MySQL client for OSX, supports accessing the remote DB over an >>ssh tunnel. So all you need to do is give Sequel Pro the ssh server >>name, your username, and db credentials and Bob's your uncle. Instant >>secure, remote database access. >> >>Oh, I did think of one very popular service that leverages ssh >>tunnelling - github. When pushing commits to any repository on github, >>you're tunnelling git over ssh. >> >>-Erik >>P.S. I know this has been discussed on the list before, but it's >>useful enough to bear repeating: One more frequent use case is giving >>yourself a secure SOCKS-compatible proxy. This is very useful on >>public, untrusted networks to allow you to tunnel all of your browsing >>traffic through a secure tunnel. Assuming you have a linux server >>somewhere at your disposal, just run: >> >>$ ssh user at host -D8000 >> >>That will set up a dynamic (SOCKS) proxy on your localhost port 8000. >>Then in your browser settings, just configure it to use localhost:8000 >>as a proxy. >>_______________________________________________ >>TCLUG Mailing List - Minneapolis/St. Paul, Minnesota >>tclug-list at mn-linux.org >>http://mailman.mn-linux.org/mailman/listinfo/tclug-list >> >> >> (, 0 bytes) [View| Download] >> >> >> >> >> >> >> > > > > > > >------------------------------------------------------------------------ > >_______________________________________________ >TCLUG Mailing List - Minneapolis/St. Paul, Minnesota >tclug-list at mn-linux.org >http://mailman.mn-linux.org/mailman/listinfo/tclug-list -- Sent from my Android phone with K-9 Mail. Please excuse my brevity. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mailman.mn-linux.org/pipermail/tclug-list/attachments/20121202/1ae64f79/attachment.html>