Hello Karl & others, At Thu, 19 Jul 2007 09:50:37 +0100 Karl E. Jorgensen wrote, "If you run openvpn in tcp mode, then you can use a proxy server at the receiving end. ... allows the same port to be used for two different protocols: http://sourceforge.net/projects/ssh-ssl-proxy/"
I installed the deb package and read the README. Nice software. ssh-ssl-proxy separates packets according to the behaviour of the client: whether it talks or waits. I need to separate packets according to IP address. Here I want to make a tunnel using port 22. The openvpn man page describes a tunnel between machines May and June. When May receives a packet marked port 22 she should check the address. If it is from June, it is for openvpn. From any other address it is for ssh. June behaves symmetrically. A port 22 packet from May is handed over to openvpn and a port 22 packet from any other address is for ssh. For communicating between themselves, May and June can safely use telnet inside the tunnel. For communicating with other systems, ssh will work over port 22. Can iptables or anything else, separate packets this way? Otherwise, perhaps I can introduce this other separation criterion into your proxy. Any other ideas? Thanks, ... Peter E. http://carnot.pathology.ubc.ca/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]