On 4/2/06, Chris Kuethe <[EMAIL PROTECTED]> wrote: > On 4/2/06, Niklaus <[EMAIL PROTECTED]> wrote: > > > what problem are you really trying to solve? > > really, what problem are you trying to solve? the fact that you have > untrusted users? > > > I understand the tunnelling through ssh part. > > Can you explain what reverse telnet is . I don't get it. Users here on my system are running proxy servers like socks proxy and downloading stuff which is banned on squid proxy. This is a mail and devel server, so all of the users have ssh and gcc accounts .They compile the proxies they get on sourceforge and i really can't kill all the processes because there are too many users. They are just like a redirectors. I don't want any user other than root to listen on any port.
> > assume have an http proxy listening on 127.0.0.1 on your machine. > assume you've disabled port forwarding in sshd_config so i can't > tunnel to my proxy. > i then change my proxy program to i connect back to a listener > (netcat?) on my remote machine at which point i have a tcp connection > through which i can forward my http requests to make them look like > they're coming from your box. > > this sort of trick is easy to whack together... probably 10 or 15 > minutes if you're ripping code straight out of "learning perl" without > knowing what you're doing. no doubt there's stuff in ports that can be > used too. > > CK > > -- > GDB has a 'break' feature; why doesn't it have 'fix' too?