:: "Alex Angelopoulos" <[EMAIL PROTECTED]>
:: (2) From what I understand, you make almost anything run over SSH. 
:: (Take that with a chunk of salt, though - I've only done it with
:: about 3 things in the past). 

: Michael Ossmann <[EMAIL PROTECTED]>
: Yes, that's true.  SSH only does TCP port forwarding, not UDP port
: forwarding, so some things (like XDMCP or DNS) won't work directly
: over port forwarding, but you can also do stuff like running PPP over
: SSH to create a VPN.  UDP over IP over PPP over SSH over TCP over IP!
: :-)

There's an intermediate possibility that I use, which is easier
to configure than a VPN, but makes lots of things work.  And
that's to use socks proxy over ssh.

On the server side, you run a socks server, and on the client side, you
run either applications that understand socks proxies, such as netscape,
or (on linux/unix) you can use "runsocks" from the socks reference
implementation, or Dante "socksify", and on windows, you can use
SocksCap from the reference implementation, or commercial products that
do the same thing. 

What runsocks or SocksCap do is intercept any socket calls,
and proxy them, so that the program doesn't need to be written
to do anything special.    Thus, on linux, you configure your socks
client or socksifying library to use localhost:1080 as the proxy port,
then start ssh like so

           ssh -L 1080:localhost:1080 foo

then you can start a vnc session via

           runsocks vncviewer bar

where the machine "bar" need not even be visible to your
mach ine, as long as it is visible to foo.  The traffic from
your machine to foo is encrypted.  Most often, the traffic
to bar from foo would be behind a firewall.

I realize my discussion and example are very sketchy.  And there are
often better ways to go.  But if you need access to many different
machines behind a firewall, it's a reasonable way to secure your traffic
TO that firewall, and not have to set up specific port forwards for
every machine you might want to contact.  It also avoids the "raw
encodings" problem discussed on the att page on use of VNC over ssh. 

And while I'm mentioning it, the latest tightVNC will automagically
launch ssh for you on demand; that is, you just say you want to connect
to "foo", and an ssh tunnel is created for the traffic to foo. 

So.  Socks is worth looking at.  Reading material:

      http://www.socks.nec.com/
      http://www.inet.no/dante/
      http://www.tightvnc.org/

      http://www.doxpara.com/index_orig.php
      http://www.doxpara.com/gwc/gwc3.ppt

The doxpara site, and especially that powerpoint slideshow,
describes increasingly exotic and difficult stunts you can do
with ssh, including an ssh client that combines socks proxy
so that you don't even need a socks proxy on the server side.
It also mentions resources for setting up a VPN via socks.

For the .ppt, you'll need powerpoint, or staroffice, or openoffice.
And it's just a slide show.  But suggestive reading nevertheless.
As the title slide says, "this is not how to crack ssh,
this is ssh on crack..."

In any event; VNC works very will via socks proxy,
using runsocks or socksify on linux/unix, and SockCap
or commercial socksifyers on windows (Permeo's "e-Driver"
has been recommended to me, but I haven't actually used it,
being mostly unix/linux oriented).

Enjoy.


Wayne Throop   [EMAIL PROTECTED]
---------------------------------------------------------------------
To unsubscribe, mail [EMAIL PROTECTED] with the line:
'unsubscribe vnc-list' in the message BODY
See also: http://www.uk.research.att.com/vnc/intouch.html
---------------------------------------------------------------------

Reply via email to