Sponsored Content
Full Discussion: UDP/ tunnel
Special Forums Windows & DOS: Issues & Discussions UDP/ tunnel Post 302355097 by upengan78 on Monday 21st of September 2009 12:30:01 PM
Old 09-21-2009
Quote:
Originally Posted by Corona688
ssh doesn't support UDP tunneling, just TCP. Maybe you should investigate a VPN solution.
That's right, ssh does not support udp. problem with our VPN is that it can not provide an IP from license server's network. So VPN is also not really useful. May be configuring openvpn will be a good idea?
 

10 More Discussions You Might Find Interesting

1. Programming

using a ssh tunnel with nx compression

hi everybody and thank you for this wondefrul forum this is my first thread posted here and i hope that i could find some help from your part (i am even sure) :D here is the situation: i am to develop an application of remote desktop access such as vnc, vpn and especially nx i want to develop... (0 Replies)
Discussion started by: bolboln01
0 Replies

2. UNIX for Advanced & Expert Users

Dynamic Tunnel

Hi All, Anyone here already done similar to the queries below ? Is there is a way to have a setup that would allow an SA to easily hook any prod server (external ip) to an internal ip without network reconfigurations ? Your comments here will be much appreciated. Thanks (4 Replies)
Discussion started by: linuxgeek
4 Replies

3. UNIX for Advanced & Expert Users

ssh decipher a tunnel

Two question here, but it's only one on the protocol point of view. If two persons use the same key to connect to a SSH server is there a risk they can decipher the other tunnel. In other terms is that less safe than if they have two separate keys. Same question if two persons use the same user... (2 Replies)
Discussion started by: moi
2 Replies

4. Cybersecurity

RDP over SSH Tunnel

Hi all, I'm trying have an alternative way of connecting into a Corporate network. Mostly in case the VPN down as I cannot also change the security policy. I want to expose windows RDP over ssh tunnel. I have 3 hosts in my scenario 1- Host a : Windows 2k8 has no internet access just only an... (3 Replies)
Discussion started by: h@foorsa.biz
3 Replies

5. Ubuntu

VPN tunnel to UDP tunnel

I have a program which uses TCP connection for VPN tunnel. How do i Change TCP tunnel to UDP tunnel?.. (1 Reply)
Discussion started by: sahithi
1 Replies

6. IP Networking

Help with SSH tunnel?

I have a Java web app on machine (X) that needs to talk to an LDAP server (Y) on :636, but the LDAP server is only accessible on a particular network. I can login to a machine (Z) on that network from X, and this machine can talk to the LDAP server on :636. How can I tunnel so that X can... (2 Replies)
Discussion started by: spacegoose
2 Replies

7. UNIX for Advanced & Expert Users

Ssh tunnel question

Hi all I have a suite of scripts that ssh to remote servers within a cluster and run some tests. This is done from a central server so that all of the test results can be captured in one location. Problem is I now have 509 tests and the number is growing. The scripts work by establishing a... (2 Replies)
Discussion started by: steadyonabix
2 Replies

8. Red Hat

X11 forwarding through a tunnel

Is it possible to launch an X11 application and have it use an X11 server on the other side of a bastion host? Specifically, here's my setup: my laptop ------------- bastion -------------- remote host I have putty installed on my laptop. The bastion is rhel 6.5 and the remote host is... (1 Reply)
Discussion started by: tsreyb
1 Replies

9. Solaris

Tunnel X over ssh for 11.3

Hello Solaris experts: Trying to bring the 11.3 gdm screen over ssh to a Linux Box: I did the following: 1. made chanes to /etc/ssh/sshd_config & bounced ssh daemon: # X11 tunneling options X11Forwarding yes X11DisplayOffset 10 X11UseLocalhost yes 2. From the remote Linux box: ... (6 Replies)
Discussion started by: delphys
6 Replies

10. UNIX for Advanced & Expert Users

Tunnel using SSH

I am not clear with the part of concept of Tunneling using ssh. ssh -f -N -L 1029 192.168.1.47:25 james@192.168.1.47 I found out that above code works for me . but didn't quite well understood how ti works and need to ask you guys some questions. since we are using tunnel through ssh ... (2 Replies)
Discussion started by: lobsang
2 Replies
ptunnel(8)						       Yellow Lemon Software							ptunnel(8)

NAME
ptunnel - tunnel TCP connections over ICMP echo request/reply packets. SYNOPSIS
ptunnel -p proxy_address -lp listen_port -da destination_address -dp dest_port [-c network_device] [-v verbosity] [-f file] [-udp] [-sys- log] ptunnel [-c network_device] [-v verbosity] [-f file] [-udp] [-syslog] [-daemon file] ptunnel [-u] [-x password] [-setuid user] [-setgid group] [-chroot dir] [-setcon context] ptunnel -h DESCRIPTION
ptunnel is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies. At first glance, this might seem like a rather useless thing to do, but it can actually come in handy in some cases. The following example illustrates the main motivation in creating ptunnel: Setting: You're on the go, and stumble across an open wireless network. The network gives you an IP address, but won't let you send TCP or UDP packets out to the rest of the internet, for instance to check your mail. What to do? By chance, you discover that the network will allow you to ping any computer on the rest of the internet. With ptunnel, you can utilize this feature to check your mail, or do other things that require TCP. OPTIONS
Client options: -p proxy_address Specify the host on which the proxy is running. -lp listen_port Specifies the port on which the client will listen for incoming TCP connections. -da destination_addr Specifies the address to which you want your packets tunneled after reaching the proxy when in client mode, or restricts the desti- nation packets can be forwarded to when in server mode. -dp destination_port Specifies/restrict the port that the proxy should tunnel the TCP connection to. Shared options: -c network_device Specify the network interface to capture packets from. Note that packet capturing isn't always necessary, but you should try this if you experience problems with ptunnel. -v verbosity Controls the verbosity level. -1 is no output, 0 shows errors only, 1 shows info messages, 2 gives more output, 3 provides even more output, level 4 displays debug info and level 5 displays absolutely everything, including the nasty details of sends and receives. -udp Enables tunneling over UDP port 53 (DNS) instead of using ICMP. This will only work if your proxy can accept incoming traffic on port 53, and the client is able to send data to the proxy on port 53. Note that this option does not wrap ptunnel's data in DNS-com- pliant packets. This option must be given on both the proxy and client side for things to work correctly. -syslog (Not available on Windows.) Changes logging to use the built-in syslog fascility. -daemon file (Not available on Windows.) Run in background, writing PID in file. -u Attempts to run ptunnel without privileges. This doesn't usually work! On UNIX systems please consider using the following three options instead: -setuid user (Not available on Windows.) When started in privileged mode, drop down to user's rights as soon as possible. -setgid group (Not available on Windows.) When started in privileged mode, drop down to group's rights as soon as possible. -chroot dir (Not available on Windows.) When started in privileged mode, restrict file access to the specified directory. -setcon context (Not available on Windows.) Set SELinux context when all there is left to do are network I/O operations. In order to be able to combine with -chroot you will have to `mount --bind /proc /chrootdir/proc` -x password Specifies a password or passphrase to use. This will allow you to protect the proxy from use by others who don't know the password. It needs to be specified on both proxy and client. -f file Specifies a log file. If you specify -syslog, syslog is always used instead. -h Displays brief usage information. EXAMPLES
The following assumes that ptunnel is run as root, both on the proxy and client. To tunnel ssh connections from the client machine via a proxy running on proxy.pingtunnel.com to the computer login.domain.com, the following command line would be used: ptunnel -p proxy.pingtunnel.com -lp 8000 -da login.domain.com -dp 22 An ssh connection to login.domain.com can now be established as follows: ssh -p 8000 localhost If ssh complains about potential man-in-the-middle attacks, simply remove the offending key from the known_hosts file. The warning/error is expected if you have previously ssh'd to your local computer (i.e., ssh localhost), or you have used ptunnel to forward ssh connections to different hosts. Of course, for all of this to work, you need to start the proxy on your proxy-computer (proxy.pingtunnel.com). Doing this is very simple: ptunnel If you find that the proxy isn't working, you will need to enable packet capturing on the main network device. Currently this device is assumed to be an ethernet-device (i.e., ethernet or wireless). Packet capturing is enabled by giving the -c switch, and supplying the device name to capture packets on (for instance eth0 or en1). The same goes for the client. On Mac OS X, packet capturing must always be enabled (both for proxy and client), as resent packets won't be received otherwise. To protect yourself from others using your proxy, you can protect access to it with a password using the <tt>-x</tt> switch. The password is never sent in the clear, but keep in mind that it may be visible from tools like top or ps, which can display the command line used to start an application. EXIT STATUS
ptunnel does not exit until forced to do so by an interrupt (Ctrl-C) or if it crashes. BUGS
ptunnel currently does not handle packet capturing on network interfaces other than ethernet or wireless correctly. AUTHORS
Daniel Stoedle (daniels@cs.uit.no) Mike Miller (mike@mikeage.net) Sebastien Raveau (sebastien.raveau@epita.fr) LICENSE
ptunnel is licensed under the BSD License. AVAILABILITY
The ptunnel homepage is currently located here: http://www.cs.uit.no/~daniels/PingTunnel/ The freshmeat project page is located here: http://freshmeat.net/projects/ptunnel/ Please take the time to rate ptunnel if you find it useful. Thanks! Version 0.71 June 22, 2009 ptunnel(8)
All times are GMT -4. The time now is 04:21 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy