Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

ssh-http-proxy-connect(1) [opensolaris man page]

ssh-http-proxy-connect(1)					   User Commands					 ssh-http-proxy-connect(1)

NAME
ssh-http-proxy-connect - Secure Shell proxy for HTTP SYNOPSIS
/usr/lib/ssh/ssh-http-proxy-connect [-h http_proxy_host] [-p http_proxy_port] connect_host connect_port DESCRIPTION
A proxy command for ssh(1) that uses HTTP CONNECT. Typical use is where connections external to a network are only allowed via a proxy web server. OPTIONS
The following options are supported: -h http_proxy_host Specifies the proxy web server through which to connect. Overrides the HTTPPROXY and http_proxy environment variables if they are set. -p http_proxy_port Specifies the port on which the proxy web server runs. If not specified, port 80 is assumed. Overrides the HTTPPROXY- PORT and http_proxy environment variables if they are set. OPERANDS
The following operands are supported: http_proxy_host The host name or IP address (IPv4 or IPv6) of the proxy. http_proxy_port The numeric port number to connect to on http_proxy_host. connect_host The name of the remote host to which the proxy web server is to connect you. connect_port The numeric port number of the proxy web server to connect you to on http_proxy_host. EXAMPLES
The recommended way to use a proxy connection command is to configure the ProxyCommand in ssh_config(4) (see Example 1 and Example 2). Example 3 shows how the proxy command can be specified on the command line when running ssh(1). Example 1 Setting the proxy from the environment The following example uses ssh-http-proxy-connect in ssh_config(4) when the proxy is set from the environment: Host playtime.foo.com ProxyCommand /usr/lib/ssh/ssh-http-proxy-connect playtime.foo.com 22 Example 2 Overriding proxy environment variables The following example uses ssh-http-proxy-connect in ssh_config(4) to override (or if not set) proxy environment variables: Host playtime.foo.com ProxyCommand /usr/lib/ssh/ssh-http-proxy-connect -h webcache -p 8080 playtime.foo.com 22 Example 3 Using the command line The following example uses ssh-http-proxy-connect from the ssh(1) command line: example$ ssh -o'ProxyCommand="/usr/lib/ssh/ssh-http-proxy-connect -h webcache -p 8080 playtime.foo.com 22"' playtime.foo.com ENVIRONMENT VARIABLES
HTTPPROXY Takes the http_proxy_host operand to specify the default proxy host. Overrides http_proxy if both are set. HTTPPROXYPORT Takes the http_proxy_port operand to specify the default proxy port. Ignored if HTTPPROXY is not set. http_proxy URL format for specifying proxy host and port. EXIT STATUS
The following exit values are returned: 0 Successful completion. 1 An error occurred. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWsshu | +-----------------------------+-----------------------------+ |Interface Stability |Stable | +-----------------------------+-----------------------------+ SEE ALSO
ssh(1), ssh-socks5-proxy-connect(1), ssh_config(4), attributes(5) SunOS 5.11 24 Oct 2001 ssh-http-proxy-connect(1)

Check Out this Related Man Page

scanssh(1)						    BSD General Commands Manual 						scanssh(1)

NAME
scanssh -- scans the Internet for open proxies and SSH servers SYNOPSIS
scanssh [-VIERph] [-s scanners,...] [-n ports,...] [-e excludefile] addresses... DESCRIPTION
ScanSSH scans the given addresses and networks for running services. It mainly allows the detection of open proxies and Internet services. For known services, ScanSSH will query their version number and displays the results in a list. The adresses can be either specified as an IPv4 address or an CIDR like IP prefix, ipaddress/masklength. Ports can be appended by adding a colon at the end of address specification. Additionally, the following two commands can be prefixed to the address: random(n[,seed])/ The random command selects random address from the address range specified. The arguments are as follows: n is the number of address to randomly create in the given network and seed is a seed for the pseudo random number generator. split(s,e)/ The split command is used to split the address range in several unique components. This can be use to scan from serveral hosts in parallel. The arguments are as follows: e specifies the number of hosts scanning in parallel and s is the number of the host this particular scan runs on. The options are as follows: -V Causes scanssh to print its version number. -I Does not send a SSH identification string. -E Exit the program, if the file containing the addresses for exclusion can not be found. -R If addresses are generated at random, this flag causes the program to ignore excluded addresses from the exclude file. The default behaviour is to always exclude addresses. -p Specifies that ScanSSH should operate as a proxy detector. This flag sets the default modes and default scanners to detect open proxies. -h Displays the usage of the program. -n ports,... Specifies the port numbers to scan. Ports are separated by commas. Each specified scanner is run for each port in this list. The default is 22. -s scanners Specifies a number of scanners should be executed for each open port. Multiple scanners are separated by commas. The fol- lowing scanners are currently supported: ssh Finds versions for SSH, Web and SMTP servers. socks5 Detects if a SOCKS V5 proxy is running on the port. socks4 Detects if a SOCKS V4 proxy is running on the port. http-proxy Detects a HTTP get proxy. http-connect Detects a HTTP connect proxy. telnet-proxy Detects telnet based proxy servers. -e excludefile Specifies the file that contains the addresses to be excluded from the scan. The syntax is the same as for the addresses on the command line. The output from scanssh contains only IP addresses. However, the IP addresses can be converted to names with the logresolve(8) tool included in the Apache webserver. EXAMPLES
The following command scans the class C network 10.0.0.0 - 10.0.0.255 for open proxies: scanssh -p 10.0.0.0/24 The next command scans for ssh servers on port 22 only: scanssh -n 22 -s ssh 192.168.0.0/16 The following command can be used in a parallel scan. Two hosts scan the specified networks randomly, where this is the first host: scanssh 'random(0,rsd)/split(1,2)/(192.168.0.0/16 10.1.0.0/24):22,80' BUGS
At the moment, scanssh leaves a one line entry in the log file of the ssh server. It is probably not possible to avoid that. BSD
July 17, 2000 BSD
Man Page