mjrich wrote:
Are you sure you actually need a tunnel ? If it's only to log in via ssh, just use
Code:
ssh -p 3456 <linode>
yes. the linode is listening on that port and that's how i connect from home. but the firewall at work is blocking outgoing traffic to all but a couple of ports....
pclissold wrote:
...If your work is anything like mine, they block pretty much everything except 80, 443...
... those very ones in fact.
pclissold wrote:
....Configure your sshd to listen on port 443...
...saves having the network thought police wondering what all that encrypted traffic is doing on one of their allowed ports....
i could do that, but then that removes the suposed advantage of running sshd on an obscure custom port, which all the linode setup tutorials advise me to do.
i'm not too bothered about the 'network thought police' as such. i've got a genuine work-related reason for wanting to be able to connect to my linode from behind work's firewall, from time to time. so i doubt i'll get my knuckles rapped over it. i just thought if i could set up a tunnel, it would be less hassle [and several ice-ages quicker!] than trying to convince some network manager to open port 3456 for me.
in spite of all i've read on this, i'm not really sure that i've got the right end of the stick as to whether a tunnel can do what i want or not. most of the examples i've read tend to refer to things like connecting securely to read your email, while connected to an insecure network in a hotel or cybercafé. so i'm finding it confusing, trying to relate it to my situation.
so is it even possible?...
i connect out from work through one of the open ports [80 or 443] and by the magic of ssh tunnelling it gets delivered to my linode on port 3456
_________________
**************************
Mental Diarrhoea**************************