Displaying 13 results from an estimated 13 matches for "sslh".
Did you mean:
ssh
2011 Nov 12
1
tinc behind sslh
Hello Guus.
I've reading mailing list archives threads about it at http://www.tinc-vpn.org/pipermail/tinc/2011-July/thread.html#2757 and http://rutschle.net/pipermail/sslh/2011-July/thread.html and now trying to hide tinc server behind sslh multiplexer but without luck.
First of all directly it works fine. Initiator (instance of tincd with ConnectTo statement) successfully establishes connection and run tunnel with server (instance of tincd witch is listening for in...
2014 Jan 28
1
[SUSPECTED SPAM] default change in 6.2 breaks sslh
Hi all!
I'm using sslh. It's a multiplexer, used to let you have ssh, https,
stunnel, etc on one port.
In 6.2 there is a change in default behaviour:
* ssh(1): When SSH protocol 2 only is selected (the default), ssh(1)
now immediately sends its SSH protocol banner to the server without
waiting to receive the...
2011 Jul 24
1
tinc in sslh
Hi all,
few days ago I have installed sslh on my server and I discover that
recently OpenVPN support was added.
Reading the code I found that sslh use the first few bytes of the new
connection to decide what kind of connection it is, than it muxes the
connection on the appropriate deamon.
There is a "sign" for the tinc connection...
2019 Jan 04
3
[SUSPECTED SPAM] VPN over SSH: State of the art?
I know that this has been discussed before and I know that you should avoid
it, and use a real VPN solution.
I would like to move from port-forwarding via ssh to VPN and I have only
the ssh port open.
What is the current state of the art if you want to create VPN over ssh?
Regards,
Thomas
--
Thomas Guettler http://www.thomas-guettler.de/
I am looking for feedback:
2014 Jun 01
1
Tips punching through tight firewalls
Any tips or guidance on improving the probability of being able to connect
to a Tinc daemon.
I am currently on a guest wifi at a hospital for my in-laws family. Wanting
to pass time and be semi productive, I tried to VPN back to my private
networks but it appears the default port Tinc users is blocked.
Here is what I know about their firewall:
2013 Oct 19
1
[Announcement] Tinc version 1.0.23 released
With pleasure we announce the release of tinc version 1.0.23. Here is a
summary of the changes:
* Start authentication immediately on outgoing connections (useful for sslh).
* Fixed segfault when Name = $HOST but $HOST is not set.
* Updated the build system and the documentation.
* Clean up child processes left over from Proxy = exec.
This version of tinc is compatible with 1.0pre8, 1.0 and later, but not
with earlier version of tinc.
Note that this will be o...
2013 Oct 19
1
[Announcement] Tinc version 1.0.23 released
With pleasure we announce the release of tinc version 1.0.23. Here is a
summary of the changes:
* Start authentication immediately on outgoing connections (useful for sslh).
* Fixed segfault when Name = $HOST but $HOST is not set.
* Updated the build system and the documentation.
* Clean up child processes left over from Proxy = exec.
This version of tinc is compatible with 1.0pre8, 1.0 and later, but not
with earlier version of tinc.
Note that this will be o...
2015 Apr 15
2
UDP Listening a Different Port
Hi all,
I am behind a firewall which only let UDP 80 go through. In order to
connect to an outside public node by UDP, I can set
...
Port = 80
...
However, an httpd is running on the public node, occupying TCP 80.
How can I configure tinc to bind on TCP 8080 but listen to UDP 80?
Redirecting UDP 80 to UDP 8080 on the public node is one method. Is
there a more elegant way to
2019 Dec 06
2
client to support SNI
.../man.openbsd.org/ssh_config.5
It looks like that the OpenSSH community don't like to implement such a feature,
from my point of vies. Maybe there is a possibility to use the ProxyCommand for
a solution?
https://man.openbsd.org/ssh_config.5#ProxyCommand
The Server http://www.rutschle.net/tech/sslh/README.html offers the possibility
to handle HTTPS & SSH on the same port therefore it would be nice to have a
client witch helps HTTPS front doors to select the right backend based on SNI
Header.
Any suggestions for a possible solution?
Best regards
Alex
2020 Feb 14
2
Announce: OpenSSH 8.2 released
...o new
hostkey prompts, ignore whitespace surrounding the fingerprint
itself.
* All: wait for file descriptors to be readable or writeable during
non-blocking connect, not just readable. Prevents a timeout when
the server doesn't immediately send a banner (e.g. multiplexers
like sslh)
* sshd_config(5): document the sntrup4591761x25519-sha512 at tinyssh.org
key exchange algorithm. PR#151
Portability
-----------
* sshd(8): multiple adjustments to the Linux seccomp sandbox:
- Non-fatally deny IPC syscalls in sandbox
- Allow clock_gettime64() in sandbox (MIPS / glibc...
2020 Feb 14
2
Announce: OpenSSH 8.2 released
...o new
hostkey prompts, ignore whitespace surrounding the fingerprint
itself.
* All: wait for file descriptors to be readable or writeable during
non-blocking connect, not just readable. Prevents a timeout when
the server doesn't immediately send a banner (e.g. multiplexers
like sslh)
* sshd_config(5): document the sntrup4591761x25519-sha512 at tinyssh.org
key exchange algorithm. PR#151
Portability
-----------
* sshd(8): multiple adjustments to the Linux seccomp sandbox:
- Non-fatally deny IPC syscalls in sandbox
- Allow clock_gettime64() in sandbox (MIPS / glibc...
2020 Feb 14
2
Announce: OpenSSH 8.2 released
...o new
hostkey prompts, ignore whitespace surrounding the fingerprint
itself.
* All: wait for file descriptors to be readable or writeable during
non-blocking connect, not just readable. Prevents a timeout when
the server doesn't immediately send a banner (e.g. multiplexers
like sslh)
* sshd_config(5): document the sntrup4591761x25519-sha512 at tinyssh.org
key exchange algorithm. PR#151
Portability
-----------
* sshd(8): multiple adjustments to the Linux seccomp sandbox:
- Non-fatally deny IPC syscalls in sandbox
- Allow clock_gettime64() in sandbox (MIPS / glibc...
2020 Feb 05
19
Call for testing: OpenSSH 8.2
...o new
hostkey prompts, ignore whitespace surrounding the fingerprint
itself.
* All: wait for file descriptors to be readable or writeable during
non-blocking connect, not just readable. Prevents a timeout when
the server doesn't immediately send a banner (e.g. multiplexers
like sslh)
* sshd_config(5): document the sntrup4591761x25519-sha512 at tinyssh.org
key exchange algorithm. PR#151
Portability
-----------
* sshd(8): multiple adjustments to the Linux seccomp sandbox:
- Non-fatally deny IPC syscalls in sandbox
- Allow clock_gettime64() in sandbox (MIPS / glibc...