Are You stuck behind a firewall?
Does your school, library, work, or parents control where you surf and what ports you have open? Do you surf on such public domains and need more privacy? Are you sick of failing proxies? If you answered ‘Y’ to any of these questions then this tutorial is for you.
My Story
My place of employment has a firewall and it blocks nearly all outbound protocols and many great sites, such as foxhop.net or youtube.com. I need a way to get around the blocks and not get caught.
.. contents:: Sections
What is the best way to get around a firewall?
Create an SSH tunnel from the work network to your home network.
My network administrator is smart, will I get caught?
No, you will most likely not get caught. All the firewall sees is a connection to a resource on the internet. When you browse the web using the tunnel all traffic is encrypted. If a network administrator captured packets he would only get garbage data. An SSH tunnel is basically a VPN between two computers or networks. 1337
Can a network admin stop a person or computer from tunneling?
The Admin will typically not know about the tunnel. From his view a tiny connection is being placed and is normally overlooked. The admin does have the ability to block the default SSH port 22. You can build your tunnel over any port (80 or 443).
.. _Putty.exe: http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html .. _Firefox: http://portableapps.com/apps/internet/firefox_portable
We will discuss the steps of building an SSH Tunnel for HTTP traffic between two computers on different networks. This guide will cover both windows and linux localhosts.
Throughout this guide I will use the following terms, here are the definitions:
localhost The computer at work or school. remotehost The computer or server that is offsite, which has the SSH server running.
What you need …
Why is this the best method?
Follow this guide if your localhost (school or work) computer is Windows based.
Configure the SSH Server ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The remotehost just needs to have an SSH server installed, no configuration is needed.
This server could be running anywhere on the internet, we just need credentials to login.
To install openssh-server on Debian or Ubuntu linux type:
.. code-block:: bash
sudo apt-get install openssh-server
When I’m at work, I establish an SSH Tunnel to my remotehost webserver at home.
Keep in mind that this doesn’t have to be your server, you just need credentials for SSH.
Configure the SSH Client ~~~~~~~~~~~~~~~~~~~~~~~~~~~ #. Download Putty.exe_ if you haven’t already, you should follow along.
Double click Putty.exe_.
.. image:: http://engineer.siue.edu/puttyConnectScreen.gif
The ‘Host Name (or IP address)’ box should point to the SSH enabled remoteserver.
Toggle the SSH radio button to set the port to 22. (The native SSH port).
Type a name into the ‘Saved Sessions’ box to save all the settings we toggle.
Click the save button.
There is a list of categories to the left of the putty window.
Navigate to: ( Connection > SSH > Tunnel )
You should be at a menu that is labeled ‘Options controlling SSH port forwarding’.
Click the ‘Dynamic’ radio button.
Leave ‘Destination’ text box blank.
Type ‘7070’ into the ‘Source port’ text box.
Click the ‘Add’ button.
Save your configuration by going back to the ‘Session’ category, selecting your saved session, and pressing the ‘save’ button.
Double-click your saved session.
A black terminal window should appear.
You will be prompted for a username and password.
You should be greeted by the server if successful. Leave the putty window open.
Configure Firefox... <#configure-firefox-to-use-the-ssh-tunnel>_
Follow this guide if your localhost (work or school) computer is Linux.
Create the tunnel ~~~~~~~~~~~~~~~~~~~~~~
Open a terminal or console window, and enter the following command:
.. code-block:: bash
ssh -D 7070 user@remotehost_ip
You will be prompted for credentials on the remotehost.
All you need to do is login to establish the tunnel.
Setup Socks 5 proxy.
Open Firefox_.
Click Edit -> Preferences
Click the Advanced and Network tabs.
Click the Settings… button.
Click the Manual Proxy Configuration radio button
In Socks Host type localhost. In port type 7070.
.. image:: /attachment/ff-settings.jpg :align: left
You should now be able to browse the Internet using your remote connection. All data will be passed through the remote hosts internet connection. All traffic will be encrypted between the localhost and the remotehost.
.. code-block:: bash
ssh -L
ssh -L 31337:remote.foxhop.net:5900 user@foxhop.net
ssh -L 31338:remote2.foxhop.net:5900 user@foxhop.net
Then open vnc and point to 127.0.0.1:31338 or 127.0.0.1:31337
about:config
network.proxy.socks_remote_dns user set boolean true
In this scenario we are running a development web server (port 8888) on our workstation (joe) from our home network. We would like to grant access to this development web server to people on the work network. We have ssh access to a host (mary) on the work network.
We must enable GatewayPorts in mary:/etc/ssh/sshd_config to allow binding to 0.0.0.0 instead of 127.0.0.1:
.. code-block:: config
# Allow this host to bind forwarded ports to 0.0.0.0 instead of 127.0.0.1 # Service will appear to run on this host, but will get forwarded over tunnel GatewayPorts yes
We create a remote port forwarding tunnel from joe to mary:
.. code-block:: bash
# -g means gateway -R means remote port forwarding # prompt:~$ ssh -g
-R
When the tunnel opens, verify that mary is binding/listening to 0.0.0.0:8888:
.. code-block:: bash
user@mary:~$ sudo netstat -nap | grep 8888 tcp 0 0 0.0.0.0:8888
0.0.0.0:* LISTEN 17921/0
tcp6 0 0 :::8888 :::* LISTEN 17921/0
Now people at work can access the home workstation web server running on joe by connecting to ://mary:8888 !