![]() This means that all web resources accessible to the remote server will now be accessible to your browser. With this -D option and a browser setting (see below), your SSH connection will be a true SOCKS proxy! It will allow your web browser to dialog through an encrypted SSH tunnel to the remote SSH server’s network card as if it were its own. The latter enables the dynamic forwarding feature of SSH which supports the SOCKS4 and SOCKS5 protocols. Just as creating an SSH tunnel is done with the simple -L option in SSH, starting an SSH SOCKS proxy just requires the -D option. Having said that, let’s get a little technical and get back to what we’re interested in today: implementing a SOCKS proxy through an SSH tunnel! HTTP reverse proxy servers (NGINX, APACHE…) are a crucial link for load-balancing (HAProxy) or even for container-based micro-services architectures (Docker…). Generally placed in front of a web server, it allows users to access servers of an internal and private network in all transparency (hence the notion of reverse proxy). The reverse proxy which is a very particular application.But this is not the subject of my article. For this specific use of a proxy, one should preferably use a chain of several proxies (a bit like TOR and one should couple this method with VPN for example. I don’t like this term very much because in reality a simple proxy can be easily “remounted”. The proxy is used as an intermediary, it is located on another network (another country, at home, in a DC…) and will not be affected by the filtering rules in place on the network where you are physically present. The bypassing proxy whose objective is the opposite of the previous one. ![]() The filtering proxy : mainly used in companies and schools, it allows to apply filtering rules limiting access to certain URLs for example.There are many uses for a proxy but I will stop at 4 uses that I consider to be the main ones: If you want to use an “anonymizing” public/open proxy ( never do that…) it’s the same thing. If you use a corporate or school filtering proxy for example, all your browsing data can be read, be aware of that. This means that you must have absolute confidence in the proxy server you use. Proxy means agent, so it’s a server (in other words another machine) to which you will send data and to which you give “mandate” to route these data. The goal here is to access another network to bypass the limits of a firewall or to access services, web interfaces… available on this other network. This article is not intended to anonymize an internet connection. ![]() Then I will show you a simple method to set up a SOCKS proxy through an SSH tunnel. In this article, I will introduce you to the concept of proxy and its uses. You will compromise your data and the risk is always much higher than the potential benefit. IMPORTANT: Never use a free public proxy.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |