Hi Raj,

Thanx a lot. That *really* helped me understanding the application.
Now I think its simple socket programming left. :) .

One more query. Does the ssh server keeps information about user identity?
SO that even if someone else grabs the password (unauthorized), he cant
enter the server without sending the identification certificate? Do we
need some cnfiguration in sshd?

>>Hi Lohit,
>>
>>Yes, you can tunnel almost any TCP protocol through SSH, and no, you
>>don't need a Perl module.
>>
>>Here's a sample scenario:
>>
>>Your daemon is running on server system S on port 5555
>>The ssh daemon is running on S (required)
>>Your client is connecting from client system C.
>> ,...........
>>.............
>>to port 1234 on system S.  In fact, /anyone/ who connects to port 9999 
>>on C will be automatically, securely be connected to S:1234.
>>
>>HTH,
>>
>>-- Raju


-----------------------------------------------------------------------
For information on this and other Linux India mailing lists check out
http://lists.linux-india.org/

Reply via email to