Re: two questions about ssh tunneling

2009-12-05 Thread Celejar
On Fri, 4 Dec 2009 14:13:11 -0800 Tyler MacDonald ty...@macdonald.name wrote: ... I believe when you use SOCKS, your browser stops doing DNS resolution and just hands the hostnames directly to the SOCKS server. So all they would be able to sniff is your encrypted SSH session, which they

Re: two questions about ssh tunneling

2009-12-05 Thread Celejar
On Fri, 4 Dec 2009 14:13:11 -0800 Tyler MacDonald ty...@macdonald.name wrote: Tudod Ki tudodk...@yahoo.com wrote: ... - Can anyone sniff the traffic of computer B? e.g.: B computer is at a - server farm [others in the farm can see the traffic?] - I think yes, but - I'm not sure :O

Re: two questions about ssh tunneling

2009-12-04 Thread Tyler MacDonald
Tudod Ki tudodk...@yahoo.com wrote: if I: ssh -fND localhost:6000 someb...@192.168.56.5 -p PORTNUMBER from computer A to computer B [B = 192.168.56.5] then I can set the SOCKS proxy for e.g.: Firefox to use localhost:6000 on computer A. Ok. I can surf the web through B. But: - Can

Re: two questions about ssh tunneling

2009-12-04 Thread Tudod Ki
...@macdonald.name Subject: Re: two questions about ssh tunneling To: Tudod Ki tudodk...@yahoo.com Cc: Debian User debian-user@lists.debian.org Date: Friday, December 4, 2009, 10:13 PM Tudod Ki tudodk...@yahoo.com wrote: if I: ssh -fND localhost:6000 someb...@192.168.56.5 -p PORTNUMBER from computer

Re: two questions about ssh tunneling

2009-12-04 Thread Tyler MacDonald
Tudod Ki tudodk...@yahoo.com wrote: but what's with cam attack? http://en.wikipedia.org/wiki/CAM_Table#Attacks they could attack a switch, and it will act as a hub? and then they can set promiscuous mode on their cards and sniff Hmm. I didn't know about that one! I suppose it's