I've just worked out a pretty good technique: "home" terminal 1: ssh -L 3456:webserver:22 [EMAIL PROTECTED]
"home" terminal 2: ssh -p 3456 -L 2345:localhost:80 [EMAIL PROTECTED] And then I just browse to "localhost:2345" to access the web site. It's encrypted the whole way through, I'm fairly sure. The only problem is that you have to delete the key for "home" from known_hosts, since the second ssh command above thinks it's connecting to "home", when in fact it's connecting to "webserver". Any ideas on how to prevent this from happening? It's not a big deal, but some people might be concerned about deleting keys from known_hosts. -- View this message in context: http://www.nabble.com/Tunneling-through-unfriendly-firewalls-tf2830640.html#a7903352 Sent from the SSH (Secure Shell) mailing list archive at Nabble.com.
