I've just worked out a pretty good technique:

"home" terminal 1:
ssh -L 3456:webserver:22 [EMAIL PROTECTED]

"home" terminal 2:
ssh -p 3456 -L 2345:localhost:80 [EMAIL PROTECTED]

And then I just browse to "localhost:2345" to access the web site. It's
encrypted the whole way through, I'm fairly sure.

The only problem is that you have to delete the key for "home" from
known_hosts, since the second ssh command above thinks it's connecting to
"home", when in fact it's connecting to "webserver". Any ideas on how to
prevent this from happening? It's not a big deal, but some people might be
concerned about deleting keys from known_hosts.
-- 
View this message in context: 
http://www.nabble.com/Tunneling-through-unfriendly-firewalls-tf2830640.html#a7903352
Sent from the SSH (Secure Shell) mailing list archive at Nabble.com.

Reply via email to