On Monday August 11 2003 03:35 pm, B Smith wrote: > Here's the question. Say I'm connecting to a remote IMAP server that > also runs SSH, and I want to forward all of my traffic through an > encrypted tunnel. From my local client I would issue something like > this: ssh -2 -f [EMAIL PROTECTED] 3333:remoteserver:143 sleep > 600 , and then redirect my local IMAP client to port 3333 on my on > own machine. I'm curious as to what happens to the packets after sshd > on the remote server gets them. Would they be decrypted and treated > like any other packet arriving on the interface, going through all of > the iptables rules and such? > Thanks for the help.
We just did something similar to connect to a postgreSQl database using a ssh tunnel. Once the packets arrive on the other side of the ssh tunnel, the request looks like it is a local request, i.e. as if it were on a shell on the server connecting to the database. This was neat as we had the postgres security set to accept only those connections from the servers ip address, in addition to blocking port 5432 (for postgres) to the server. IMAP(or some other protocol) would not function any differently, so any rules that you have set checking packets from the servers ip address would apply. z -- TriLUG mailing list : http://www.trilug.org/mailman/listinfo/trilug TriLUG Organizational FAQ : http://trilug.org/faq/ TriLUG Member Services FAQ : http://members.trilug.org/services_faq/ TriLUG PGP Keyring : http://trilug.org/~chrish/trilug.asc
