Port forwarding using PuTTY + SSH access encrypt agent

Principle is: the browser first link through the encrypted channel to a server outside the network; then through this server and then access the Internet. In a word, saying: around the wall access.

Conditions: This one outside the network server must have ssh login permission.

Specific steps:

1, Click here to download PuTTY.

2, configure PuTTY: Connection-> SSH-> Tunnels

Registry settings in Putty to configure tunnel, target set to Dynamic, add a port 7070, click Add, a dynamic port forwarding is realized.

Port forwarding using PuTTY + SSH access encrypt agent

Then the corresponding account login SHH: In addition to the terminal window, log on outside the local server 22, 7070 with a relationship between a SSH port forwarding channel was encrypted.

3, if you use Firefox browser, you can download the plug-in, set the socks proxy is transmitted through the local Or following settings: Tools - Advanced - Network - click on the Settings button - choose to use proxy and enter the socket proxy server address and port can be.

Port forwarding using PuTTY + SSH access encrypt agent

4, if you use IE or other browsers IE kernel, then "Tools-Internet Options - Connection" set up a proxy. Note: ip to, port 7070. The following diagram:

Port forwarding using PuTTY + SSH access encrypt agent

In this way too much trouble, putty plink comes with a lot of steps can be saved. plink putty package included in the Annex to download a complete version.
To create a new plink.exe a shortcut, and then adding the following parameters:
plink.exe-v-C-N-D root-P xx 98.143.xxx.xxx
Format translates to:
plink.exe - Show Details - enabled data compression - no shell - the dynamic port forwarding proxy IP: port remote host-l username-P remote host port remote host IP
Double-click the shortcut, it will display log information, and finally stopped at the location of the password, then enter the password for the remote host, carriage return, agents would enabled.
If security is not important to add a-pw parameters to automatically enter the password.


SSH access to foreign account or have Dreamhost SHH virtual host can increase the user: a similar mechanism can be used to encrypt access.

The setup is more simple and convenient way is to use the background command line program putty plink plink-N username@remote.ssh.server-D
One-N indicated that no shell
username@remote.ssh.server replace SHH account name and host your domain name or address or replace-load sessionname can also use dreamhost account tried it on, really quickly

How to use the Windows key log Linux server:

If the setting needs to be based on key login (if you do not set the key password, you can automatically log a),
I did not try to use puttygen generated key (public key / private key) directly deployed on Linux servers. Current success is: first, the server with the server using ./ssh- keygen generate key pairs, public key id_rsa.pub>> deployed to the server to log on to: / home / username / .ssh / authorized_keys , the key in the Windows client to use: the key id_rsa download to a local, then puttygen Save converted into id_rsa key id_rsa.ppk can putty format. Then use the plink-ic: pathtoid_rsa.ppk username@example.com log.


Encrypted channel and whether the site provides no direct relationship between the https, https means the service directly to customers of encryption, such as: GMail: https: / / mail.google.com / mail /, GReader: https: / / www. Google .com / reader / view /, from the ssh server to the service site is still clearly between the http transport;

Encrypted channel, and anonymous is not anonymous access to web sites not directly related.




分类:OS 时间:2010-03-04 人气:720
blog comments powered by Disqus


  • JavaScript to modify the registry to change the "Tools - Internet Options" (reprint) 2010-11-29

    Registry entries related to security settings Description: Registry Path: HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Internet Settings \ Zones 1. Zones item contains the definition for the computer, said security zone for e

  • How to use the proxy server 2010-11-18

    A few days ago, I consulted with two colleagues, how to use a proxy, I found the process or with a lot of, rather than tell them to listen to me step by step, it is better to write a tutorial, so that they can better understand and operate. Here I wi

  • Set up a proxy server using the Apache 2010-06-20

    Apache is the best known of HTTP server. In fact, it not only as a server, and can be used to set up a proxy server. This article on how to use the Apache HTTP proxy server set up instructions. This will be based on Win32 version of Apache 2.0.47 for

  • Set up a proxy server using Apache 2010-12-23

    As we all know is the best Apache HTTP server. In fact, it can not only use as a server, can also be used to set up a proxy server. This article on how to use the Apache HTTP proxy server set up instructions. This will be based on the Win32 version o

  • java using a proxy server to access the network 2010-03-29

    This technique will show you on how to write access to the Internet through a proxy Web server Java applications. In the Java applications by adding an extra agent support just write a few lines of code, and does not rely on any security "loopholes.&

  • How to add a carriage return in the event page 2010-04-02

    The content is purely on-line data collection, not original, I hope to help people in need. <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns=

  • Carriage return line feed (\ r \ n) order 2010-04-20

    Subject: carriage return, line feed! Environment: Window The keyboard "Enter" key to almost no one does not know, something well-known, carriage return, line feed many people and remembered very difficult to talk normally, but specific to text p

  • squid learning step: configure squid proxy server to forward 2010-04-29

    In order to get completely figure out a large number of squid configuration options, in the work of its capability to use it, I read <squid The authoritative guide to Chinese manual > (Peng Yonghua translation) Harvest a great deal, the first Linux

  • Share this network through the wireless network card to another laptop Internet access 2010-05-04

    Two notebooks (both integrated WIFI wireless network card), but only one cable; including a laptop through the network cable connected to the network can share the network via the wireless network card to another laptop: Assume that there are two com

  • String in the textarea containing the carriage return line feed replaced the javascript code <br> 2010-07-14

    1 House textarea.value.replace (/ \ n / g, "<br>"); 2nd Floor s = textarea.value.replace (/ \ r \ n / g, "<br>"); 3 House press immediately replaced when V contentEditable = "true"> In fact, many people have lo

iOS 开发

Android 开发

Python 开发



PHP 开发

Ruby 开发






Javascript 开发

.NET 开发



Copyright (C) codeweblog.com, All Rights Reserved.

CodeWeblog.com 版权所有 闽ICP备15018612号

processed in 0.138 (s). 13 q(s)