From owner-freebsd-questions@FreeBSD.ORG Sat Aug 27 01:10:16 2005 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 40B2D16A41F for ; Sat, 27 Aug 2005 01:10:16 +0000 (GMT) (envelope-from sineathj1@citadel.edu) Received: from imf20aec.mail.bellsouth.net (imf20aec.mail.bellsouth.net [205.152.59.68]) by mx1.FreeBSD.org (Postfix) with ESMTP id B8EAD43D46 for ; Sat, 27 Aug 2005 01:10:15 +0000 (GMT) (envelope-from sineathj1@citadel.edu) Received: from ibm62aec.bellsouth.net ([70.144.61.230]) by imf20aec.mail.bellsouth.net with ESMTP id <20050827011014.VFUC3998.imf20aec.mail.bellsouth.net@ibm62aec.bellsouth.net> for ; Fri, 26 Aug 2005 21:10:14 -0400 Received: from IBMTWAQPEF2DWZ ([70.144.61.230]) by ibm62aec.bellsouth.net with SMTP id <20050827011014.IQLA10334.ibm62aec.bellsouth.net@IBMTWAQPEF2DWZ>; Fri, 26 Aug 2005 21:10:14 -0400 Message-ID: <00cf01c5aaa4$148e8490$030a000a@IBMTWAQPEF2DWZ> From: "James Bowman Sineath, III" To: , "Toomas Laasik" References: <20050824213524.E91331A52F@portal.hot.ee> Date: Fri, 26 Aug 2005 21:10:14 -0400 MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset="iso-8859-1"; reply-type=original Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.2180 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180 Cc: Subject: Re: anonymous ssh forwarding X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 27 Aug 2005 01:10:16 -0000 I would highly discourage you from doing this, especially without the permission of your company. Just make sure that your admin knows that you are doing this and make sure that your BSD box at home is properly secured. Keep in mind that if your system at home is compromised then your system at work is open to attack. Anyhow, couldn't you just ssh into your box at home and then ssh to the system at work from there? I think this would be an easier and safer solution than creating a tunnel. Bow Sineath Class of 2006, the Citadel sineathj1@citadel.edu - bow.sineath@gmail.com ----- Original Message ----- From: "Toomas Laasik" To: Sent: Wednesday, August 24, 2005 5:35 PM Subject: anonymous ssh forwarding Hello, I have the following situation. Our company has a ssh server where users can connect from only specified static ip addresses. Like I have at home an ip address 1.2.3.4 and ssh server accepts connections only from it. Now I wan't to get access to that ssh server from places where I don't have static ip. I already have at home a freebsd server running with simple configutation. Is it possible to make some kind of tunnel or something so I could connect to my home freebsd machine that connects to ssh server so that ssh server 'thinks' that I'm connecting from home? Thank you in advance. Sorry for bad English Toomas ----------------------------------------- ITV - Sinu lemmiksaated internetis! http://www.itv.ee _______________________________________________ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.org"