From owner-freebsd-questions Sun Apr 21 4:55:14 2002 Delivered-To: freebsd-questions@freebsd.org Received: from mta06-svc.ntlworld.com (mta06-svc.ntlworld.com [62.253.162.46]) by hub.freebsd.org (Postfix) with ESMTP id ED11937B400 for ; Sun, 21 Apr 2002 04:55:07 -0700 (PDT) Received: from lungfish.ntlworld.com ([80.4.0.215]) by mta06-svc.ntlworld.com (InterMail vM.4.01.03.27 201-229-121-127-20010626) with ESMTP id <20020421115506.NFJL20036.mta06-svc.ntlworld.com@lungfish.ntlworld.com>; Sun, 21 Apr 2002 12:55:06 +0100 Received: from tuatara.goatsucker.org (tuatara.goatsucker.org [192.168.1.6]) by lungfish.ntlworld.com (8.11.6/8.11.6) with ESMTP id g3LBt5V69566; Sun, 21 Apr 2002 12:55:05 +0100 (BST) (envelope-from scott@tuatara.goatsucker.org) Received: (from scott@localhost) by tuatara.goatsucker.org (8.11.6/8.11.6) id g3LBt4g14940; Sun, 21 Apr 2002 12:55:04 +0100 (BST) (envelope-from scott) Date: Sun, 21 Apr 2002 12:55:04 +0100 From: Scott Mitchell To: Steven Lake Cc: freebsd-questions@FreeBSD.ORG Subject: Re: Bounce login for VNC Message-ID: <20020421125504.D9124@fishballoon.dyndns.org> References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i In-Reply-To: ; from raiden@shell.core.com on Thu, Apr 18, 2002 at 07:48:37PM -0500 X-Operating-System: FreeBSD 4.5-STABLE i386 Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG On Thu, Apr 18, 2002 at 07:48:37PM -0500, Steven Lake wrote: > Ok, I've got a strange question about VNC. I'm wanting to do > terminal services into my Win98se box via my Fbsd box for security reasons > using VNC but I'm unsure if this is possible and how to do it. Basically > what I want to do is to terminal to my fbsd box, have it verify that I'm > legit, encrypt the transmission, then bounce the connection over to my > win98se box and connect using the fbsd box as a bridge. Is this possible > and if so, how? No sure if this exactly what you mean, but tightVNC has the -via option. From http://www.tightvnc.com/doc/man/vncviewer.1.html: -via gateway Automatically create encrypted TCP tunnel to the gateway machine before connection, connect to the host through that tunnel (TightVNC-specific). By default, this option invokes SSH local port forwarding, assuming that SSH client binary can be accessed as /usr/bin/ssh. Note that when using the -via option, the host machine name should be specified as known to the gateway machine, e.g. "localhost" denotes the gateway, not the machine where vncviewer was launched. See the ENVIRONMENT section below for the information on configuring the -via option. Very useful for getting to machines behind a firewall. tightVNC is in usr/ports/net/tightvnc, BTW. Scott -- =========================================================================== Scott Mitchell | PGP Key ID | "Eagles may soar, but weasels Cambridge, England | 0x54B171B9 | don't get sucked into jet engines" scott.mitchell@mail.com | 0xAA775B8B | -- Anon To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message