an option for google groups users

Discussion in 'UK Motorcycles' started by dog, Sep 13, 2007.

  1. dog

    dog Guest

    a tip for darsy and the like who have had their work internet access
    castrated by dopey sysadmins who think that cutting off outbound port 22
    access will result in fewer windows virus infections.

    exactly this happened to me the other day, but i worked out a solution
    by setting up a private http proxy (squid) on port 80 and using
    corkscrew

    http://www.agroman.net/corkscrew/

    to tunnel ssh over http using this proxy.

    obviously you need to have access to a server that can see the internet
    at large (and which doesn't have anything else running on port 80, or
    whichever other port your sysadmins haven't blocked), but it will support
    anything you can tunnel over ssh, which is most things.
     
    dog, Sep 13, 2007
    #1
    1. Advertisements

  2. dog

    Switters Guest

    Maybe they just have no business need for allowing SSH, NNTP, whatever
    through the firewall. It is theirs after all.
     
    Switters, Sep 13, 2007
    #2
    1. Advertisements

  3. dog

    dog Guest

    i'm giving their stated reason. and frankly, the "business need" is to keep
    me from fucking off and working for someone else, like the reason they buy
    me a chair instead of making me work standing up.
     
    dog, Sep 13, 2007
    #3
  4. dog

    TOG Guest


    Nice, very nice.
     
    TOG, Sep 13, 2007
    #4
  5. dog

    Switters Guest

    Have you tried that line on management yet?

    "I need usenet access so I can slack off, else I'm fucking off."
    "Bye."
     
    Switters, Sep 13, 2007
    #5
  6. dog

    Cab Guest

    Nice. For those that use *nix at work. Mind you, I am setting up a
    virtual server on my work PC at the mo with Redhat. I'll give it a
    crack.


    --
    Cab :^) - I'm dyslex-spic apparently
    GSX 1400 - Speedy Zimmerframe.
    UKRMMA#10 (KOTL), IbW#015, BoB#4, POTM#3, SKA#1
    email addy : ukrm_dot_cab_at_rosbif_dot_org
    The gingeometer: http://www.rosbif.org/ukrm/gingeometer/
     
    Cab, Sep 13, 2007
    #6
  7. dog

    Bod43 Guest

    I am pretty sure that ssh will work on any port. (Maybe that is what
    was just said:). Just set the ssh server to your desire.

    One reason for blocking it (sort of:) is that as mentioned you can
    tunnel anything over it and since it is encrupted no one can see
    what is afoot. Customer database leaves premises quietly.
     
    Bod43, Sep 13, 2007
    #7
  8. dog

    Ofnuts Guest


    Customer database can leave the premises in USB key/disk, MP3 player,
    Mobile phone... and if it's bigger they would notice the traffic.

    I used to work for a company who didn't trust us developers (who were
    nevertheless shareholders) to not export the code, so they gave us PCs
    without CD writers. But they forgot to block USB ports. And totally
    overestimated the size of the source code. Few programmers write more
    than 4k of working source code per day.
     
    Ofnuts, Sep 13, 2007
    #8
  9. dog

    Cab Guest

    Correct, it's just a simple change in your ssh setup. However, if your
    co blocks _all_ ports apart from basics such as http, https, ftp, etc,
    you're still stuffed. As I am.

    I don't think that's the case. I take my laptop home with me every day,
    as do countless others.


    --
    Cab :^) - I'm dyslex-spic apparently
    GSX 1400 - Speedy Zimmerframe.
    UKRMMA#10 (KOTL), IbW#015, BoB#4, POTM#3, SKA#1
    email addy : ukrm_dot_cab_at_rosbif_dot_org
    The gingeometer: http://www.rosbif.org/ukrm/gingeometer/
     
    Cab, Sep 14, 2007
    #9
  10. <Points to Openssh for Windows>

    You can run ssh on just about anything y'know - I even have a version
    for Windows Mobile..

    Phil.
     
    Phil Launchbury, Sep 14, 2007
    #10
  11. dog

    dog Guest

    you can do this, but any automated protocol detection system will see that
    you're not actually doing http over port 80 and report you sharpish.
    customer database can leave premises on a usb key without systems seeing
    what is afoot, and it's orders of magnitude easier for your average numpty
    to achieve.

    with a little more effort, customer database can be encrypted and uploaded
    to a remote http server as form data.
     
    dog, Sep 14, 2007
    #11
  12. dog

    Eddie Guest

    However, you should be able to run your ssh server on port 443, and tell
    your ssh client to use the correct HTTPS protocol. The connection just
    looks like standard HTTPS as far as the proxy is concerned.

    That's what I used to do, anyway.
     
    Eddie, Sep 14, 2007
    #12
  13. dog

    Eddie Guest

    See my reply to dog...
     
    Eddie, Sep 14, 2007
    #13
  14. Depends on whether your network people do the "block everything and only
    open approved ports" routine (and only via proxies - which will of course
    do protocol sniffing[1] and (as you say) kick you out for invalid use)

    Of course for some protocols (https) proxying is a little more tricky
    as it's an encrypted protocol - when I was playing with it a number of
    years back it was strictly a packet-forwarding proxy rather than a full
    application-level proxy.
    Most of these systems are put in in large organisations where the
    people in charge have very little idea how the technology actually
    works - a fact that the firewall vendor salesweasels take full
    advantage of.

    Lets not forget the other possibility - printing out the juicy bits and
    taking it out in chunks..

    Phil.
     
    Phil Launchbury, Sep 14, 2007
    #14
  15. dog

    Switters Guest

    Do you mean there are actually companies that *don't* do that?
     
    Switters, Sep 14, 2007
    #15
  16. dog

    ginge Guest

    Yep.

    I've got pretty much open internet access at work, no issues running
    MSN, NNTP, Pop3, terminal services sessions, or pretty much any app I
    chose.

    We do have a corporate security policy which includes firewall software
    on everybodies local machine though, and a restrictive (but user
    modifiable) standard policy.

    Perhaps the fact I work for a technology company is the reason they
    trust the userbase.
     
    ginge, Sep 14, 2007
    #16
  17. Mine (for one). We do maintain audit trails of activity (web/ftp
    activity) and a log of 'other non-recognised network traffic' but
    otherwise it isn't that restricted.

    What we *do* have it pretty strong virus scanning of all inbound and
    outbound network traffic.

    Phil.
     
    Phil Launchbury, Sep 14, 2007
    #17
  18. *Ding*

    You can do what you like here - but be aware that it's logged.. (well -
    except for my ssh sessions of course - there have to be *some*
    advantages to being the network manager as well as the IT manager..)
    Same here. Our standard anti-virus package includes a proper local
    firewall (and the users can't switch it off).
    Indeed. Although the people that give me the most grief tend to be the
    programmers..

    Phil
     
    Phil Launchbury, Sep 14, 2007
    #18
  19. dog

    Cab Guest

    Ah, I forgot about that. Actually, I used to use 443, until I played
    around with an https server for a while, then I forgot about it.

    --
    Cab :^) - I'm dyslex-spic apparently
    GSX 1400 - Speedy Zimmerframe.
    UKRMMA#10 (KOTL), IbW#015, BoB#4, POTM#3, SKA#1
    email addy : ukrm_dot_cab_at_rosbif_dot_org
    The gingeometer: http://www.rosbif.org/ukrm/gingeometer/
     
    Cab, Sep 14, 2007
    #19
  20. dog

    Cab Guest

    Can you email me the link please? I've searched for decent ssh clients
    on WM, but not found anything really great.

    --
    Cab :^) - I'm dyslex-spic apparently
    GSX 1400 - Speedy Zimmerframe.
    UKRMMA#10 (KOTL), IbW#015, BoB#4, POTM#3, SKA#1
    email addy : ukrm_dot_cab_at_rosbif_dot_org
    The gingeometer: http://www.rosbif.org/ukrm/gingeometer/
     
    Cab, Sep 14, 2007
    #20
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.