úterý 21. dubna 2009

... from behind of firewall ...

It is a hard life behind the firewall/nat. To make life easier I use several methods. All of them depends on my Asus 500g Premium with OpenWrt Kamikaze 8.09.

SSH dropbear server is running on the Asus router accepting connection on public IP on port 22.

OpenVPN server is running on the router on port 443.

Behind really restrictive firewall I use OpenVPN using the proxy to connect the computer to the router VPN.

To redirect traffic from certain applications I use putty dynamic tunneling feature in cooperation with freecap proxyfier.

How to setup:
  • connect to the VPN using OpenVPN - passing through firewall should work because 443 port is used.
  • run putty with dynamic tunneling turned on (putty -D 3333 router.fqdn.com)
  • putty created socks proxy listening on localhost port 3333
  • launch freecap and set default proxy to localhost:3333
  • add an application that needs to be tunneled into the freecap
  • start the application through freecap - from this point the application will use the socks proxy created by ssh dynamic tunnel even if the application is not aware of SOCKS
And voila ... every application works magicaly from behind the firewall.

.... crying because you do not have a machine with public IP available? Don't you cry and use some free virtual server hosting ;-).