Reposted from http://www.linuxjournal.com/content/surf-safely-sshuttle
Mind you, sshuttle isn't a new program. It isn't even a new concept. What it is, however, is pure awesome. Basically, launching the sshuttle binary with root privileges will modify your system firewall to tunnel all (yes all) traffic through a remote SSH connection. The remote connection doesn't even need administrator privileges, so your shell account at your Web host might suffice for securing your traffic in a hotel or coffee shop. sshuttle will even tunnel your DNS lookups, which means your entire network interaction should be secure and encrypted.
sshuttle is in many OS repositories, or you can downloaded it from https://github.com/apenwarr/sshuttle.
With a simple
all your traffic will be encrypted and funneled through the remote server. Because DNS also is tunneled, it means you won't be vulnerable to DNS poisoning either! Check out sshuttle today. You won't be sorry.
On Fedora
$ sudo yum -y install sshuttle
Then
$ sshuttle --dns -vvr [username]@server[:port] 0/0
If you have Error 255 issues with the VPN not connecting, then you should try excluding the subnet of the remote system from forwarding.
$ sshuttle --dns -vvr [username]@server[:port] -x server 0/0
Mind you, sshuttle isn't a new program. It isn't even a new concept. What it is, however, is pure awesome. Basically, launching the sshuttle binary with root privileges will modify your system firewall to tunnel all (yes all) traffic through a remote SSH connection. The remote connection doesn't even need administrator privileges, so your shell account at your Web host might suffice for securing your traffic in a hotel or coffee shop. sshuttle will even tunnel your DNS lookups, which means your entire network interaction should be secure and encrypted.
sshuttle is in many OS repositories, or you can downloaded it from https://github.com/apenwarr/sshuttle.
With a simple
sudo sshuttle --dns -vvr username@server 0/0
,all your traffic will be encrypted and funneled through the remote server. Because DNS also is tunneled, it means you won't be vulnerable to DNS poisoning either! Check out sshuttle today. You won't be sorry.
On Fedora
$ sudo yum -y install sshuttle
Then
$ sshuttle --dns -vvr [username]@server[:port] 0/0
If you have Error 255 issues with the VPN not connecting, then you should try excluding the subnet of the remote system from forwarding.
$ sshuttle --dns -vvr [username]@server[:port] -x server 0/0
No comments:
Post a Comment