![]() ![]() The CONNECT method may be restricted to certain ports, so you may need to combine this with listening on port 443 as above. Some firewalls block all outgoing connections, but allow browsing the web via a proxy that allows the HTTP CONNECT method to effectively pierce a hole in the firewall. See and for tutorials on how to set this up with sshttp, and also Have SSH on port 80 or 443 while webserver (nginx) is running on these ports If you have a web proxy that allows CONNECT tunnelling If you want to allow your home server to listen both to HTTPS connections and SSH connections on port 443, it's possible - SSH and HTTPS traffic can easily be distinguished (in SSH, the server talks first, whereas in HTTP and HTTPS, the client talks first). ![]() Where wan0 is the WAN interface on your router and 10.1.2.3 is your server's IP address on your home network. If your machine is behind a router/firewall that redirects incoming connections, make it redirect incoming connections to port 443 to your server's port 22 with something like iptables -t nat -I PREROUTING -p tcp -i wan0 -dport 443 -j DNAT -to-destination 10.1.2.3:22 If your machine is directly connected to the Internet, simply add Port 443 to /etc/ssh/sshd_config or /etc/sshd_config just below the line that says Port 22. If that's the case, the easiest way to reach your home server is to make it listen to SSH connections on port 443. Some firewalls take the simple way out and allow anything on port 443. If the firewall allows arbitrary traffic on port 443 What is possible depends on what the firewall allows. ![]()
0 Comments
Leave a Reply. |