![]() |
![]() |
#1 (permalink) |
Psycho
|
Getting around company firewall
Hi, I was reading this thread: http://www.tfproject.org/tfp/showthr...threadid=57724
and I remembered: At work, there is a firewall which won't let me ssh to port 22. It lets me telnet, though, so I changed my ssh server to listen on 23. So everything's alright now, but I'm wondering if the IT guys can tell that I'm ssh-ing, and also vnc-ing through the ssh connection. I don't think there's any rules against it, I checked the rules again, and I don't think it said anything about that. But they must be disallowing ssh for some reason, right? Any ideas why? |
![]() |
![]() |
#2 (permalink) |
Fluxing wildly...
Location: Auckland, New Zealand
|
Probably because the firewall is set up on a Deny-all with exceptions basis. So they just never saw any reason to set up an exception for SSH or something.
On an interesting note, I had to use an external DNS server to be able to use SSH at school. Which the tutor was kind enough to give me an IP for ![]()
__________________
flux (n.) Medicine. The discharge of large quantities of fluid material from the body, especially the discharge of watery feces from the intestines. |
![]() |
![]() |
#3 (permalink) |
I am not permanent.
Location: Tennessee
|
Yes, the IT guys can tell exactly what program you're using on what port very simply by using netstat or any number of other commands.
As for why they aren't allowing ssh, what MrFlux said is probably the case.
__________________
If you're flammable and have legs, you are never blocking a fire exit. - Mitch Hedberg |
![]() |
![]() |
#4 (permalink) |
Quadrature Amplitude Modulator
Location: Denver
|
nash: Ethereal or any other decent traffic analyzer can figure out what kind of traffic is being passed on any arbitrary stream. However, they can't see past any encryption layers. I agree that MrFlux's got the right idea on the "deny all" philosophy.
MrFlux: You can use most DNS servers listed as primary/secondary for domains, unless they block unknown clients for queries on domains they don't serve (I've only seen a few of those). glytch: You assume that nash's IT guys have access to the machine he's ssh'ing from. Plus, netstat is the wrong tool for this purpose. But lsof would work.
__________________
"There are finer fish in the sea than have ever been caught." -- Irish proverb |
![]() |
![]() |
#5 (permalink) | |
Upright
|
Re: Getting around company firewall
Quote:
|
|
![]() |
![]() |
#6 (permalink) | |
Psycho
|
Quote:
|
|
![]() |
![]() |
#8 (permalink) |
Upright
|
if you are running windows xp at work and home, i'd suggest remote desktoping. this way even if they see what you are doing, its still being excuted on your home computer and connection
__________________
awwww man, i wish we could use "[img]" tags in sigs.... :-( |
![]() |
![]() |
#9 (permalink) |
Junkie
Location: RI
|
If you are using your home connection to hide your activites at work to justify whatever you do, be it look at porn or just not do work, I imagine you are breaking some rules for your company. They hire you to be productive, not to leech their bandwidth. I'm not one to speak, but if I company doesn't allow me to do something for a reason, generally a little flag goes off that says, "Hey, they don't want me to do this so I better not try it."
|
![]() |
![]() |
#10 (permalink) |
I am Winter Born
Location: Alexandria, VA
|
I agree with Fallon. SSHing, Remote Desktoping, or whatever protocol you use to get to your home computer and use your internet connection from there while at work is still probably breaking rules.
If you want to, on your lunch break, check your e-mail at home, etc., I'm not gonna complain about that (unless your company has rules against even that), but while you're at work, you're there to work. That said, I'm an IT folk and tend to be pretty overzealous about tracking down people ![]() We've got programs that will pick up on any outbound sessions and figure out what kind of traffic it is, flag it appropriately for review, and if really necessary (IM traffic), it'll send a pager alert so we can get a hold of the individual and shut it down immediately.
__________________
Eat antimatter, Posleen-boy! |
![]() |
![]() |
#11 (permalink) |
Psycho
|
Well the main reason is to check my email. I have to ssh into the email server that I use (and use pine or mail or one of those programs). Since the ssh port is blocked, I figure I'll ssh to home and then ssh to the email server that way. Playing around with VNC is just for my own experimentation and education; I wasn't planning on using it for anything. So I have a "legit" reason, albeit unconventional. I could set up Outlook or something similar and IMAP it, but I really really hate email programs like those. Also, I would prefer to keep it on the server, not copy or move anything over to the work computer where people could snoop.
Regarding Remote Desktop, I bet that port is blocked as well. Port 2263 or something like that, I forget. Edit again: People at my workplace use email very often, very much like instant messaging. Although people's offices (not cubicles) are next door, it's less disruptive than shouting. So that's why I would like to be able to access my email. Last edited by nash; 06-06-2004 at 11:32 AM.. |
![]() |
![]() |
#13 (permalink) |
Upright
|
excuse if im going over something you already know...but anyway...
basically with ssh you can forward ports over the ssh connection. so in my example i have a squid running on my home linux box listenin on port 1080. i then from work ssh -p 23 -L 1080:127.0.0.1:1080 userid@home this makes your ssh connectoin as usual, too the telnet port...and forwards any traffic heading to your 127.0.0.1 port 1080 to "home". i then point mozilla to my proxy of http://127.0.0.1 port 1080. And then i can surf and view whatever i like. The socks server is something i've added later...so i can run trillian or just about whatever will accept a socks server in its settin. |
![]() |
![]() |
#14 (permalink) | |
Stop. Think. Question.
Location: Redondo Beach, CA
|
Quote:
You can use differnt ports for VNC as well. You probably don't want to spend any $, but GoToMyPC works very well through anything because it uses port 80 while still providing an encrypted channel.
__________________
How you do anything is how you do everything. |
|
![]() |
Tags |
company, firewall |
|
|