* Tunnel TCP using ICMP echo request and reply packets
* Connections are reliable (lost packets are resent as necessary)
* Handles multiple connections
* Acceptable bandwidth (150 kb/s downstream and about 50 kb/s upstream are the currently measured maximas for one tunnel)
* Authentication, to prevent just anyone from using your proxy
PTunnel will not work in the condition that when an outgoing/incoming ping not allowed, or filtered by a gateway somewhere along the way. Also, it does not involve any congestion control. But a good thing is that it is open source and supports both Linux, Windows & Mac. For Windows, you will also need WinPcap.
There is the step for installing ptunnel 0.71:
ON SERVER
# yum -y install gcc*
# yum -y install libpcap*
# mkdir /tmp
# cd /tmp
# wget http://www.cs.uit.no/~daniels/PingTunnel/PingTunnel-0.71.tar.gz
# tar -zxvf PingTunnel-0.71.tar.gz
# cd PingTunnel
# make
# make install
On server CentOS 5.5 32bit
# ptunnel &
On server CentOS 5.5 64bit
# ptunnel > /dev/null 2 >&1 &
Open Port on Server (8000 or whatever it that will be used for tunneling)
# setup
and then choose Firewall configuration >> Customize
ON CLIENT
ptunnel -p ptunnel.example.org -lp 8000 -da ssh.example.org -dp 22If you using ptunnel client on windows, make sure you copy ptunnel.exe to folder system32 before running that command on command prompt and WinPcap has installed on your system.
ON SSH CLIENT
Using PuTTY or Bidvise Tunnelier to login to your SSH.
Setting on SSH Client:
Host : 127.0.0.1
Port : 8000
No comments:
Post a Comment