Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win


Ssh through an autheniticating proxy

Posted on 2000-05-05
Medium Priority
Last Modified: 2013-11-18

I am trying to establish an Ssh connection to an external host from behind a rather restrictive proxy.  The proxy only allows port 80 and 443, and I must authenticate (username & password) before it lets me through.

I think I solved the port problem, I reconfigured the remote host's SSHD to listen on 443.

The problem is (I think): how to I authenticate through the proxy?

I am using Tera Term Pro (TTP) with the Ssh extension.  TTP does not seem to offer an facility for dealing with this barrier.

Does anyone know how to make TTP work, or know of some other free software I can use?  Whatever the solution, it needs to have Ssh forwarding support.

Thanks in advance,
Question by:cubedweller
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
LVL 40

Expert Comment

ID: 2784124
I don't think you'll be able to do that because the proxy is going to require that you authenticate using http protocol. Also, once authenticated the proxy will only be sending and expecting SSL encrypted http protocol data. In other words, you can't tunnel some other protocol stream (like ssh) through a proxy. If it were a simple firewall that restricted traffic to those ports you could tunnel ssh trough on 443.

Author Comment

ID: 2784185
Can I tunnel the entire session through HTTP packets?  I know I have seen tools to do this, but I can't remember where or how to implement them.

LVL 40

Expert Comment

ID: 2784414
I know that tunnels like that do exist for some things, I don't know if there's one for SSH. I've done a bit of web searching, but all I see related to this is people talking about adding plug-ins to proxy servers to allow ssh tunneling. I don't see anything that suggests that there's an ssh client/server that can directly tunnel through an unmodified proxy server. Maybe you'll have better luck in a web search.

Accepted Solution

rtheriot earned 450 total points
ID: 2794804
This kind of works around you problem,
but there is an implementation of ssh, written i believe in java, called mindterm.  


you could literally load up a page with the mindterm applet running on the machine you want to connect to, and tell mindterm to connect to the local host.



Author Comment

ID: 2834680

Thanks for the answer.  I installed the software, and it is very cool, but unfortunately doesn't work in my environment.  I'm really not sure why I can't get it to work, but I am told that soon our proxy will no longer require authentication.  This will hopefully render the entire issue moot.

Thanks anyway,

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
I made this because I wanted to get e-mail with a attached csv file so I'd would be able to import user input into a MS Excel template, but I also wanted to register/save all inputs from each day in a file on the server. 1st - It creates a temp C…
The purpose of this video is to demonstrate how to set up the WordPress backend so that each page automatically generates a Mailchimp signup form in the sidebar. This will be demonstrated using a Windows 8 PC. Tools Used are Photoshop, Awesome…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question