is there a more covert method or alternative? ssh tunneling does work but I'm a little reluctant to give people ssh access to my server, unless I can figure out how to create a user with no privileges whatsoever.
is there a more covert method or alternative? ssh tunneling does work but I'm a little reluctant to give people ssh access to my server, unless I can figure out how to create a user with no privileges whatsoever.
"Oh, man, I just shot Marvin in the face."
oh, nobody wants to help. that's disappointing.
"Oh, man, I just shot Marvin in the face."
Just an observation: some proxies are easier to detect than others. Some of the differences are described here: http://whatismyipaddress.com/proxy-server
edit: This page is able to use the information provided by some proxies.
Last edited by lisati; January 19th, 2012 at 09:36 PM. Reason: minor adjustment
Forum DOs and DON'Ts
Please use CODE tags
Including your email address in a post is not recommended
My Blog
You can always use the forcecommand to create a user account that can only use ssh for tunneling.
Either that or just do a chroot jail, so they cannot mess with the system.
EDIT: Found a good thread about it:
http://ubuntuforums.org/showthread.php?t=1627240
Come to #ubuntuforums! We have cookies! | Basic Ubuntu Security Guide
Tomorrow's an illusion and yesterday's a dream, today is a solution...
Bookmarks