do you use a SOCKS proxy?
i do, because my stupid university blocks services such as skype.
--
it's pretty easy to setup with putty.
go to the connection>ssh>tunnels tab. under add new forwarded port, enter a port number in the "source port" field, choose "dynamic," and choose "auto."
open the connection. now you may configure your networking applications to use a SOCKS proxy with "localhost" or 127.0.0.1 as the host on the port number that you chose.
asemisldkfj
the law is no protection
I use it at work sometimes. I have PortaPuTTY and Portable Firefox on a thumb drive and I tunnel all traffic through my router at home.
I have portable Tor and Privoxy programs on my thumb drive too, but rarely use them because of the speed hit.
I have been looking for a solution to storing an SSH key on my thumb drive so I could stop using passwords, but people recommend against storing it on a FAT32 filesystem because of the lack of permissions. should I not care about this because it's on a thumb drive and I'll be carrying it on my person most of the time anyway?
just encrypt it, and you'll be fine
asemisldkfj
the law is no protection
hmm, not a bad idea. encrypt how? truecrypt? something else?
how safe is an RSA key with an extremely strong passphrase?
asemisldkfj
the law is no protection
I'm not sure. I guess it's not that big of a deal because any malicious computer that mounts my flash drive could simply ignore permissions and copy the filesystem block by block or something. I think.
i'm saying that if you use a very strong passphrase for your ssh (rsa>=1024) key anyway, you could probably distribute it to the world care-free.
so just pick a very good rsa passphrase. and if you lose your thumb drive, pull its public key from all of your hosts' authorized_keys.
sorry, i just saw this: "so I could stop using passwords"
don't! use a extremely intense passphrase and use pageant. you'll just have to type it once.
asemisldkfj
the law is no protection
I just meant ssh passwords. passphrases attached to rsa key is no prob.
ah ok.
i wonder how necessary it is to keep the key private if it's encrypted with an intense passphrase.
i like to assume that the world has access to all my encrypted keys
asemisldkfj
the law is no protection
just put a key for putty on my usb flash drive. got a 12-character, pretty strong passphrase on it.
lr: it seems like it wouldn't be extremely necessary considering your intense passphrase. i support staying on top of the paranoia game! but i think the greater concern above keeping the encrypted key private would be physical attacks on your memory. this could be performed while pageant has an unencrypted copy of your key stored in memory. oh, also keyloggers.
weak putty passphrase concerns:
http://www.neophob.com/serendipity/index.php? … acker.html
http://www.neophob.com/serendipity/index.php? … acker.html
yeah, keyloggers are scary
What does buss' mean?
1. to bust
2. à faire (i'm reluctant to say "to do." i think the french is a bit more suitable.)
asemisldkfj
the law is no protection
keyloggers scare the shit out of me. makes me want to create a bootable OpenBSD partition on my flash drive. and that still doesn't circumvent hardware keyloggers!
asemisldkfj
the law is no protection
I've got keys on my laptop, usb flash drive, and phone now! different key with a different passphrase on each. all are authorized to ssh into my router at home and my slicehost server. pretty awesome!
nny
M̮͈̣̙̰̝̃̿̎̍ͬa͉̭̥͓ț̘ͯ̈́t̬̻͖̰̞͎ͤ̇ ̈̚J̹͎̿̾ȏ̞̫͈y̭̺ͭc̦̹̟̦̭̫͊̿ͩeͥ̌̾̓ͨ
I have a squid proxy on my shell server in canada. It's bound to 127.0.0.1:3128. I ssh tunnel to it from my laptop. So when I am on wireless, all my web traffic hits 127.0.0.1:9000 and is encrypted and tunneled to the squid proxy in a datacenter.
It's like ghetto vpn. Works great.
Étrangère
I am not a robot...
(thread title = hilarious)
asemisldkfj
the law is no protection
why!
asemisldkfj
the law is no protection
oh wait I thought this was my thread. haha.
i know how to make firefox use SOCKS5 on localhost:666.
how do i set up internet explorer 8? i can't figure it out.
tools > internet options > connections > lan settings > use a proxy server for your LAN > advanced
or
alt+o, alt+o, ctrl+tab+tab+tab+tab, alt+l, tab, tab, x, alt+c, tab, tab, tab, tab, tab, tab, localhost, tab, 666
:D
that's what i was doing. i found the trick. leave "http", "secure", and "ftp" blank. only fill in the line for
"socks". i was trying to use 127.0.0.1:666 for all four fields, and it wouldn't work that way.
s/localost/localhost/
!
i think that's what my more specific method does, although it wasn't clear that leaving duplicates out was the trick to your success.
it is clear to me. as soon as i put the same entry in the other fields, it doesn't work anymore.
i think it effectively, "buss' SOCKS".