Using ssh to protect web browsing over wireless or other hostile networks

This really could be used to encyrpt web traffic over any “hostile” network. Here’s what I’m talking about. Laptop using wireless. Within our internal network we would LIKE all our web traffic to be encrypted at least from the laptop to a wired host. (From there to the outside world it will be open.) At the minimum we would like to have the traffic encrypted over the wireless leg of the journey. Here’s the most straightforward approaches uing ssh.

OK, from the laptop, we use…. ssh -D 8080 username@machinewithinwirednetwork

(You can choose a port other than 8080) It is possible to setup this with putty ssh as well. If you don’t want a command shell add the -N switch to the above.

What this does is set’s up a socks proxy on the local machine at port 8080 and does dynamic port forwarding to “machinewithinwirednetwork”. Of course, the example above is a wireless user, but you could just the same tunnel traffic to your home network from a wireless access point somewhere out in the world, or to a server elsewhere. Basically anywhere you have ssh access can act as a poxy.

Anyway, that much done, we need to configure our web browser to use it. Firefox will be a straightforward example. Open firefox and then go to edit… preferences (Windows users may find this in the tools…. options menu IIRC) and select “connection settings” next choose the radio button next to “manual proxy configuration”. Now, where it says “Socks host” enter localhost and for the port number use what was specified above (8080). My current setup works as Socks 5, but if you run into problems you may need to tell it to use socks 4. Let’s leave it at Socks v5 and click apply and ok. Assuming that you’ve got your tunnel started already you should be able to browse through the other host.

One thing I use to test it is visiting my IP check page, mainly because I’ve included a field to echo the INTERNAL lan address as well as the INTERNET address. This way I can see if it looks like I’m browsing from or (as well as the usual external IP.)

Of course if you’ve tunneled out through the internet to another computer you can use something like or some similar page. This can be a useful technique for working on /testing a webpage when the DNS is first propogating. Some networks may have current DNS information before others and you can tunnel traffic to a host that knows where the machine is (of course you could put it in a hosts file too, but that’s too easy….)

It’s important to have a basic understanding of WHERE the data is encrypted and WHERE it is sent in the clear in a setup like this. Of course, https should be encrypted between the client machine and the server no matter what path it takes, but http over a tunnel like this is ONLY encrypted for the length of the tunnel (in this case from the laptop to “machinewithinwirednetwork”). From “machinewithinwirednetwork” out to the world, the traffic is unencrypted as usual.

Of course, it’s possible to use this to protect OTHER data channels (mail) as well. Another common method to do this is using specific port forwards, with a specific port forward to encrypt web traffic you need a proxy server running at the other machine which adds more layers to setup.

Related Posts

Blog Traffic Exchange Related Posts
  • Boot up freeze/sluggishness with ubuntu 6.06.1 install cd (on 64bit AMD hardware) I thought I had written about this once before, but when I searched the site to find the solution I had come across before, I couldn't find my post.... so, sorry if this is a duplication, but I've run into this on some AMD 64-bit based system boards. The most......
  • Network Security - so https and ssh are immune to arp spoofing right? When a machine has been arp spoofed, ALL network traffic from it is likely passing through a "hostile" machine. So, NO, https and ssh traffic is not immune, it is travelling through a hostile machine. However, it should be encrypted. There are a few exceptions though. SSH version 1 is......
  • Firewall musings... Yesterday I had a bit of a realization. I had just been looking at a wireless router/firewall setup and was thinking about the firewalling rules (which seemed to be geared at the WIRELESS lan... i.e. blocking that activity on the Wireless segment.) You know, traditionally firewalls have had the attitude......
Blog Traffic Exchange Related Websites
  • Hosting your own Blogs Carnival There are plenty of different ways that you can participate in a blogs carnival in order to increase the traffic to your blog. When you are just getting started, you may want to consider submitting your own posts to the blogs carnival publishers so that you can increase your readership.......
  • Dreamhost November 2010 Promo Code Upto $75 Discount Here is the Dreamhost Promo Code for November 2010 (DHNOV75) and you get upto $75 discount to your account. Recently, we discussed about the Dreamhost Promo Code and its Rewards and from this month onwards, i will be sharing the discount coupons of various webhosting programs. As a first step,......
  • Another 7 Steps for How to Get Traffic to Your Blog If you are trying to learn how to get traffic to your blog, then you will benefit from the tips in this series, which are designed to show you the necessary steps for how to get traffic to your blog. When you have the right tips, tricks and resources in......    Send article as PDF   

Similar Posts

See what happened this day in history from either BBC Wikipedia
Amazon Logo

Comments are closed.

Switch to our mobile site