|
このページは大阪弁化フィルタによって翻訳生成されたんですわ。 |
|
TUCOWS NETWORK |
LINUXBERG | TUCOWS | FREETHEMES | GAMINGPLACE | eBarn | PDA Central | HOME |
|
|
|
H
HOWTO
's (HOWTOs in html) plain text (HOWTOs in plain text for printing) html'd (Mini-HOWTOs) plain text (Mini-HOWTOs) LDP Additions (Latest from LDP) Other Formats (LDP Other Formats) Translations (LDP Other Languages) Unmaintained (LDP Unmaintained)
Contrib
|
5. Reverse piercing
5.1 RationaleSometimes, only one side of the firewall can launch telnet sessions into the other side; however, some means of communication is possible (typically, through e-mail). Piercing the firewall is still possible, by triggering with whatever messaging capability is available a telnet connection from the ``right'' side of the firewall to the other.
Also, authentified trigger does not remotely mean secure connection. You should really use ssh (perhaps over telnet) for secure connections. And then, beware of what happens between the triggering of a telnet connection, and ssh taking over that connection. Contribution in that direction welcome.
5.2 Getting the triggering mailIf you are firewalled, your mail may as well be in a central server
that doesn't do procmail filtering or allow telnet sessions.
No problem! You can use
|
_________________________________
Last Edited: Thursday, January 21, 1999 03:11 PM
Maintainer: Rob Kennedy (rob@linuxberg.com)
Site Design - Graphicjam Digital
Arts Inc. 1999.
ョ 1999 TUCOWS Interactive Ltd. All rights
reserved