On Tue, Jun 06, 2017 at 12:49:35PM +0200, to...@tuxteam.de wrote: > On Tue, Jun 06, 2017 at 10:59:30AM +0100, Ron Leach wrote: > > On 05/06/2017 14:08, Henning wrote: > > > > > >socat > > > > > > > Henning, thank you for that. socat seems a very flexible package. > > > > Have you used it yourself, at all? I couldn't see from the > > documentation how to terminate socat. I was planning to use a > > variation of one of their examples, like this: > > I'm using it all the time, to have ssh access through a corporate > firewall. > > Corporate firewalls and their priests tend to believe in Numerology, > and for some $REASONS ports 80 and 443 are Good and all other ~65K > are Evil. So I wrap my ssh connections in a port 443 tunnel -- > for good measure I wrap that in SSL (I don't even want to know > whether our corporate firewall does stateful inspection, and I guess > there's nobody in house who knows: some higher-order subcontractor > perhaps [1]). > > Anyway, on my laptop "lappy" (some names changed, to protect > the innocent: > Or the guilty one from getting fired fore blatantly violating corporate rules?
Is that you they are writing about here? https://arstechnica.com/security/2017/05/defense-contractor-stored-intelligence-data-in-amazon-cloud-unprotected/ -H