On Mon, 2009-02-02 at 20:50 +0100, Beso wrote:
> 2009/2/2 pan user <p...@mll.nosnoop.com>:
> > On Mon, 2009-02-02 at 19:27 +0000, Duncan wrote:
> >> "m...@gmail.com"
> >> <mistericec...@gmail.com> posted
> >> 49872cfa.9030...@gmail.com, excerpted below, on  Mon, 02 Feb 2009 18:27:22
> >> +0100:
> >>
> >> > Well, if you are doing it this way, you never use SSL. To use ssl with
> >> > pan, you have to use stunnel.
> >>
> >> stunnel!  /That's/ the app that I've seen people mentioning!  Thanks.  I
> >> had forgotten the name, thus deliberately avoided mentioning it in my
> >> initial explanation.
> >>
> >
> > There is also Putty, which makes SSH a bit easier.
> >
> for what i know putty is useful as a secure alternative to telnet and
> similar, because it provides direct ssh connection to
> an enabled ssh server. ssl instead is used for a transparent ssl
> encoding of services. it can be used also for other types of traffic,
> like emails or http browsing. it usually has default setting for a
> number of different services but for what i know
> nntp ssl needs to be configured. you set the secure socket redirection
> with stunnel on a loopback device port and use
> pan authentication over it. for pan the server would be the loopback
> device one, while stunnel will take care of tunneling
> the traffic to the end provider.

I route all my connections through ssh tunnels, e-mail, http, nntp by
way of port forwarding.

Either way, stunnel or ssh tunnel, will work, boils down to personal
likes.






_______________________________________________
Pan-users mailing list
Pan-users@nongnu.org
http://lists.nongnu.org/mailman/listinfo/pan-users

Reply via email to