{"id":513,"date":"2004-01-08T13:39:51","date_gmt":"2004-01-08T18:39:51","guid":{"rendered":"http:\/\/www.ashleyit.com\/blogs\/brentashley\/?p=513"},"modified":"2004-01-08T13:39:51","modified_gmt":"2004-01-08T18:39:51","slug":"diy-secure-wireless-with-sshputty","status":"publish","type":"post","link":"https:\/\/ashleyit.com\/blogs\/brentashley\/2004\/01\/08\/diy-secure-wireless-with-sshputty\/","title":{"rendered":"DIY secure wireless with SSH\/PuTTY"},"content":{"rendered":"<p>I&#8217;ve been doing a bunch of wireless lately with my laptop.  On publicly available networks, whether paid or free, WEP is usually not enabled, so anyone could easily come by with a tool like <a href=\"http:\/\/www.kismetwireless.net\">kismet <\/a>and watch your traffic including POP and FTP passwords etc.<\/p>\n<p>As an independent consultant, I don&#8217;t have a corporate network with VPN access through which I can secure my communications, so I&#8217;ve had to make do with what is available to me.<\/p>\n<p>I have SSHD, smtp and a web proxy server running on my home network, so on my Win2k-based laptop I have set up a <a href=\"http:\/\/www.chiark.greenend.org.uk\/~sgtatham\/putty\/\">PuTTY <\/a>connection with the following ports forwarded:<\/p>\n<p>6588 &#8211; http\/s proxy<br \/>\n25   &#8211; smtp (allows relay only from self)<br \/>\n110  &#8211; pop3 forwarded to pop3.simplefilter.com<\/p>\n<p>On the laptop, I have a hosts file entry mapping the pop3.<a href=\"http:\/\/www.simplefilter.com\">simplefilter.com<\/a> to 127.0.0.1, smtp set to localhost, and my browser and <a href=\"http:\/\/www.trillian.cc\">Trillian <\/a>proxy set to localhost:6588. <\/p>\n<p>With this setup, all I have to do is run PuTTY, connect securely via ssh to my home machine, and then all HTTP\/S, POP, ICQ, MSN, and YAHOO traffic happens securely through my tunnel.  Running netstat on my machine shows one connection home and a bunch of localhost connections.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;ve been doing a bunch of wireless lately with my laptop. On publicly available networks, whether paid or free, WEP is usually not enabled, so anyone could easily come by with a tool like kismet and watch your traffic including POP and FTP passwords etc. As an independent consultant, I don&#8217;t have a corporate network [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"activitypub_content_warning":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-513","post","type-post","status-publish","format-standard","hentry","category-blather"],"_links":{"self":[{"href":"https:\/\/ashleyit.com\/blogs\/brentashley\/wp-json\/wp\/v2\/posts\/513","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ashleyit.com\/blogs\/brentashley\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ashleyit.com\/blogs\/brentashley\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ashleyit.com\/blogs\/brentashley\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ashleyit.com\/blogs\/brentashley\/wp-json\/wp\/v2\/comments?post=513"}],"version-history":[{"count":0,"href":"https:\/\/ashleyit.com\/blogs\/brentashley\/wp-json\/wp\/v2\/posts\/513\/revisions"}],"wp:attachment":[{"href":"https:\/\/ashleyit.com\/blogs\/brentashley\/wp-json\/wp\/v2\/media?parent=513"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ashleyit.com\/blogs\/brentashley\/wp-json\/wp\/v2\/categories?post=513"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ashleyit.com\/blogs\/brentashley\/wp-json\/wp\/v2\/tags?post=513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}