To use it, just make your software use SOCKS5 proxy on your Linux computer's IP, port 1080, and you're done – all your requests will now get proxied.Īccess control can be implemented via iptables. If you also want the command to go into background as a daemon, then add the -f option: ssh -f -N -D 0.0.0.0:1080 localhost The -N option makes sure ssh stays idle and doesn't execute any commands on localhost. The ssh command starts up dynamic -D port forwarding on port 1080 and talks to the clients via SOCSK5 or SOCKS4 protocols, just like a regular SOCKS5 proxy would. ssh -N -D 0.0.0.0:1080 localhostĮven better – it doesn't require root privileges. This article will be interesting to everyone who didn't know this awesome fact already – you can turn any Linux computer into a SOCKS5 (and SOCKS4) proxy with just one ssh command command and no extra tools. I can then just edit them together and produce the final article. It goes hand in hand with my upcoming article series on 100% technical guide to anonymity and it's much easier to write larger articles by splitting them into smaller pieces. I thought I'd write a shorter article this time.
0 Comments
Leave a Reply. |