How can I verify if browsing using SOCKS5 proxy (via SSH -D) is TCP over TCP?
2
votes
1
answer
2587
views
The **link** talks about TCP over TCP when http is used over SOCKS via SSH.
I am trying to browse from Firefox (on Ubuntu 14.04) after setting up the SOCKS5 proxy option via localhost. I created a SOCKS5 connection using SSH (created using SSH -D) to another host (which then takes the packets and routes them out).
The **link** says that SSH can be made to work in a none encryption mode, but after applying the small patch suggested there to OpenSSH's cipher.c, I see encrypted packets in wireshark even though it says (encryption:none mac:umac-64@openssh.com compression:none)
SSH Protocol
SSH Version 2 (encryption:none mac:umac-64-etm@openssh.com compression:none)
Packet Length: 48
Encrypted Packet: 0932000000076d696e696e65740000000e7373682d636f6e...
MAC: 1a7bf2cfa15def0f
I would like to verify if this is actually a TCP over TCP connection.
Edit: does it matter that I get prompted for a password when I start the SSH -D (ssh user@host2 -D 8080). Somehow, I am unable to get host2 to not prompt me for a password (even though I added host1's key into host2).
Asked by nnovoice
(21 rep)
Sep 21, 2016, 08:35 AM
Last activity: Jul 18, 2025, 04:06 AM
Last activity: Jul 18, 2025, 04:06 AM