The Firefox community is always up to some cool, collaborative way to declare their passion for Firefox. What better way to do this than band together to set a Guinness World Record for the most software downloaded in 24 hours?!
With your help the Firefox community can go down in history! If you have any questions or ideas please drop us a line at worldrecord @ mozilla.com.
It is possible to create a “reverse” SSH Tunnel. The reverse tunnel will allow you to create an SSH Tunnel from your work computer to your home computer, for example, and then login to your work machine from your home machine even if your work firewall does not permit ssh traffic initiated from your home machine!
For this to work, an SSH Server must be installed on your work and home computer, and ssh (TCP port 22) must be allowed outbound from your work computer to your home computer.
Syntax: ssh -R remote_port:localhost:22 your_home_computer
At home, you would then run ssh -p 2048 localhost to log into your work computer via ssh.
Here is a script that you can run through the cron facility on your work system to make sure the reverse SSH Tunnel to your home system is up and running. It is useful in case the system is rebooted.
# $REMOTE_HOST is the name of the remote system
# $REMOTE_PORT is the remote port number that will be used to tunnel
# back to this system
# $COMMAND is the command used to create the reverse ssh tunnel
COMMAND=”ssh -q -N -R $REMOTE_PORT:localhost:22 $REMOTE_HOST”
# Is the tunnel up? Perform two tests:
# 1. Check for relevant process ($COMMAND)
pgrep -f -x “$COMMAND” > /dev/null 2>&1 || $COMMAND
# 2. Test tunnel by looking at “netstat” output on $REMOTE_HOST
ssh $REMOTE_HOST netstat -an | egrep “tcp.*:$REMOTE_PORT.*LISTEN” \
> /dev/null 2>&1
if [ $? -ne 0 ] ; then
pkill -f -x “$COMMAND”
SSH Tunnelling is an excellent way to tunnel insecure protocols through a secure communication channel. In this example, I’ll tunnel POP3 traffic using SSH. Traditional POP3 traffic, including username and password information, travels clear-text across the network.
The syntax: ssh -f -N -L <local port>:<remote server>:<remote port> <userid>@<remote server>
To tunnel POP3 traffic using ssh:
- Make sure an ssh client is installed on your machine and an ssh server is installed on the POP3 server.
- Create a local SSH Tunnel on your machine (port 1234 for this example) to the POP3 server’s port 110. You will need to be the root user to bind to “privileged” ports (< 1024).
# ssh -f -N -L 1234:localhost:110 user@POP3_server
- Test the tunnel.
$ telnet localhost 1234
You should see the POP3 server’s banner information.est the tunnel.
- Configure your mail client to access your mail via POP3 using mail server localhost and port 1234.