SSH, stunnel and a proxy - double stunnel bypass

Introduction I’m working for a “very concerned about security” firm, that makes mandatory using VPN for accessing their network, and internal services: IMAPS SMTP Intranet Forums Online training, etc As it should, we provided services for a client, also very concerned about security, thus not allowing internet access despite of using two squid proxies with a network appliance filtering protocols, scripts, viruses and malware. They only allow FTP, HTTP and HTTPS. ...

November 1, 2006 · 4 min · Pablo Iranzo Gómez

OCS Deployment Tips and tricks

Prior to using the following info for creating own-made packages, let’s test if everything is working fine. I’ve created a NSIS script that writes into registry in a key called HKLMSOFTWAREOCS and puts a key named “cert” with value creilla. If we create a package with action “LAUNCH”, and attach the regcert.zip with command to execute regcert.exe, all clients with functional package deployment, will add that key to registry, so we can check, using OCS registry query function for a key named “cert” into: HKLM SOFTWAREOCS. ...

July 29, 2006 · 3 min · Pablo Iranzo Gómez

OCS Inventory Package deployment

Introduction OCS Inventory is an excellent piece of GPL Software for getting info from hardware components, and software installed on computers running Windows or UNIX-like operating systems (there are also some unofficial clients for running on other platforms). Since New Generation (OCS-NG), a new architecture was implemented: server were contacted using standard TCP/IP connection (Previous versions, used an MDB file to store information, and required a SMB share to inventory computers ), allowing remote computers to connect as well as providing a new web interface for computer administration, and inventory query. ...

July 27, 2006 · 9 min · Pablo Iranzo Gómez

VPNS - Multiple VPN's Launcher

General Purpose The idea on writing VPNS and the structure it follows was the problem that we had into easily configure many VPN’s for use with the wireless project interconnection (Valencia Wireless http://www.valenciawireless.org). When having no chance to join networks using just wireless links, we needed to provide some kind of transparent link from one WiFi node to another. To do so, we decided to use the vpnd daemon to establish links between our networks for allowing transparent traffic flow. ...

March 5, 2003 · 8 min · Pablo Iranzo Gómez
This blog is a participant in the Amazon Associate Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.