sslh - ssl/ssh multiplexer
http://www.rutschle.net/tech/sslh.shtml
sslh lets one accept both HTTPS and SSH connections on the same port. It makes it possible to connect to an SSH server on port 443 (e.g. from inside a corporate firewall) while still serving HTTPS on that port.
- Developed at security
- Sources inherited from project openSUSE:Factory
-
1
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Factory:Rebuild/sslh && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
sslh.changes | 0000013208 12.9 KB | |
sslh.conf.d | 0000000300 300 Bytes | |
sslh.init | 0000004046 3.95 KB | |
sslh.spec | 0000002752 2.69 KB | |
sslh.sysconfig | 0000001767 1.73 KB | |
v2.0.1.tar.gz | 0000175267 171 KB |
Revision 9 (latest revision is 12)
Ana Guerrero (anag+factory)
accepted
request 1138229
from
Michael Vetter (jubalh)
(revision 9)
- Update to 2.0.1: * New semver-compatible version number * New sslh-ev: this is functionaly equivalent to sslh-select (mono-process, only forks for specified protocols), but based on libev, which should make it scalable to large numbers of connections. * New log system: instead of –verbose with arbitrary levels, there are now several message classes. Each message class can be set to go to stderr, syslog, or both. Classes are documented in example.cfg. * UDP connections are now managed in a hash to avoid linear searches. The downside is that the number of UDP connections is a hard limit, configurable with the ‘udp_max_connections’, which defaults to 1024. Timeouts are managed with lists. * inetd merges stderr output to what is sent to the client, which is a security issue as it might give information to an attacker. When inetd is activated, stderr is forcibly closed. * New protocol-level option resolve_on_forward, requests that target names are resolved at each connection instead of at startup. Useful for dynamic DNS situations.
Comments 0