SUMMARY: Running X/Mosaic from behind a firewall

Colin Panisset ([email protected])
Mon, 20 Sep 1993 15:03:46 +1000 (EST)


First off, thanks to Anthony Baxter, Dave Raggett, and Markus Stumpf, who
responded to my request.

It seems that there are a couple of solutions -- the SOCKS package
(available via FTP from ftp.inoc.dl.nec.com:/pub/security/socks.cstc.4.0.tar.gz
supplies an xmosaic client, modified from version 1.2. Dave
is working on his own tcp relay for the browser, and Markus suggested I try
the CERN httpd (with a caveat that binary transfers don't necessarily work
properly.

However, I neglected to specify just how many firewalls I'd be going through.
Naturally enough, everyone assumed one. That's the norm, after all.
In fact, I'd be running the browser through two connected firewalls
(arrgh) -- the socks package (with modifications) might do this, or socks
combined with tcprpm or other TCP/IP relay software might have done it.

Still, there's no need to worry: a friend is working on an
arbitrary-number-of-hops, SOCKS-compliant TCP relay package -- it's in
testing at the moment, and should be available Real Soon Now (tm).

-- Colin.

--
  +61 2 339 3938 Fax: +61 2 339 3818 | It rolls down stairs, alone or in
  Colin Panisset *:^)    PGP 2.3 key | pairs, runs over your neighbor's dog.
  [email protected]    available | It's good for a snack, it fits on your
  So There.               on request | back, it's Log! Log! Log!  - R & S
  ------------------ PGP 2.3 key available on request. ----------------