Ssh
使用 squid 和 ssh-tunnel 進入 vpn
介紹:
為了訪問某個數據中心的管理控制台,我應該使用 VPN。但是由於公司網路設置,我無法建立 vpn 連接(我被告知他們不會為我設置所需的隧道。同時我被允許找到旁路)。為了繞過它,我正在使用代理設置為 localhost:9999 的 google chrome 瀏覽器。有一個 ssh 隧道將 localhost:9999 與專用伺服器上的 squid 實例連接起來。專用伺服器已使用 vpnc 建立 VPN 連接。
當我測試網頁瀏覽時 - 通過此代理登錄 gmail 帳戶沒有問題。因此 http 和 https 被正確重定向。
當我嘗試訪問 https:///login.html 時,chrome 告訴我 Error 7 (net::ERR_TIMED_OUT): The operation timed out
ifconfig tun0(tun0 是 vpn 連接)
tun0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 inet addr:192.168.237.1 P-t-P:192.168.237.1 Mask:255.255.255.255
魷魚 access.log 摘錄:
1322248499.456 29972 94.23.35.103 TCP_MISS/000 0 CONNECT 172.30.3.93:443 - NONE/- - 1322248499.484 30000 94.23.35.103 TCP_MISS/000 0 CONNECT 172.30.3.93:443 - NONE/- - 1322248529.478 29905 94.23.35.103 TCP_MISS/000 0 CONNECT 172.30.3.93:443 - NONE/- -
ip r 命令
180.150.133.253 via 94.23.35.254 dev eth0 src 94.23.35.103 192.168.237.0/24 dev tun0 scope link 192.168.122.0/24 dev virbr0 proto kernel scope link src 192.168.122.1 94.23.35.0/24 dev eth0 proto kernel scope link src 94.23.35.103 172.30.0.0/22 dev tun0 scope link default via 94.23.35.254 dev eth0 metric 100
tcpdump -i tun0
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on tun0, link-type RAW (Raw IP), capture size 65535 bytes 20:39:41.146346 IP 192.168.237.1.33810 > 172.30.3.93.https: Flags [S], seq 2990531692, win 13720, options [mss 1372,sackOK,TS val 34961006 ecr 0,nop,wscale 7], length 0 20:39:41.206331 IP 192.168.237.1.50869 > 172.30.3.93.https: Flags [S], seq 1974326041, win 13720, options [mss 1372,sackOK,TS val 34961012 ecr 0,nop,wscale 7], length 0 20:39:41.370436 IP 172.30.3.93.https > 192.168.237.1.33810: Flags [S.], seq 953273047, ack 2990531693, win 5792, options [mss 1380,sackOK,TS val 4294958113 ecr 34961006,nop,wscale 2], length 0 20:39:41.370458 IP 192.168.237.1 > 172.30.3.93: ICMP 192.168.237.1 tcp port 33810 unreachable, length 68 20:39:41.427724 IP 172.30.3.93.https > 192.168.237.1.50869: Flags [S.], seq 3867774677, ack 1974326042, win 5792, options [mss 1380,sackOK,TS val 4294958118 ecr 34961012,nop,wscale 2], length 0 20:39:41.427743 IP 192.168.237.1 > 172.30.3.93: ICMP 192.168.237.1 tcp port 50869 unreachable, length 68 20:39:44.147985 IP 192.168.237.1.33810 > 172.30.3.93.https: Flags [S], seq 2990531692, win 13720, options [mss 1372,sackOK,TS val 34961307 ecr 0,nop,wscale 7], length 0 20:39:44.207981 IP 192.168.237.1.50869 > 172.30.3.93.https: Flags [S], seq 1974326041, win 13720, options [mss 1372,sackOK,TS val 34961313 ecr 0,nop,wscale 7], length 0 20:39:50.157964 IP 192.168.237.1.33810 > 172.30.3.93.https: Flags [S], seq 2990531692, win 13720, options [mss 1372,sackOK,TS val 34961908 ecr 0,nop,wscale 7], length 0 20:39:50.217978 IP 192.168.237.1.50869 > 172.30.3.93.https: Flags [S], seq 1974326041, win 13720, options [mss 1372,sackOK,TS val 34961914 ecr 0,nop,wscale 7], length 0 20:40:02.197916 IP 192.168.237.1.33810 > 172.30.3.93.https: Flags [S], seq 2990531692, win 13720, options [mss 1372,sackOK,TS val 34963112 ecr 0,nop,wscale 7], length 0 20:40:02.237994 IP 192.168.237.1.50869 > 172.30.3.93.https: Flags [S], seq 1974326041, win 13720, options [mss 1372,sackOK,TS val 34963116 ecr 0,nop,wscale 7], length 0 20:40:11.245849 IP 192.168.237.1.43253 > 172.30.3.93.https: Flags [S], seq 885758311, win 13720, options [mss 1372,sackOK,TS val 34964016 ecr 0,nop,wscale 7], length 0 20:40:11.467567 IP 172.30.3.93.https > 192.168.237.1.43253: Flags [S.], seq 1102840217, ack 885758312, win 5792, options [mss 1380,sackOK,TS val 4294961122 ecr 34964016,nop,wscale 2], length 0 20:40:11.467591 IP 192.168.237.1 > 172.30.3.93: ICMP 192.168.237.1 tcp port 43253 unreachable, length 68 20:40:14.247958 IP 192.168.237.1.43253 > 172.30.3.93.https: Flags [S], seq 885758311, win 13720, options [mss 1372,sackOK,TS val 34964317 ecr 0,nop,wscale 7], length 0
我可以 ping 機器正常。
PING 172.30.3.93 (172.30.3.93) 56(84) bytes of data. 64 bytes from 172.30.3.93: icmp_req=1 ttl=64 time=221 ms 64 bytes from 172.30.3.93: icmp_req=2 ttl=64 time=222 ms 64 bytes from 172.30.3.93: icmp_req=3 ttl=64 time=221 ms 64 bytes from 172.30.3.93: icmp_req=4 ttl=64 time=226 ms 64 bytes from 172.30.3.93: icmp_req=5 ttl=64 time=221 ms 64 bytes from 172.30.3.93: icmp_req=6 ttl=64 time=221 ms ^C --- 172.30.3.93 ping statistics --- 7 packets transmitted, 6 received, 14% packet loss, time 6001ms rtt min/avg/max/mdev = 221.068/222.406/226.608/1.991 ms
誰能給我提示:-這裡有什麼明顯的錯誤(我希望有一個;))?- 要查看哪些日誌來調試問題?
20:40:11.245849 IP 192.168.237.1.43253 > 172.30.3.93.https: Flags [S], seq 885758311, win 13720, options [mss 1372,sackOK,TS val 34964016 ecr 0,nop,wscale 7], length 0 20:40:11.467567 IP 172.30.3.93.https > 192.168.237.1.43253: Flags [S.], seq 1102840217, ack 885758312, win 5792, options [mss 1380,sackOK,TS val 4294961122 ecr 34964016,nop,wscale 2], length 0 20:40:11.467591 IP 192.168.237.1 > 172.30.3.93: ICMP 192.168.237.1 tcp port 43253 unreachable, length 68
第一行說你的機器發送了 SYN 標誌,即
$$ S $$啟動與伺服器的握手(段序列號 885758311)。 第二行說伺服器已經用標誌確認
$$ S. $$到您機器的 SYN 請求(確認 885758312 即 885758311+1)。 我不確定第三行,但我認為它表示目標主機(您的機器)正在通知發送主機(遠端機器)請求的埠即 43253 不可訪問。所以你的防火牆中一定有什麼東西拒絕了這個連接。檢查防火牆規則。