95.217.93.216 in the Host Name field.443 in the Port field.
forward in the Auto-login username field.Don't start a shell or command at all.8080 in the Source port field.Auto and Dynamic radio buttons are selected.D8080 in the Forwarded ports box.streisand_rsa.ppk private key that is used to authenticate the SSH connection. Right-click; Save target as...
streisand_rsa.ppk file and click Open.streisand in the first Saved Sessions box and click the Save button. The next time you launch PuTTY you can choose the session and click Load to restore all of these settings.Click Open to connect! PuTTY will ask you to confirm the fingerprint. Make sure it matches one of these:
256 SHA256:4F2JKv4fH9CsewKbZsaotuD7C5gL+UYK/Vu37aeY41g root@streisand (ECDSA)
3072 SHA256:w+x9wkF1PcvSR2JsarHa1rRAqDTBYy1PzTWx+hIZ+OU root@streisand (RSA)
You are now connected and have a SOCKS proxy up and running that is ready to forward encrypted traffic through SSH. The next step is to configure your web browser to use it.
127.0.0.1 and Port 8080 on the SOCKS Host line.streisand_rsa private key that is used to authenticate the SSH connection:
streisand_rsa file to the directory of your choice.chmod 600 streisand_rsaAdd a new entry to your .ssh/config file. It should look like this. Port 22 is available if your network does not block it. Be sure to adjust the location of the IdentityFile:
Host streisand
User forward
Port 443
HostName 95.217.93.216
IdentitiesOnly yes
IdentityFile ~/.ssh/streisand_rsa
SSH into the server and forward a dynamic SOCKS port:
ssh -vND 8080 forward@streisand
Verify that the fingerprint matches one of these:
256 SHA256:4F2JKv4fH9CsewKbZsaotuD7C5gL+UYK/Vu37aeY41g root@streisand (ECDSA)
3072 SHA256:w+x9wkF1PcvSR2JsarHa1rRAqDTBYy1PzTWx+hIZ+OU root@streisand (RSA)
Sshuttle is a simple VPN tunnelling solution that operates over the SSH transport. It's fast, easy to set up, and offers great performance.
streisand_rsa private key that is used to authenticate the SSH connection:
streisand_rsa file to the directory of your choice.chmod 600 streisand_rsaAdd a new entry to your .ssh/config file. It should look like this. Port 22 is available if your network does not block it. Be sure to adjust the location of the IdentityFile:
Host streisand
User sshuttle
Port 443
HostName 95.217.93.216
IdentitiesOnly yes
IdentityFile ~/.ssh/streisand_rsa
Download sshuttle by running the following command in the directory of your choice:
git clone https://github.com/sshuttle/sshuttle.git
Enter the directory:
cd sshuttle
Run sshuttle and connect to the server:
./run --dns -r sshuttle@streisand 0/0 -vv
Verify that the fingerprint matches one of these:
256 SHA256:4F2JKv4fH9CsewKbZsaotuD7C5gL+UYK/Vu37aeY41g root@streisand (ECDSA)
3072 SHA256:w+x9wkF1PcvSR2JsarHa1rRAqDTBYy1PzTWx+hIZ+OU root@streisand (RSA)
streisand_rsa private key that is used to authenticate the SSH connection:
streisand_rsa file to the root directory of your phone.95.217.93.216.forward.443.
streisand_rsa file that you copied to your phone.1080.L8888=localhost:8888.Verify that the fingerprint matches one of these:
256 SHA256:4F2JKv4fH9CsewKbZsaotuD7C5gL+UYK/Vu37aeY41g root@streisand (ECDSA)
3072 SHA256:w+x9wkF1PcvSR2JsarHa1rRAqDTBYy1PzTWx+hIZ+OU root@streisand (RSA)
You are now ready to configure your applications to route their traffic through the SSH tunnel provided by SPT.
These steps will only work when you are connected via WiFi. They also must be applied individually to every WiFi network you connect to. Most applications will respect these settings, including the default browser, Chrome, YouTube, and many more.
127.0.0.1.8888.Some applications allow you to make these settings persistent for all networks. Twitter for Android and Firefox for Android can route their traffic through the SPT SSH tunnel regardless of your current connection (WiFi, 3G, HSPA+, LTE, etc.).
127.0.0.1.8888.about:config into the address bar and tap the 'Go' button on your keyboard.proxy into the search box.127.0.0.1.1080.true.1.
1. If you see the message "This account is for port forwarding only", make sure you configure your SSH client to not execute shell commands on remote server (-N).