network

Tunneling Corporate Firewalls for Developers

TLDR: Guide on tunneling SSH connections for developers facing corporate firewalls. Discusses methods to bypass restrictions, including using SSH over HTTPS with tools like SSLH and corkscrew. Covers techniques for dealing with dumb and smart firewalls, corporate proxies, and the importance of maintaining secure and functioning connections for development tools. Emphasizes that while tunneling can be effective, it's necessary to comply with security policies and consult IT where appropriate.

https://blog.frost.kiwi/tunneling-corporate-firewalls/

Linux Routing Fundamentals

Linux networking supports multiple routing tables and advanced features like policy-based routing (PBR), VRFs, and network namespaces. This summary covers basics of routing tables, explaining their structure, routing lookups, source address selection, and special route types. Linux systems come with default tables: local, main, and default, which are checked in sequence for routing decisions. Users interact with routing tables via the ip command. The article also discusses handling ICMP errors and interface link states. Further articles will expand on advanced routing techniques.

https://blog.sdn.clinic/2025/01/linux-routing-fundamentals/

Scroll to Top