Problem using 'local proxy' with command proxytunnel
RE WinSCP 4.1.1:
I have been happily using the program proxytunnel to allow me to connect to a remote SHS server with PuTTY via two HTTP firewalls (essentially connecting through the first HTTP firewall to the second, then from this to the SSH server).
I had hoped the same process would work in WinSCP now it is based on putty 0.60 and includes local proxy commands. I'm using exactly the same proxy command (no variables in the proxy command - the hostnames etc. are being explicitly specified to remove any ambiguity of variable names between the PuTTY/WinSCP) but it just doesn't work. My server-side logs error with:
sshd: Did not receive identification string
Has anyone got the 'local proxy' functionality working - it looks like it might not be passing the username through or something?
[ By the way, for those wanting to access SSH servers through a draconian firewall, proxytunnel is a useful tool if the firewall is performing full level 7 inspection as traffic is effectively wrapped in actual HTTPS traffic if done right, not just SSH traffic over an open web port, say ]
I have been happily using the program proxytunnel to allow me to connect to a remote SHS server with PuTTY via two HTTP firewalls (essentially connecting through the first HTTP firewall to the second, then from this to the SSH server).
I had hoped the same process would work in WinSCP now it is based on putty 0.60 and includes local proxy commands. I'm using exactly the same proxy command (no variables in the proxy command - the hostnames etc. are being explicitly specified to remove any ambiguity of variable names between the PuTTY/WinSCP) but it just doesn't work. My server-side logs error with:
sshd: Did not receive identification string
Has anyone got the 'local proxy' functionality working - it looks like it might not be passing the username through or something?
[ By the way, for those wanting to access SSH servers through a draconian firewall, proxytunnel is a useful tool if the firewall is performing full level 7 inspection as traffic is effectively wrapped in actual HTTPS traffic if done right, not just SSH traffic over an open web port, say ]