chetan51 / sidestep

A Mac OS X application that automatically secures your Internet connection in unprotected wireless networks through SSH tunneling.
http://chetansurpur.com/projects/sidestep
MIT License
282 stars 32 forks source link

Sidestep silently fails with server setting "AllowTcpForwarding no" #60

Open jeroenh opened 11 years ago

jeroenh commented 11 years ago

I had been happily using Sidestep for some time, and loved the fact that it automatically triggered, but at some point I started to wonder whether it actually did what it advertised what was on the tin. I activated it, opened up whatismyip.com and imagine my surprise when it displayed my original IP address. So I started digging further. I looked into the Proxy system settings, and the proxy was not enabled. I tried to enable it myself, but OS X (10.8 at the time) refused to activate it. So I copy/pasted the ssh command from Sidestep and tried to connect manually. I then manually enabled the proxy system setting, and I found many instances of the following:

debug1: channel 2: free: direct-tcpip: listening port 9050 for 6-p-07-ash2.channel.facebook.com port 443, connect from 127.0.0.1 port 54921, nchannels 4
debug1: Connection to port 9050 forwarding to socks port 0 requested.
debug1: channel 2: new [dynamic-tcpip]
channel 3: open failed: administratively prohibited: open failed

After some more digging I found that the server I intended to use had set AllowTcpForwarding no in its config.

The "Test Connection" button in Sidestep meanwhile still happily reported that everything was working perfectly.

Could a test for this case please be added? Otherwise you are luring users into a false sense of security by displaying that traffic is rerouted over the tunnel, while in practice it is not.