使用squid和ssh-tunnel隧道进入vpn

介绍:

为了访问某个数据中心的pipe理控制台,我应该使用VPN。 然而,由于公司的networking设置,我不能build立一个VPN连接(我被告知,他们不会为我设置所需的隧道,同时我被允许find一个旁路)。 为了绕过它,我使用谷歌铬浏览器与代理设置为localhost:9999。 有一个SSH隧道连接localhost:9999与专用服务器上的鱿鱼实例。 专用服务器使用vpncbuild立了VPN连接。

当我testing网页浏览 – 我没有问题通过这个代理login到Gmail帐户。 所以http和https被正确的redirect。

当我尝试访问https:///login.html时,chrome告诉我错误7(net :: ERR_TIMED_OUT):操作超时

ifconfig tun0(tun0是vpn连接)

tun0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 inet addr:192.168.237.1 PtP:192.168.237.1 Mask:255.255.255.255 

鱿鱼access.log摘录:

 1322248499.456 29972 94.23.35.103 TCP_MISS/000 0 CONNECT 172.30.3.93:443 - NONE/- - 1322248499.484 30000 94.23.35.103 TCP_MISS/000 0 CONNECT 172.30.3.93:443 - NONE/- - 1322248529.478 29905 94.23.35.103 TCP_MISS/000 0 CONNECT 172.30.3.93:443 - NONE/- - 

ip r命令

 180.150.133.253 via 94.23.35.254 dev eth0 src 94.23.35.103 192.168.237.0/24 dev tun0 scope link 192.168.122.0/24 dev virbr0 proto kernel scope link src 192.168.122.1 94.23.35.0/24 dev eth0 proto kernel scope link src 94.23.35.103 172.30.0.0/22 dev tun0 scope link default via 94.23.35.254 dev eth0 metric 100 

tcpdump -i tun0

 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on tun0, link-type RAW (Raw IP), capture size 65535 bytes 20:39:41.146346 IP 192.168.237.1.33810 > 172.30.3.93.https: Flags [S], seq 2990531692, win 13720, options [mss 1372,sackOK,TS val 34961006 ecr 0,nop,wscale 7], length 0 20:39:41.206331 IP 192.168.237.1.50869 > 172.30.3.93.https: Flags [S], seq 1974326041, win 13720, options [mss 1372,sackOK,TS val 34961012 ecr 0,nop,wscale 7], length 0 20:39:41.370436 IP 172.30.3.93.https > 192.168.237.1.33810: Flags [S.], seq 953273047, ack 2990531693, win 5792, options [mss 1380,sackOK,TS val 4294958113 ecr 34961006,nop,wscale 2], length 0 20:39:41.370458 IP 192.168.237.1 > 172.30.3.93: ICMP 192.168.237.1 tcp port 33810 unreachable, length 68 20:39:41.427724 IP 172.30.3.93.https > 192.168.237.1.50869: Flags [S.], seq 3867774677, ack 1974326042, win 5792, options [mss 1380,sackOK,TS val 4294958118 ecr 34961012,nop,wscale 2], length 0 20:39:41.427743 IP 192.168.237.1 > 172.30.3.93: ICMP 192.168.237.1 tcp port 50869 unreachable, length 68 20:39:44.147985 IP 192.168.237.1.33810 > 172.30.3.93.https: Flags [S], seq 2990531692, win 13720, options [mss 1372,sackOK,TS val 34961307 ecr 0,nop,wscale 7], length 0 20:39:44.207981 IP 192.168.237.1.50869 > 172.30.3.93.https: Flags [S], seq 1974326041, win 13720, options [mss 1372,sackOK,TS val 34961313 ecr 0,nop,wscale 7], length 0 20:39:50.157964 IP 192.168.237.1.33810 > 172.30.3.93.https: Flags [S], seq 2990531692, win 13720, options [mss 1372,sackOK,TS val 34961908 ecr 0,nop,wscale 7], length 0 20:39:50.217978 IP 192.168.237.1.50869 > 172.30.3.93.https: Flags [S], seq 1974326041, win 13720, options [mss 1372,sackOK,TS val 34961914 ecr 0,nop,wscale 7], length 0 20:40:02.197916 IP 192.168.237.1.33810 > 172.30.3.93.https: Flags [S], seq 2990531692, win 13720, options [mss 1372,sackOK,TS val 34963112 ecr 0,nop,wscale 7], length 0 20:40:02.237994 IP 192.168.237.1.50869 > 172.30.3.93.https: Flags [S], seq 1974326041, win 13720, options [mss 1372,sackOK,TS val 34963116 ecr 0,nop,wscale 7], length 0 20:40:11.245849 IP 192.168.237.1.43253 > 172.30.3.93.https: Flags [S], seq 885758311, win 13720, options [mss 1372,sackOK,TS val 34964016 ecr 0,nop,wscale 7], length 0 20:40:11.467567 IP 172.30.3.93.https > 192.168.237.1.43253: Flags [S.], seq 1102840217, ack 885758312, win 5792, options [mss 1380,sackOK,TS val 4294961122 ecr 34964016,nop,wscale 2], length 0 20:40:11.467591 IP 192.168.237.1 > 172.30.3.93: ICMP 192.168.237.1 tcp port 43253 unreachable, length 68 20:40:14.247958 IP 192.168.237.1.43253 > 172.30.3.93.https: Flags [S], seq 885758311, win 13720, options [mss 1372,sackOK,TS val 34964317 ecr 0,nop,wscale 7], length 0 

我可以ping通机器。

 PING 172.30.3.93 (172.30.3.93) 56(84) bytes of data. 64 bytes from 172.30.3.93: icmp_req=1 ttl=64 time=221 ms 64 bytes from 172.30.3.93: icmp_req=2 ttl=64 time=222 ms 64 bytes from 172.30.3.93: icmp_req=3 ttl=64 time=221 ms 64 bytes from 172.30.3.93: icmp_req=4 ttl=64 time=226 ms 64 bytes from 172.30.3.93: icmp_req=5 ttl=64 time=221 ms 64 bytes from 172.30.3.93: icmp_req=6 ttl=64 time=221 ms ^C --- 172.30.3.93 ping statistics --- 7 packets transmitted, 6 received, 14% packet loss, time 6001ms rtt min/avg/max/mdev = 221.068/222.406/226.608/1.991 ms 

任何人都可以给我提示: – 这里有什么明显的错误(我希望有一个;))? – 看什么日志来debugging此事?

 20:40:11.245849 IP 192.168.237.1.43253 > 172.30.3.93.https: Flags [S], seq 885758311, win 13720, options [mss 1372,sackOK,TS val 34964016 ecr 0,nop,wscale 7], length 0 20:40:11.467567 IP 172.30.3.93.https > 192.168.237.1.43253: Flags [S.], seq 1102840217, ack 885758312, win 5792, options [mss 1380,sackOK,TS val 4294961122 ecr 34964016,nop,wscale 2], length 0 20:40:11.467591 IP 192.168.237.1 > 172.30.3.93: ICMP 192.168.237.1 tcp port 43253 unreachable, length 68 

第一行表示你的机器发送了SYN标志,即[S]与服务器发起握手(段序号885758311)。

第二行表示服务器已经用Flag [S.]确认了你机器的SYN请求(ack 885758312 ie 885758311 + 1)。

我不知道第三行,但我认为目的地主机(您的机器)通知发送主机(远程机器)所请求的端口,即43253不可达。 所以你的防火墙必须有一些拒绝这个连接的东西。 检查防火墙规则。