this post was submitted on 30 Nov 2023
467 points (94.1% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54746 readers
254 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 

Who cares if nobody can work, the important is that those illegal streams are blocked

you are viewing a single comment's thread
view the rest of the comments
[–] jabjoe@feddit.uk 1 points 1 year ago* (last edited 11 months ago) (1 children)

Not sure exactly what you are after, but would stunnel4 do? You can use it to hide SSH with SSL and then use SNI so that a specific website name is SSH and others something else. You can probably do it with Apache or NGINX to if there is real websites too.

Client wise, just normal ssh, but with a custom config for that host with:

ProxyCommand openssl s_client -connect %h:%p

Edit: NGINX : http://nginx.org/en/docs/stream/ngx_stream_ssl_preread_module.html

Edit: Apache : https://trofi.github.io/posts/295-ssh-over-https.html

[–] zaknenou@lemmy.dbzer0.com 1 points 11 months ago (1 children)

umm, I got confused. Let tell you exactly about the use case. so on a site like this " https://sshocean.com/ssh-ssl " I create an account, and I get something like this: where do I insert this payload (what client for windows or Ubuntu)? and how do I insert the desired SNI that I want to be in front of my ISP? I know of http injector with whom the trick works on android, I mean ssh/ssl stunnel.

[–] jabjoe@feddit.uk 2 points 11 months ago (1 children)

In your .ssh/config you want something like:

Host my-ssh-ssl Hostname us01.ssh0.net User sshocean-p1r4t2br Password myparrot2 Port 443 ProxyCommand ~/.ssh/https-tunnel.sh %h %p

Then you have a ~/.ssh/https-tunnel.sh something like:

#!/usr/bin/env bash { printf "GET /HTTP/1.1\r\nHost:$1\r\nUpgrade:websocket\r\n"; cat } | openssl s_client -connect $1:$2 -servername $1

That last bit, -servername is the SNI bit, if you need it. BUT I think that payload might be for port 2083. I think 443 might be just the OpenSSL connect directly.

[–] zaknenou@lemmy.dbzer0.com 1 points 11 months ago (1 children)

then I initiate this using stunnel from terminal ?(Ubuntu OS)

[–] jabjoe@feddit.uk 1 points 11 months ago

No, stunnel is go othere end. If you doing only the client end, you.don't need it.