HTTP Tunneling Without Using CONNECT
In some networks, the use of CONNECT method is restricted to some trusted sites. In this cases, a HTTP tunnel can be implemented using only usual HTTP methods as POST, GET, PUT and DELETE. This is similar to the approach used in Bidirectional-streams Over Synchronous HTTP (BOSH).
In this proof-of-concept program, a server runs outside the protected network and it acts as a normal HTTP server. A client program, from inside the protected network starts up and listen for incoming connection on some local port. When a new connection is received on this local port, the client program communicates with the HTTP server, over the HTTP PROXY or firewall, and requests the connection to a predefined destination. All traffic is encapsulated inside normal GET and POST request.
Read more about this topic: HTTP Tunnel
Famous quotes containing the words tunneling and/or connect:
“Our major universities are now stuck with an army of pedestrian, toadying careerists, Fifties types who wave around Sixties banners to conceal their record of ruthless, beaverlike tunneling to the top.”
—Camille Paglia (b. 1947)
“In a strange city, I connect through food and fantasy.”
—Mason Cooley (b. 1927)