HTTP Tunnel - HTTP Tunneling Without Using CONNECT

HTTP Tunneling Without Using CONNECT

In some networks, the use of CONNECT method is restricted to some trusted sites. In this cases, a HTTP tunnel can be implemented using only usual HTTP methods as POST, GET, PUT and DELETE. This is similar to the approach used in Bidirectional-streams Over Synchronous HTTP (BOSH).

In this proof-of-concept program, a server runs outside the protected network and it acts as a normal HTTP server. A client program, from inside the protected network starts up and listen for incoming connection on some local port. When a new connection is received on this local port, the client program communicates with the HTTP server, over the HTTP PROXY or firewall, and requests the connection to a predefined destination. All traffic is encapsulated inside normal GET and POST request.

Read more about this topic:  HTTP Tunnel

Famous quotes containing the words tunneling and/or connect:

    Our major universities are now stuck with an army of pedestrian, toadying careerists, Fifties types who wave around Sixties banners to conceal their record of ruthless, beaverlike tunneling to the top.
    Camille Paglia (b. 1947)

    Until, accustomed to disappointments, you can let yourself rule and be ruled by these strings or emanations that connect everything together, you haven’t fully exorcised the demon of doubt that sets you in motion like a rocking horse that cannot stop rocking.
    John Ashbery (b. 1927)