Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I don't think it's tunneling the full TCP packets. I think it's extracting the data stream from the incoming TCP stream, tunneling that data, and creating a new TCP stream to the destination on the other end of the tunnel.

So basically the same as ssh -L or ssh -R .



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: