Results 1 to 11 of 11

Thread: Telnet though http proxy, how would it be mettered?

  1. #1
    Registered User
    Join Date
    Aug 2005
    Posts
    5
    Thanks
    0
    Thanked
    0 times in 0 posts

    Telnet though http proxy, how would it be mettered?

    I on occasion telnet though my works http proxy, and we are charged (our department anyways) on a per MB and per object basis. I'm not so much worried about the MB part of it, but with the http protocol the proxy counts one image, or html page as an object and i'm wondering how it would count telnet packets that are sent though the http proxy....

    The last thing I want is for my internet charges to be outrageous due to telneting, and have to explain to my boss how I managed to use it.

    Any ideas?

  2. #2
    Senior Member
    Join Date
    Mar 2005
    Posts
    4,942
    Thanks
    171
    Thanked
    386 times in 313 posts
    • badass's system
      • Motherboard:
      • ASUS P8Z77-m pro
      • CPU:
      • Core i5 3570K
      • Memory:
      • 32GB
      • Storage:
      • 1TB Samsung 850 EVO, 2TB WD Green
      • Graphics card(s):
      • Radeon RX 580
      • PSU:
      • Corsair HX520W
      • Case:
      • Silverstone SG02-F
      • Operating System:
      • Windows 10 X64
      • Monitor(s):
      • Del U2311, LG226WTQ
      • Internet:
      • 80/20 FTTC
    IIRC telnet is asynchronous - each character you type creates a packet. Worst case scenario is each character could count as an oblect.
    "In a perfect world... spammers would get caught, go to jail, and share a cell with many men who have enlarged their penises, taken Viagra and are looking for a new relationship."

  3. #3
    Senior Member
    Join Date
    Dec 2005
    Location
    south of heaven
    Posts
    519
    Thanks
    0
    Thanked
    2 times in 2 posts
    sounds like you should find a job somewhere your network connection itself isn't nazified.
    SmoothNuts!~yaman_an@*.dsl.pipex.com > change my rating to exceptional tbh

  4. #4
    Registered User
    Join Date
    Aug 2005
    Posts
    5
    Thanks
    0
    Thanked
    0 times in 0 posts
    yeah thats pretty much what i'm afraid of, as that could easily add up considering i recieve a ton of "letters" too, way more then i send. Just curious because I can't view my usage as objects anymore like i used to be able too, only thing I could do is experiment, which could be bad as well....

  5. #5
    Registered User
    Join Date
    Aug 2005
    Posts
    5
    Thanks
    0
    Thanked
    0 times in 0 posts
    Quote Originally Posted by atrull
    sounds like you should find a job somewhere your network connection itself isn't nazified.

    well this one is rather cushy.. have tons of "downtime" to do things and the web is where I turn.. i'm a web monkey! I cant help it!!

    That and i'm a networking nut, just not sure how it would work, suppose I should find out more about how the tunneling works....

  6. #6
    Senior Member
    Join Date
    Dec 2005
    Location
    south of heaven
    Posts
    519
    Thanks
    0
    Thanked
    2 times in 2 posts
    personally, what I'd do if I were in your position.. is learn about tunneling ssh through dns

    search for that online - if you have a laptop it can also let you tunnel out of wifi hotspots without paying the gatekeeper
    SmoothNuts!~yaman_an@*.dsl.pipex.com > change my rating to exceptional tbh

  7. #7
    Senior Member
    Join Date
    Mar 2005
    Posts
    4,942
    Thanks
    171
    Thanked
    386 times in 313 posts
    • badass's system
      • Motherboard:
      • ASUS P8Z77-m pro
      • CPU:
      • Core i5 3570K
      • Memory:
      • 32GB
      • Storage:
      • 1TB Samsung 850 EVO, 2TB WD Green
      • Graphics card(s):
      • Radeon RX 580
      • PSU:
      • Corsair HX520W
      • Case:
      • Silverstone SG02-F
      • Operating System:
      • Windows 10 X64
      • Monitor(s):
      • Del U2311, LG226WTQ
      • Internet:
      • 80/20 FTTC
    Quote Originally Posted by atrull
    personally, what I'd do if I were in your position.. is learn about tunneling ssh through dns

    search for that online - if you have a laptop it can also let you tunnel out of wifi hotspots without paying the gatekeeper
    Just looked that up and
    I'm going to stick a Linux virtual machine of one of my servers
    "In a perfect world... spammers would get caught, go to jail, and share a cell with many men who have enlarged their penises, taken Viagra and are looking for a new relationship."

  8. #8
    Gentoo Ricer
    Join Date
    Jan 2005
    Location
    Galway
    Posts
    11,048
    Thanks
    1,016
    Thanked
    944 times in 704 posts
    • aidanjt's system
      • Motherboard:
      • Asus Strix Z370-G
      • CPU:
      • Intel i7-8700K
      • Memory:
      • 2x8GB Corsiar LPX 3000C15
      • Storage:
      • 500GB Samsung 960 EVO
      • Graphics card(s):
      • EVGA GTX 970 SC ACX 2.0
      • PSU:
      • EVGA G3 750W
      • Case:
      • Fractal Design Define C Mini
      • Operating System:
      • Windows 10 Pro
      • Monitor(s):
      • Asus MG279Q
      • Internet:
      • 240mbps Virgin Cable
    http proxies operate by emulating the http protocol.. I'll give you an example here, when you open a webpage and it has 4 imagines, a css page, and a javascript, you are initating 7 http connections or 'objects'. However, a http proxy session is 1 connection and therefore 1 'object'.. So all you have to worry about is the amount of data sent during the session.
    Quote Originally Posted by Agent View Post
    ...every time Creative bring out a new card range their advertising makes it sound like they have discovered a way to insert a thousand Chuck Norris super dwarfs in your ears...

  9. #9
    Seething Cauldron of Hatred TheAnimus's Avatar
    Join Date
    Aug 2005
    Posts
    17,168
    Thanks
    803
    Thanked
    2,152 times in 1,408 posts
    kinda, basically HTTP has peristant mode, this came about after people started embedding images in their HTML pages. In a persitantHTTP connection the whole HTTP handsaking thing is only done once, for the entire bunch of objects you want.

    not all servers, or proxys do this thou, as its 'newer'.

    what, i hope, the HTML tunneling software does, is estabilsh a persistant connection, and just hang, that is leave it open so new data just floods in. For out going, the same principle would be applied using a POST blob, as again they can keep that open for a long peroid of time (i think mabye indefinatly, but not sure) before its dropped.

    So there will be 2 'objects' in and out, each time a new char is there, it will be appended. As to if thats a new packet, well that depends on a lot of other things....

    http://en.wikipedia.org/wiki/HTTP#HTTP_versions
    throw new ArgumentException (String, String, Exception)

  10. #10
    Comfortably Numb directhex's Avatar
    Join Date
    Jul 2003
    Location
    /dev/urandom
    Posts
    17,074
    Thanks
    228
    Thanked
    1,026 times in 677 posts
    • directhex's system
      • Motherboard:
      • Asus ROG Strix B550-I Gaming
      • CPU:
      • Ryzen 5900x
      • Memory:
      • 64GB G.Skill Trident Z RGB
      • Storage:
      • 2TB Seagate Firecuda 520
      • Graphics card(s):
      • EVGA GeForce RTX 3080 XC3 Ultra
      • PSU:
      • EVGA SuperNOVA 850W G3
      • Case:
      • NZXT H210i
      • Operating System:
      • Ubuntu 20.04, Windows 10
      • Monitor(s):
      • LG 34GN850
      • Internet:
      • FIOS
    you might want to re-read your office intarweb AUP, to make sure what you're considering won't get you fired

  11. #11
    Senior Member
    Join Date
    Nov 2005
    Posts
    501
    Thanks
    0
    Thanked
    0 times in 0 posts
    Quote Originally Posted by TheAnimus
    kinda, basically HTTP has peristant mode, this came about after people started embedding images in their HTML pages. In a persitantHTTP connection the whole HTTP handsaking thing is only done once, for the entire bunch of objects you want.

    not all servers, or proxys do this thou, as its 'newer'.

    what, i hope, the HTML tunneling software does, is estabilsh a persistant connection, and just hang, that is leave it open so new data just floods in. For out going, the same principle would be applied using a POST blob, as again they can keep that open for a long peroid of time (i think mabye indefinatly, but not sure) before its dropped.
    Personally I'd hope it uses HTTP CONNECT, much more efficient than a POST/GET kludge

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Eng v Pol. RTSP via Proxy (Interesting IP problem)
    By Purple in forum Networking and Broadband
    Replies: 17
    Last Post: 12-10-2005, 07:31 PM
  2. HTTP Proxy keeps kicking me off MSN...
    By cm_uk in forum Networking and Broadband
    Replies: 0
    Last Post: 08-05-2005, 03:34 PM
  3. AnalogX Proxy & UO
    By Arkanabar in forum Networking and Broadband
    Replies: 3
    Last Post: 17-05-2004, 01:02 PM
  4. using Mirc with a proxy
    By megah0 in forum General Discussion
    Replies: 2
    Last Post: 19-11-2003, 12:38 PM
  5. configuring SOCKS and Proxy for my home network
    By megah0 in forum Networking and Broadband
    Replies: 3
    Last Post: 19-11-2003, 12:18 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •