Note: This method is available, but the stability may not be good enough and has a handshake feature. If it is not hanging on the Internet for a long time, but only occasionally, it is fine.
If you have mastered the operation of logging in a remote host with Bitvise SSH Client (Bitvise SSH Client), then you only need to modify the SSH settings of the remote host to build the simplest socks5 proxy in one step, the method is as follows:
The root user logs into the remote host and opens the terminal. Use the following command to edit the SSH settings:
Remove the # in front of gatewayports, and change "no" to "yes", as shown below:
Press Ctrl+X to save changes and exit. Restart SSH to make the settings take effect, use the following command:
At this point, the proxy settings have been completed.
Next, how to use this proxy on your own windows system computer, two settings need to be made:
1. Bitvise SSH Client client settings
Just tick the small box in front of Enabled on the services interface, and then press Login to log into the remote host. Always keep logged in while using the proxy.
2. Browser settings
a. Set through IE browser (click "Tools"-"Internet Options"-"Connect")
To access the Internet through a router, click "LAN Settings"; for broadband modem dial-up Internet access, click "Settings" in the figure below:
Going online through the router, click OK after ticking and filling in the numbers in the red box; broadband modem dial-up Internet access imitates this setting.
b. The Win10 system can also be set through the following ways
Click the "Microsoft icon"(in the lower left corner)-"Settings"-"Network and Internet" :
Click "Save" after finishing the settings according to the above figure.
In this way, Internet Explorer, Edge, Google Chrome (default proxy settings), Firefox (default proxy settings) can be online through the proxy.
If you do not want to log into the remote host as the root user, you can also create another restricted user. Use Bitvise SSH Client to open the remote host terminal:
1. Create a user group
The freenet above is the user group name.
2. Create restricted users
You need to create a restricted account that cannot be used for SSH login.
useradd -d /home/ID6699 -m -g freenet -s /bin/false ID6699
The above command will create a new SSH user “ID6699” in “freenet”. This user can only use SSH tunnel, not log into your VPS account.
3. Add passwords for restricted users
After that, you can use the SSH client with the user ID6699. As shown in the figure below, fill Host and Port in their own remote host domain name (or IP) and port:
After Log in, as long as the record in the box above appears, it indicates that the tunnel has been established. It just cannot open the terminal and SFTP window.