From owner-freebsd-current Wed Mar 21 4:58:37 2001 Delivered-To: freebsd-current@freebsd.org Received: from gratis.grondar.za (grouter.grondar.za [196.7.18.65]) by hub.freebsd.org (Postfix) with ESMTP id 4C32737B740; Wed, 21 Mar 2001 04:58:31 -0800 (PST) (envelope-from mark@grondar.za) Received: from grondar.za (root@gratis.grondar.za [196.7.18.133]) by gratis.grondar.za (8.11.1/8.11.1) with ESMTP id f2LCwRf43298; Wed, 21 Mar 2001 14:58:27 +0200 (SAST) (envelope-from mark@grondar.za) Message-Id: <200103211258.f2LCwRf43298@gratis.grondar.za> To: Stefan Esser Cc: Ulf Zimmermann , current@FreeBSD.ORG Subject: Re: Whatever happened to CTM? References: <20010321103940.A2339@StefanEsser.FreeBSD.org> In-Reply-To: <20010321103940.A2339@StefanEsser.FreeBSD.org> ; from Stefan Esser "Wed, 21 Mar 2001 10:39:40 +0100." Date: Wed, 21 Mar 2001 14:59:28 +0200 From: Mark Murray Sender: owner-freebsd-current@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG > Just an idea: > > How about a CVSUP via HTTPS server (just as a means to tunnel CVSUP > through a HTTPS proxy ...) ? > > Most probably a CVSUP daemon bound to port 443 would do (there are > programs that tunnel arbitrary data through a HTTPS proxy, though > I admit this is cheating ;-) You should be able to do it with SSH (assuming that you can get out with ssh!) $ ssh -v -l yourname otherhost.example.com -L5559:cvsup.example.com:5559 Then doing a cvsup with the server set to 127.0.0.1 will work. M -- Mark Murray Warning: this .sig is umop ap!sdn To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message