Sslh accepts connections on specified ports, and forwards them further based on tests performed on the first data packet sent by the remote client. Probes for HTTP, SSL, SSH, OpenVPN, tinc, XMPP are implemented, and any other protocol that can be tested using a regular expression, can be recognised. A typical use case is to allow serving several services on port 443 (e.g. to connect to ssh from inside a corporate firewall, which almost never block port 443) while still serving HTTPS on that port. Hence sslh acts as a protocol demultiplexer, or a switchboard. Its name comes from its original function to serve SSH and HTTPS on the same port.
OS | Architecture | Version |
---|---|---|
NetBSD 10.0 | aarch64 | sslh-1.22c.tgz |
NetBSD 10.0 | aarch64 | sslh-1.22c.tgz |
NetBSD 10.0 | aarch64 | sslh-1.22c.tgz |
NetBSD 10.0 | aarch64eb | sslh-1.22c.tgz |
NetBSD 10.0 | alpha | sslh-1.22c.tgz |
NetBSD 10.0 | earmv6hf | sslh-1.22c.tgz |
NetBSD 10.0 | earmv6hf | sslh-1.22c.tgz |
NetBSD 10.0 | earmv6hf | sslh-1.22c.tgz |
NetBSD 10.0 | earmv7hf | sslh-1.22c.tgz |
NetBSD 10.0 | earmv7hf | sslh-1.22c.tgz |
NetBSD 10.0 | earmv7hf | sslh-1.22c.tgz |
NetBSD 10.0 | i386 | sslh-1.22c.tgz |
NetBSD 10.0 | i386 | sslh-1.22c.tgz |
NetBSD 10.0 | i386 | sslh-1.22c.tgz |
NetBSD 10.0 | i386 | sslh-1.22c.tgz |
NetBSD 10.0 | powerpc | sslh-1.22c.tgz |
NetBSD 10.0 | powerpc | sslh-1.22c.tgz |
NetBSD 10.0 | powerpc | sslh-1.22c.tgz |
NetBSD 10.0 | sparc64 | sslh-1.22c.tgz |
NetBSD 10.0 | x86_64 | sslh-1.22c.tgz |
NetBSD 10.0 | x86_64 | sslh-1.22c.tgz |
NetBSD 10.0 | x86_64 | sslh-1.22c.tgz |
NetBSD 10.0 | x86_64 | sslh-1.22c.tgz |
NetBSD 9.0 | aarch64 | sslh-1.22c.tgz |
NetBSD 9.0 | aarch64 | sslh-1.22c.tgz |
NetBSD 9.0 | aarch64 | sslh-1.22c.tgz |
NetBSD 9.0 | earmv6hf | sslh-1.22c.tgz |
NetBSD 9.0 | earmv6hf | sslh-1.22c.tgz |
NetBSD 9.0 | earmv6hf | sslh-1.22c.tgz |
NetBSD 9.0 | earmv7hf | sslh-1.22c.tgz |
NetBSD 9.0 | earmv7hf | sslh-1.22c.tgz |
NetBSD 9.0 | earmv7hf | sslh-1.22c.tgz |
NetBSD 9.0 | i386 | sslh-1.22c.tgz |
NetBSD 9.0 | i386 | sslh-1.22c.tgz |
NetBSD 9.0 | i386 | sslh-1.22c.tgz |
NetBSD 9.0 | i386 | sslh-1.22c.tgz |
NetBSD 9.0 | powerpc | sslh-1.22c.tgz |
NetBSD 9.0 | powerpc | sslh-1.22c.tgz |
NetBSD 9.0 | powerpc | sslh-1.22c.tgz |
NetBSD 9.0 | sparc64 | sslh-1.22c.tgz |
NetBSD 9.0 | x86_64 | sslh-1.22c.tgz |
NetBSD 9.0 | x86_64 | sslh-1.22c.tgz |
NetBSD 9.0 | x86_64 | sslh-1.22c.tgz |
NetBSD 9.0 | x86_64 | sslh-1.22c.tgz |
NetBSD 9.3 | x86_64 | sslh-1.22c.tgz |
NetBSD 9.3 | x86_64 | sslh-1.22c.tgz |
Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.
The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.
Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.
Problem reports, updates or suggestions for this package should be reported with send-pr.