Article delegate-en/1638 of [1-5169] on the server localhost:119
  upper oldest olders older1 this newer1 newers latest
[Top/Up] [oldest] - [Older+chunk] - [Newer+chunk] - [newest + Check]
Newsgroups: mail-lists.delegate-en

[DeleGate-En] Re: blocking ports through socks
02 May 2002 17:11:02 GMT (Yutaka Sato)

On 05/03/02(00:10) you Vaughn Jardine <> wrote
in <_A1637@delegate-en.ML_>
 |Thanks for all the help so far. I am still having problems blocking access
 |to port 1214 through socks. Let me give you the exact line I am using.
 |./delegated -P1080 SERVER=socks PERMIT="*:\!{*:1214}:*"
 |I used the "\" like you said and the system accepted it without problems,
 |but the above line is blocking EVERYTHING, and not just everything destined
 |to a server on port 1214.

How to escape a reserved character depends on each shell.  In cshell,
a echo command

 % echo "\!"



but bash prints


thus "\!" does not represent literal "!" in bash.  I'm not familier with
bash but tested that

 $ echo '!'



so at least


will do in bash.  Anyway a user of DeleGate is expected to be familier 
with his/her own shell, with which I'm not familier.

And to escape these shell dependent problem, you can use parameter file
like following example: 

 delegated +=parameters

 [the content of parameters file]

See <URL:> for
more details.

 |Can you please send me a full line that would allow everything to go through
 |(using socks) but block access to any server listening on port 1214 like

  @ @ Yutaka Sato <>
 ( - ) National Institute of Advanced Industrial Science and Technology (AIST)
_<   >_ 1-1-4 Umezono, Tsukuba, Ibaraki, 305-8568 Japan

  admin search upper oldest olders older1 this newer1 newers latest
[Top/Up] [oldest] - [Older+chunk] - [Newer+chunk] - [newest + Check]