4 # Definition of 'My::Project::ssht' for list.cgi.pl
5 # Copyright (C) 2003 Jan Kratochvil <project-www.jankratochvil.net@jankratochvil.net>
7 # This program is free software; you can redistribute it and/or modify
8 # it under the terms of the GNU General Public License as published by
9 # the Free Software Foundation; exactly version 2 of June 1991 is required
11 # This program is distributed in the hope that it will be useful,
12 # but WITHOUT ANY WARRANTY; without even the implied warranty of
13 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 # GNU General Public License for more details.
16 # You should have received a copy of the GNU General Public License
17 # along with this program; if not, write to the Free Software
18 # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
21 package project::ssht::ListItem;
22 require 5.6.0; # at least 'use warnings;' but we need some 5.6.0+ modules anyway
23 our $VERSION=do { my @r=(q$Revision$=~/\d+/g); sprintf "%d.".("%03d"x$#r),@r; };
33 "platform"=>"unixuser",
36 "summary"=>'Intranet host accessibility by '.a_href('http://www.openssh.org/','SSH').' tunnel',
38 "maintenance"=>"ready",
39 "sponsorship"=>a_href('http://www.jklabs.cz/','JKLabs'),
41 "description"=><<"HERE",
42 <p>Do you need to admin remote host placed in the intranet behind enemy firewall?
43 If you are able to set up port forward on the firewalling you are done.
44 In the case of HTTP-only proxy you cannot use these scripts - look elsewhere.</p>
45 <p>If the firewall performat NAT (masquerade) where you can connect from
46 the intranet to the outer world by @{[ a_href 'http://www.openssh.org/','SSH' ]}
47 you can use these security safe (TODO: chroot) scripts.</p>