The post discusses tricks for jailbreaking hosts behind enterprise firewalls to facilitate inbound and outbound requests over any protocol. These tricks are beneficial for deploying software in hostile networking environments, especially for vendors selling on-premises software that needs to operate within restricted networks. The post outlines techniques such as forward proxies, reverse proxies, reverse tunnels, and corkscrew to bypass firewall restrictions effectively. The most intriguing trick discussed is tunneling inbound SSH connections inside outbound HTTPS requests, providing full command-line access to on-premises hosts with minimal firewall permissions. The author emphasizes the creative use of open-source tools to escape restrictive firewalls.
https://www.haskellforall.com/2024/08/firewall-rules-not-as-secure-as-you.html