Well, you can use ssh in proxy tunnel mode. You connect from one machine to another and configure the proxy port, and then the client connects to the local port on your computer, and ssh proxies the TCP connection to the remote machine.
The parameter required for the ssh command is -L .
The comment notes that this, at least theoretically, is at risk of some program on the client machine climbing to the port.
However, SSL requires many mechanisms. If I had to do this and I really didn't want to use -L, I would dive into the ssh source and come up with a scheme to do what -L does.
bmargulies
source share