SPELL=sslh VERSION=1.20 SOURCE=${SPELL}-v${VERSION}.tar.gz SOURCE2=${SOURCE}.asc SOURCE_URL[0]=http://www.rutschle.net/tech/${SPELL}/${SOURCE} SOURCE2_URL[0]=${SOURCE_URL}.asc SOURCE_GPG=sslh.gpg:${SOURCE2}:UPSTREAM_KEY SOURCE2_IGNORE=signature SOURCE_DIRECTORY="${BUILD_DIRECTORY}/${SPELL}-v${VERSION}" DOCS="ChangeLog TODO example.cfg ${DOCS}" WEB_SITE=http://www.rutschle.net/sslh LICENSE[0]="GPLv2+" ENTERED=20150228 KEYWORDS="proxy" SHORT="applicative protocol multiplexer" cat << EOF sslh accepts connections on specified ports, and forwards them further based on tests performed on the first data packet sent by the remote client. Probes for HTTP, SSL, SSH, OpenVPN, tinc, XMPP are implemented, and any other protocol that can be tested using a regular expression, can be recognised. A typical use case is to allow serving several services on port 443 (e.g. to connect to ssh from inside a corporate firewall, which almost never block port 443) while still serving HTTPS on that port. Hence sslh acts as a protocol demultiplexer, or a switchboard. Its name comes from its original function to serve SSH and HTTPS on the same port. sslh supports IPv6, privilege dropping, transparent proxying, and more. EOF