• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Genome@home behind a firewall

Q: Can you run G@H behind a firewall?

A: 1) If your firewall supports SOCKS, G@H purports to support it and provides config options. But I couldn't make that work. Perhaps my company's firewall passes SOCKS only for certain port numbers.

2) I am currently ruuning G@H behind an HTTP only firewall, using HTTPort, thanks to a suggestion from poof. The config is not bad:

a) In ghclient.cfg, replace the line

server=vsp18.stanford.edu

with

server=127.0.0.1

Your original server name may be different - make a note of it (use your clipboard).

b) Fire up HTTPort. On the proxy tab, put in the name of your firewall proxy and port (probably 80). Under Bypass mode select "Remote host". On the Port Mapping tab, make a new mapping (call it Genome@home). Enter the following setting under the new mapping:

Local port: 10100 (this in from ghclient.cfg)
Remote host: vsp18.stanford.edu (this is from the "server=" in ghclient.cfg -
- it may be different for you)
Remote port: 10100 (again, from ghclient.cfg)

Unless you want them you can trash all the example mappings they give you.

c) Fire up HTTPort (on the Proxy tab hit Start). Fire up G@H and see if it connects. The HTTPort panel gives you some stats on the Port mapping tab.

This has worked pretty well for me, although since you're using a public proxy machine somewhere to do the reverse port translation, you're counting on its response, which has occasionally caused timeouts. But it seems reliable enough for this application. You can try changing the public server you use, from the list at HTTPort if you like to mess around. Good luck and happy tunneling.
 
There was recently another way to do this if the httport didn't work. Apparently the program called Sockscap in addition to httport, seems to help alot - both for F@H and most likely G@H. Got this info from this thread at Ars. You can dig around in there to get people's experiences. Most of the credit for this came from HardOCP though.. Seems Kyle has rallied his troops in a big way... 😉
 
Back
Top