To achieve this with socat
, you can set up a listener on a local TCP port that forwards incoming connections to another host and port using SSL. Additionally, you can enable forking so that each incoming connection is handled by a separate process.
Here's an example command:
socat -d -d -d TCP-LISTEN:LOCAL_PORT,fork,reuseaddr OPENSSL:REMOTE_HOST:REMOTE_PORT,verify=0
Explanation of the options used:
-d -d -d
: Enable debug output (optional but useful for troubleshooting).TCP-LISTEN:LOCAL_PORT
: Listen on the specified local TCP port.fork
: Fork a new process for each incoming connection.reuseaddr
: Allow reuse of the address (useful if restarting socat quickly).
OPENSSL:REMOTE_HOST:REMOTE_PORT
: Forward the connection to the specified remote host and port using SSL.verify=0
: Disable SSL certificate verification (you may want to adjust this based on your security requirements).
Replace LOCAL_PORT
with the local port number you want to listen on, and replace REMOTE_HOST
and REMOTE_PORT
with the target host and port you want to tunnel to via SSL.
Example usage:
socat -d -d -d TCP-LISTEN:8080,fork,reuseaddr OPENSSL:www.example.com:443,verify=0
This command will listen on local port 8080. When a client connects to this port, socat will fork a new process and forward the connection over SSL to www.example.com on port 443.