Using SSH through airplane WiFi that blocks port 22
Many aircraft that offer wifi only permit access to machines on port 80/443, the standard http(s) ports.
If you want to SSH, you have to set up an intermediate machine that hosts the SSH service on either port 80 or 443.
An easy (and free) way to do this is via a Google free-tier micro instance.
These instances have a 1 GB transfer ceiling per month, but so long are you are only transmitting textual data a few days per month, this limit should not be easily exceeded.
Set up one of these VMs via the Google Cloud console, and select CentOS 7 as the disk image.
Make sure that you allow http/https traffic on the instance, the two checkboxes in the Firewalls section of the VM settings.
Optionally, set a static external IP address for your server in the VM config, in case you don't want to look up the IP each time.
Then, ssh into the new VM (the IP address will be listed as the "external IP" in the list of instances) and edit your
/etc/ssh/sshd_config file, changing the
Port 22 line to
By default selinux will only allow the SSH service to use port 22, so you have to change your selinux permissions as well. Enter the following commands into the VM:
sudo su semanage port -m -t ssh_port_t -p tcp 80 firewall-cmd --permanent --zone=public --add-port=80/tcp firewall-cmd --reload systemctl restart sshd.service
Make sure that SSH is listening on port 80:
ss -tnlp | grep ssh
LISTEN 0 128 *:80 *:* users:(("sshd",pid=1895,fd=3)) LISTEN 0 128 :::80 :::* users:(("sshd",pid=1895,fd=4))
If so, log out and attempt to SSH into your server on the new port:
ssh 22.214.171.124 -p80
And you're done! Happy SSHing!