220 likes | 430 Views
Secure communication through ssh tunneling. By Chris Zachor CS 650. Outline. Introduction SSH Overview Scenarios How To: Results Conclusion. Introduction. Problem: How do we communicate securely over an insecure network? Solution: Use an SSH encrypted tunnel
E N D
Secure communication through ssh tunneling By Chris Zachor CS 650
Outline • Introduction • SSH Overview • Scenarios • How To: • Results • Conclusion
Introduction • Problem: How do we communicate securely over an insecure network? • Solution: Use an SSH encrypted tunnel • We will focus on passive eavesdropping attacks which violate confidentiality
SSH Overview • A secure replacement for insecure applications such as telnet and rlogin • A symmetric key is negotiated using public and private keys • The client is then authenticated on the server and allowed to execute commands remotely • This includes allowing the server to forward data for the client
What You Will Need • SSH server (OpenSSH) • SSH client • Proxy Aware Application/Proxy wrapper • Dynamic DNS Service (Optional)
Results • So what have we achieved through the use of this SSH tunnel?
Conclusion • Using an SSH tunnel we can protect our communications on networks that are not trusted • This is useful against passive attacks where the attacker is simply eavesdropping • There is still the possibility of Man-In-The-Middle attacks if you are not careful