1 / 18

Secure communication through ssh tunneling

Secure communication through ssh tunneling. By Chris Zachor CS 650. Outline. Introduction SSH Overview Scenarios How To: Results Conclusion. Introduction. Problem: How do we communicate securely over an insecure network? Solution: Use an SSH encrypted tunnel

marcel
Download Presentation

Secure communication through ssh tunneling

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure communication through ssh tunneling By Chris Zachor CS 650

  2. Outline • Introduction • SSH Overview • Scenarios • How To: • Results • Conclusion

  3. Introduction • Problem: How do we communicate securely over an insecure network? • Solution: Use an SSH encrypted tunnel • We will focus on passive eavesdropping attacks which violate confidentiality

  4. SSH Overview • A secure replacement for insecure applications such as telnet and rlogin • A symmetric key is negotiated using public and private keys • The client is then authenticated on the server and allowed to execute commands remotely • This includes allowing the server to forward data for the client

  5. Scenario 1: Unencrypted

  6. Scenario 1: Unencrypted

  7. Scenario 1: Unencrypted

  8. Scenario 1: Unencrypted

  9. Scenario 2: Encrypted

  10. What You Will Need • SSH server (OpenSSH) • SSH client • Proxy Aware Application/Proxy wrapper • Dynamic DNS Service (Optional)

  11. Creating The Tunnel

  12. Configuring Your App

  13. Additional Settings

  14. Results • So what have we achieved through the use of this SSH tunnel?

  15. Before Tunnel

  16. After Tunnel

  17. Conclusion • Using an SSH tunnel we can protect our communications on networks that are not trusted • This is useful against passive attacks where the attacker is simply eavesdropping • There is still the possibility of Man-In-The-Middle attacks if you are not careful

  18. Questions/Comments?

More Related