View
62
Download
0
Category
Tags:
Preview:
DESCRIPTION
Secure communication through ssh tunneling. By Chris Zachor CS 650. Outline. Introduction SSH Overview Scenarios How To: Results Conclusion. Introduction. Problem: How do we communicate securely over an insecure network? Solution: Use an SSH encrypted tunnel - PowerPoint PPT Presentation
Citation preview
SECURE COMMUNICATION THROUGH SSH TUNNELING
By Chris ZachorCS 650
Outline Introduction SSH Overview Scenarios How To: Results Conclusion
Introduction Problem: How do we communicate
securely over an insecure network? Solution: Use an SSH encrypted tunnel We will focus on passive eavesdropping
attacks which violate confidentiality
SSH Overview A secure replacement for insecure
applications such as telnet and rlogin A symmetric key is negotiated using
public and private keys The client is then authenticated on the
server and allowed to execute commands remotely
This includes allowing the server to forward data for the client
Scenario 1: Unencrypted
Scenario 1: Unencrypted
Scenario 1: Unencrypted
Scenario 1: Unencrypted
Scenario 2: Encrypted
What You Will Need SSH server (OpenSSH) SSH client Proxy Aware Application/Proxy wrapper Dynamic DNS Service (Optional)
Creating The Tunnel
Configuring Your App
Additional Settings
Results So what have we achieved through the
use of this SSH tunnel?
Before Tunnel
After Tunnel
Conclusion Using an SSH tunnel we can protect our
communications on networks that are not trusted
This is useful against passive attacks where the attacker is simply eavesdropping
There is still the possibility of Man-In-The-Middle attacks if you are not careful
Questions/Comments?
Recommended