Practical Security: Creating SSH Tunnels
Jan 20, 2009, 21:32 (0 Talkback[s])
(Other stories by Jeremy M. Jones)
WEBINAR: On-demand webcast
How to Boost Database Development Productivity on Linux, Docker, and Kubernetes with Microsoft SQL Server 2017 REGISTER >
"There are two primary reasons to use ssh for tunneling. Before
I give those reasons, I'll describe what tunneling is.
"Tunneling with ssh is the process of wrapping some network
communication with the encrypted ssh protocol. Tunneling involves
an ssh client connecting to an ssh server, just as in "regular
cases." But when the ssh client connects to the server, the client
specifies the source and the destination for the tunnel.
"The source is simply a bound network port that other processes
can connect to. This port must either be managed by the ssh client
or the ssh server.
"The destination is another bound network port; but this time,
it's some other network server that the other end of the ssh tunnel
can communicate with. If this seems a bit unclear, don't worry;
I'll get into more detail shortly with an example. For now, you can
just think of ssh tunneling as secure port forwarding."
- Mastering SSH: Connecting, Executing Remote Commands and Using Authorized Keys(Jan 01, 2009)
- Speed Up Multiple SSH Connections to the Same Server(Dec 29, 2008)
- Parallel SSH Execution and a Single Shell to Control Them All(Oct 31, 2008)
- rsnapshot - Local/Remote Filesystem Backups Utility in openSUSE(Oct 08, 2008)
- Linux Security Idiots(Aug 28, 2008)
- OpenSSH for Red Hat Enterprise Linux Packages May Have Been Compromised(Aug 22, 2008)
- sshpass--Non-Interactive ssh Password Authentication(May 05, 2008)
- SSH Key Authentication Using Seahorse (GUI)(Feb 18, 2008)
- SSH: Best Practices(Jan 18, 2008)