18
SECURE COMMUNICATION THROUGH SSH TUNNELING By Chris Zachor CS 650

Secure communication through ssh tunneling

  • Upload
    marcel

  • View
    70

  • Download
    0

Embed Size (px)

DESCRIPTION

Secure communication through ssh tunneling. By Chris Zachor CS 650. Outline. Introduction SSH Overview Scenarios How To: Results Conclusion. Introduction. Problem: How do we communicate securely over an insecure network? Solution: Use an SSH encrypted tunnel - PowerPoint PPT Presentation

Citation preview

Page 1: Secure communication through  ssh  tunneling

SECURE COMMUNICATION THROUGH SSH TUNNELING

By Chris ZachorCS 650

Page 2: Secure communication through  ssh  tunneling

Outline Introduction SSH Overview Scenarios How To: Results Conclusion

Page 3: Secure communication through  ssh  tunneling

Introduction Problem: How do we communicate

securely over an insecure network? Solution: Use an SSH encrypted tunnel We will focus on passive eavesdropping

attacks which violate confidentiality

Page 4: Secure communication through  ssh  tunneling

SSH Overview A secure replacement for insecure

applications such as telnet and rlogin A symmetric key is negotiated using

public and private keys The client is then authenticated on the

server and allowed to execute commands remotely

This includes allowing the server to forward data for the client

Page 5: Secure communication through  ssh  tunneling

Scenario 1: Unencrypted

Page 6: Secure communication through  ssh  tunneling

Scenario 1: Unencrypted

Page 7: Secure communication through  ssh  tunneling

Scenario 1: Unencrypted

Page 8: Secure communication through  ssh  tunneling

Scenario 1: Unencrypted

Page 9: Secure communication through  ssh  tunneling

Scenario 2: Encrypted

Page 10: Secure communication through  ssh  tunneling

What You Will Need SSH server (OpenSSH) SSH client Proxy Aware Application/Proxy wrapper Dynamic DNS Service (Optional)

Page 11: Secure communication through  ssh  tunneling

Creating The Tunnel

Page 12: Secure communication through  ssh  tunneling

Configuring Your App

Page 13: Secure communication through  ssh  tunneling

Additional Settings

Page 14: Secure communication through  ssh  tunneling

Results So what have we achieved through the

use of this SSH tunnel?

Page 15: Secure communication through  ssh  tunneling

Before Tunnel

Page 16: Secure communication through  ssh  tunneling

After Tunnel

Page 17: Secure communication through  ssh  tunneling

Conclusion Using an SSH tunnel we can protect our

communications on networks that are not trusted

This is useful against passive attacks where the attacker is simply eavesdropping

There is still the possibility of Man-In-The-Middle attacks if you are not careful

Page 18: Secure communication through  ssh  tunneling

Questions/Comments?