Secure communication through ssh tunneling

Post on 23-Feb-2016

62 views 0 download

Tags:

description

Secure communication through ssh tunneling. By Chris Zachor CS 650. Outline. Introduction SSH Overview Scenarios How To: Results Conclusion. Introduction. Problem: How do we communicate securely over an insecure network? Solution: Use an SSH encrypted tunnel - PowerPoint PPT Presentation

transcript

SECURE COMMUNICATION THROUGH SSH TUNNELING

By Chris ZachorCS 650

Outline Introduction SSH Overview Scenarios How To: Results Conclusion

Introduction Problem: How do we communicate

securely over an insecure network? Solution: Use an SSH encrypted tunnel We will focus on passive eavesdropping

attacks which violate confidentiality

SSH Overview A secure replacement for insecure

applications such as telnet and rlogin A symmetric key is negotiated using

public and private keys The client is then authenticated on the

server and allowed to execute commands remotely

This includes allowing the server to forward data for the client

Scenario 1: Unencrypted

Scenario 1: Unencrypted

Scenario 1: Unencrypted

Scenario 1: Unencrypted

Scenario 2: Encrypted

What You Will Need SSH server (OpenSSH) SSH client Proxy Aware Application/Proxy wrapper Dynamic DNS Service (Optional)

Creating The Tunnel

Configuring Your App

Additional Settings

Results So what have we achieved through the

use of this SSH tunnel?

Before Tunnel

After Tunnel

Conclusion Using an SSH tunnel we can protect our

communications on networks that are not trusted

This is useful against passive attacks where the attacker is simply eavesdropping

There is still the possibility of Man-In-The-Middle attacks if you are not careful

Questions/Comments?