Download presentation
Presentation is loading. Please wait.
Published byJayson Townsend Modified over 8 years ago
1
By Chris Zachor CS 650
2
Introduction SSH Overview Scenarios How To: Results Conclusion
3
Problem: How do we communicate securely over an insecure network? Solution: Use an SSH encrypted tunnel We will focus on passive eavesdropping attacks which violate confidentiality
4
A secure replacement for insecure applications such as telnet and rlogin A symmetric key is negotiated using public and private keys The client is then authenticated on the server and allowed to execute commands remotely This includes allowing the server to forward data for the client
10
SSH server (OpenSSH) SSH client Proxy Aware Application/Proxy wrapper Dynamic DNS Service (Optional)
14
So what have we achieved through the use of this SSH tunnel?
17
Using an SSH tunnel we can protect our communications on networks that are not trusted This is useful against passive attacks where the attacker is simply eavesdropping There is still the possibility of Man-In-The- Middle attacks if you are not careful
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.