Presentation is loading. Please wait.

Presentation is loading. Please wait.

By Chris Zachor CS 650.  Introduction  SSH Overview  Scenarios  How To:  Results  Conclusion.

Similar presentations


Presentation on theme: "By Chris Zachor CS 650.  Introduction  SSH Overview  Scenarios  How To:  Results  Conclusion."— Presentation transcript:

1 By Chris Zachor CS 650

2  Introduction  SSH Overview  Scenarios  How To:  Results  Conclusion

3  Problem: How do we communicate securely over an insecure network?  Solution: Use an SSH encrypted tunnel  We will focus on passive eavesdropping attacks which violate confidentiality

4  A secure replacement for insecure applications such as telnet and rlogin  A symmetric key is negotiated using public and private keys  The client is then authenticated on the server and allowed to execute commands remotely  This includes allowing the server to forward data for the client

5

6

7

8

9

10  SSH server (OpenSSH)  SSH client  Proxy Aware Application/Proxy wrapper  Dynamic DNS Service (Optional)

11

12

13

14  So what have we achieved through the use of this SSH tunnel?

15

16

17  Using an SSH tunnel we can protect our communications on networks that are not trusted  This is useful against passive attacks where the attacker is simply eavesdropping  There is still the possibility of Man-In-The- Middle attacks if you are not careful

18


Download ppt "By Chris Zachor CS 650.  Introduction  SSH Overview  Scenarios  How To:  Results  Conclusion."

Similar presentations


Ads by Google