This document provides recipes and explanations for using SSH tunneling techniques. SSH tunneling allows creating encrypted tunnels through an SSH connection to securely access services, bypass firewalls and censorship, and forward X11 applications. It discusses local and remote port forwarding, dynamic SOCKS proxying, and tools like autossh and sslh. Common uses of SSH tunneling include securely accessing services on insecure networks, circumventing censorship, opening firewall ports dynamically through port knocking, and forwarding graphical X11 applications remotely.
Overview of the SSH protocol.
SSH (Secure SHell) is a secure replacement for TELNET, rcp, rlogin, rsh (for login, remote execution of
commands, file transfer).
Security-wise SSH provides confidentiality (nobody can read the message content), integrity (guarantee that data is unaltered in transit) and authentication (of client and server). This provides protection against many of the possible attack vectors like IP spoofing, DNS spoofing, Password interception and eavesdropping.
SSH exists in 2 versions. SSH-2 fixes some of the shortcomings of SSH-1 so it should be used in place of SSH-1.
SSH also comes with features that in itself raise security concerns like tunneling and port forwarding.
Overview of the SSH protocol.
SSH (Secure SHell) is a secure replacement for TELNET, rcp, rlogin, rsh (for login, remote execution of
commands, file transfer).
Security-wise SSH provides confidentiality (nobody can read the message content), integrity (guarantee that data is unaltered in transit) and authentication (of client and server). This provides protection against many of the possible attack vectors like IP spoofing, DNS spoofing, Password interception and eavesdropping.
SSH exists in 2 versions. SSH-2 fixes some of the shortcomings of SSH-1 so it should be used in place of SSH-1.
SSH also comes with features that in itself raise security concerns like tunneling and port forwarding.
Slides from a presentation I gave on SSH. Covers basics of ssh, password|keys|host-based authentication, agent/key forwarding, configuration files (global and user-specific), local/remote port forwarding, scp, rsync, and briefly mentions git's support.
Telnet and SSH configuration on ubuntu and windows. this presentation show how we can configure telnet and ssh on windows and linux and what additional software we will have to required.
Shell is a protocol that provides authentication, encryption and data integrity to secure network communications. Implementations of Secure Shell offer the following capabilities: a secure command-shell, secure file transfer, and remote access to a variety of TCP/IP applications via a secure tunnel. Secure Shell client and server applications are widely available for most popular operating systems.
SSH is a protocol for secure remote access to a machine over untrusted networks.
SSH is a replacement for telnet, rsh, rlogin and can replace ftp.
Uses Encryption.
SSH is not a shell like Unix Bourne shell and C shell (wildcard expansion and command interpreter)
Explain how TELNET and SSH works?
How could we apply them in our real life?
Why TELNET insecure?
what's the features of TELNET and SSH?
Authentication modes of SSH
Nagios Conference 2013 - Leland Lammert - Nagios in a Multi-Platform EnviornmentNagios
Leland Lammert's presentation on Nagios in a Multi-Platform Enviornment.
The presentation was given during the Nagios World Conference North America held Sept 20-Oct 2nd, 2013 in Saint Paul, MN. For more information on the conference (including photos and videos), visit: http://go.nagios.com/nwcna
OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on.
This talk will explain the most interesting features of ssh and some info about future developments.
OpenSMTPD is a FREE implementation of the server-side SMTP protocol as defined by RFC 5321, with some additional standard extensions. It allows ordinary machines to exchange e-mails with other systems speaking the SMTP protocol.
Started out of dissatisfaction with other implementations, OpenSMTPD nowadays is a fairly complete SMTP implementation.
Slides from a presentation I gave on SSH. Covers basics of ssh, password|keys|host-based authentication, agent/key forwarding, configuration files (global and user-specific), local/remote port forwarding, scp, rsync, and briefly mentions git's support.
Telnet and SSH configuration on ubuntu and windows. this presentation show how we can configure telnet and ssh on windows and linux and what additional software we will have to required.
Shell is a protocol that provides authentication, encryption and data integrity to secure network communications. Implementations of Secure Shell offer the following capabilities: a secure command-shell, secure file transfer, and remote access to a variety of TCP/IP applications via a secure tunnel. Secure Shell client and server applications are widely available for most popular operating systems.
SSH is a protocol for secure remote access to a machine over untrusted networks.
SSH is a replacement for telnet, rsh, rlogin and can replace ftp.
Uses Encryption.
SSH is not a shell like Unix Bourne shell and C shell (wildcard expansion and command interpreter)
Explain how TELNET and SSH works?
How could we apply them in our real life?
Why TELNET insecure?
what's the features of TELNET and SSH?
Authentication modes of SSH
Nagios Conference 2013 - Leland Lammert - Nagios in a Multi-Platform EnviornmentNagios
Leland Lammert's presentation on Nagios in a Multi-Platform Enviornment.
The presentation was given during the Nagios World Conference North America held Sept 20-Oct 2nd, 2013 in Saint Paul, MN. For more information on the conference (including photos and videos), visit: http://go.nagios.com/nwcna
OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on.
This talk will explain the most interesting features of ssh and some info about future developments.
OpenSMTPD is a FREE implementation of the server-side SMTP protocol as defined by RFC 5321, with some additional standard extensions. It allows ordinary machines to exchange e-mails with other systems speaking the SMTP protocol.
Started out of dissatisfaction with other implementations, OpenSMTPD nowadays is a fairly complete SMTP implementation.
Integrated Geophysical Approach for Rapid & Cost Effective Site Investigation...IEI GSC
Dr. Sanjay Rana, Director, PARSAN Overseas (P) Limited
With inputs & examples from Dr Gopal Dhawan & Dr S L Kapil
at 31st National Convention of Civil Engineers
organised by
Gujarat State Center, The Institution of Engineers (India) at Ahmedabad
MADBike – Destapando la seguridad de BiciMAD (T3chFest 2017)Alex Rupérez
Descubre lo que NO tienes que hacer para que te revienten los servicios de tu app.
Hablo de los cambios de seguridad en la API privada de BiciMAD (https://www.bicimad.com) después de esta (https://eskerda.com/auditoria-bicimad/) auditoría en 2014.
Explico las herramientas y procesos que utilicé para hacer mi propia app MADBike (https://madbike.app.link/lxuaEi3VVv), pudiendo hacer login, recordar la contraseña e incluso consultar el saldo utilizando los servicios de la app oficial.
Y sobre todo, ¿como evitar que hagan lo mismo con tu API y con tu app?
Webinar topic: Up and Running SSH Service
Presenter: Achmad Mardiansyah, M. Taufik Nurhuda
In this webinar series, Up and Running SSH Service
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/8Y0NsleBFRg
Using Secure Shell on Linux: What Everyone Should KnowNovell
Secure Shell, or SSH, is a network protocol that allows data to be exchanged over a secure channel. SSH is much more than just data being passed over the wire. SSH can be used to tunnel traffic and specific ports or applications across multiple servers. SSH is a must for anyone using Linux. If you haven't used SSH, then you have not used Linux!
This session is designed for all technical staff or decision makers curious about great Linux tools and making access to Windows services, remote desktops and remote servers easier and less complicated. During this session, we will demonstrate techniques to tunnel RDP sessions, SOAP sessions and HTTP sessions between remote systems.
This presentation by Mykhailo Brodskyi (Lead Software Engineer, Consultant, GlobalLogic, Kharkiv) was delivered at GlobalLogic Kharkiv Java Conference 2019 on July 9, 2019.
Mykhailo told the audience about the development of a secure access architecture of remote devices with the help of a reverse proxy and ssh tunnels.
Video: https://youtu.be/U0DSEP61CqU
This presentation, DEFEATING THE NETWORK SECURITY INFRASTRUCTURE v1.0.pdf, was made after some brainstorming
with some friends. The techniques used are not new and the tools readily available for download. The purpose of the discussion however
is to debate how internal enterprise resources might be (in)adversely exposed to the internet by in an insider using a combination of common techniques such as SSH and SSL.
install hadoop in windows using maven and windows sdk and visual c++ compiler.
To install hadoop on windows see below link step by step guidance.
From version 2.3 hadoop suppot windows also but by default it supports linux and other version. to install in windows need to compile the hadoop source in native windows sdk and then that hadoop distribution generated can be used to run hadoop in windows.
hadoop installation on windows
Scaling out on the cloud is easy. Especially, if you have a software provisioning system that helps you to deploy your environment wherever you want. This session will give you an overview of the fantastic new features of HAProxy V 1.5, and how you can integrate it into your environment to build a high available environment, using open source software. Starting with a single-webserver + mysql setup provisioned via chef, we will deploy an HA Proxy Cluster in front and scale out your nginx and mysql database backend.
How to install Setup & Configure SSH Jump Server on a Linux boxEzee Login
Ezeelogin is an SSH gateway software solution, that enables enterprises to deploy their own custom SSH jump box in minutes. We empower thousands of enterprises across the globe to securely administrate and manage their Linux server infrastructure. router, switches via SSH to know more, do visit: https://www.ezeelogin.com
Introducing bastion hosts for oracle cloud infrastructure v1.0maaz khan
Bastion hosts leverage easy and secure connectivity from your On-premise to OCI regions. They are created in Public subnet with a Public IP. They secure hosts like db and applications servers in private subnet using a multi-tiered approach. They can be very effective for customers who are reluctant initially to use IPSec VPN or FastConnect to connect to OCI but still want to have POC done with their on-premise data.
This presentation will cover following -
1. Introduction to Bastion Hosts
2. Securing connectivity between bastion hosts and On-premise connectivity.
3. Securing Bastion hosts on public network to safeguard cloud resources.
4. Alternatives to Bastion hosts.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
2. Contents
1 SSH tunneling & common uses
2 Local port forwarding
3 Remote port forwarding
4 Dynamic port forwarding
5 X forwarding
6 Some useful tools
4. SSH tunneling
A secure shell (SSH) tunnel consists of
an encrypted tunnel created through a
SSH protocol connection.
— Wikipedia
5. Common uses
To securely connect to a remote host and
have your network traffic encrypted
6. Common uses
To securely connect to a remote host and
have your network traffic encrypted
• You are on a public, non secure, non trusted or unencrypted
network.
• You use an insecure protocol like POP3, IMAP, SMTP, FTP,
telnet, etc.
7. Common uses
To bypass local network restrictions and
monitoring services
12. Common uses
Access services bound to the loopback
interface
13. Contents
1 SSH tunneling & common uses
2 Local port forwarding
3 Remote port forwarding
4 Dynamic port forwarding
5 X forwarding
6 Some useful tools
14. Local port forwarding
Local port forwarding (aka outgoing
tunneling) forwards traffic coming to a local
port to a specified remote port
15. Local port forwarding
Recipe #1: Access a remote service behind a firewall
ssh -fN -L <localport>:localhost:<remoteport> user@external
The service is available on the loopback interface only.
16. Local port forwarding
Recipe #1: Access a remote service behind a firewall
ssh -fN -L <localport>:localhost:<remoteport> user@external
The service is available on the loopback interface only.
17. Local port forwarding
Recipe #1: Access a remote service behind a firewall
ssh -fN -L <localport>:localhost:<remoteport> user@external
The service is available on the loopback interface only.
18. Local port forwarding
Recipe #2: Access a remote service from any host behind the
firewall
ssh -fN -L 0.0.0.0:<localport>:localhost:<remoteport> user@external
or
ssh -fN -g -L <localport>:localhost:<remoteport> user@external
19. Local port forwarding
Recipe #2: Access a remote service from any host behind the
firewall
ssh -fN -L 0.0.0.0:<localport>:localhost:<remoteport> user@external
or
ssh -fN -g -L <localport>:localhost:<remoteport> user@external
20. Local port forwarding
Recipe #3: Access a remote service visible from the ssh
server
ssh -fN -L <localport>:external2:<remoteport> user@external
The service is available on the loopback interface only.
21. Local port forwarding
Recipe #3: Access a remote service visible from the ssh
server
ssh -fN -L <localport>:external2:<remoteport> user@external
The service is available on the loopback interface only.
22. Local port forwarding
Recipe #3: Access a remote service visible from the ssh
server
ssh -fN -L <localport>:external2:<remoteport> user@external
The service is available on the loopback interface only.
23. Local port forwarding
Recipe #4: Access a remote service visible from the ssh
server for any host behind the firewall
ssh -fN -L 0.0.0.0:<localport>:external2:<remoteport> user@external
or
ssh -fN -g -L <localport>:external2:<remoteport> user@external
24. Local port forwarding
Recipe #4: Access a remote service visible from the ssh
server for any host behind the firewall
ssh -fN -L 0.0.0.0:<localport>:external2:<remoteport> user@external
or
ssh -fN -g -L <localport>:external2:<remoteport> user@external
25. Contents
1 SSH tunneling & common uses
2 Local port forwarding
3 Remote port forwarding
4 Dynamic port forwarding
5 X forwarding
6 Some useful tools
26. Remote port forwarding
Remote port forwarding (aka incoming
tunneling) forwards traffic coming to a
remote port to a specified local port
27. Remote port forwarding
Recipe #5: Access a service behind a firewall from the ssh
server
ssh -fN -R <remoteport>:localhost:<localport> user@external
The service is available on the loopback interface only.
28. Remote port forwarding
Recipe #5: Access a service behind a firewall from the ssh
server
ssh -fN -R <remoteport>:localhost:<localport> user@external
The service is available on the loopback interface only.
29. Remote port forwarding
Recipe #5: Access a service behind a firewall from the ssh
server
ssh -fN -R <remoteport>:localhost:<localport> user@external
The service is available on the loopback interface only.
30. Remote port forwarding
Recipe #6: Access a service behind a firewall from any
external host with access to the ssh server
ssh -fN -R 0.0.0.0:<remoteport>:localhost:<localport> user@external
Edit /etc/ssh/sshd_config at ssh server to allow the client to select the address to which
the forwarding is bound:
GatewayPorts clientspecified
31. Remote port forwarding
Recipe #6: Access a service behind a firewall from any
external host with access to the ssh server
ssh -fN -R 0.0.0.0:<remoteport>:localhost:<localport> user@external
Edit /etc/ssh/sshd_config at ssh server to allow the client to select the address to which
the forwarding is bound:
GatewayPorts clientspecified
32. Remote port forwarding
Recipe #7: Access a service in a host accesible by the ssh
client from the ssh server
ssh -fN -R <remoteport>:internal2:<localport> user@external
The service is available on the loopback interface only.
33. Remote port forwarding
Recipe #7: Access a service in a host accesible by the ssh
client from the ssh server
ssh -fN -R <remoteport>:internal2:<localport> user@external
The service is available on the loopback interface only.
34. Remote port forwarding
Recipe #7: Access a service in a host accesible by the ssh
client from the ssh server
ssh -fN -R <remoteport>:internal2:<localport> user@external
The service is available on the loopback interface only.
35. Remote port forwarding
Recipe #8: Access a service in a host accesible by the ssh
client from any host with access to the ssh server
ssh -fN -R 0.0.0.0:<remoteport>:internal2:<localport> user@external
Edit /etc/ssh/sshd_config at server to allow the client to select the address to which the
forwarding is bound:
GatewayPorts clientspecified
36. Remote port forwarding
Recipe #8: Access a service in a host accesible by the ssh
client from any host with access to the ssh server
ssh -fN -R 0.0.0.0:<remoteport>:internal2:<localport> user@external
Edit /etc/ssh/sshd_config at server to allow the client to select the address to which the
forwarding is bound:
GatewayPorts clientspecified
37. Contents
1 SSH tunneling & common uses
2 Local port forwarding
3 Remote port forwarding
4 Dynamic port forwarding
5 X forwarding
6 Some useful tools
38. SOCKS
SOCKS is an Internet protocol that
routes network packets between a
client and server through a proxy
server
— Wikipedia
39. SSH dynamic port forwarding
• SSH dynamic port forwarding allows the user to
create a local SOCKS proxy.
• Free the user from the limitations of connecting
only to a predefined remote port and server.
• Circumvention tool allowing to bypass Internet
filtering to access content otherwise blocked by
governments, workplaces and schools.
40. Dynamic port forwarding with SOCKS
Recipe #9: Setup a SOCKS proxy
ssh -fN -D <proxyport> user@sshserver
To allow any internal host to use the proxy:
ssh -fN -D 0.0.0.0:<proxyport> user@sshserver
41. Dynamic port forwarding with SOCKS
Recipe #9: Setup a SOCKS proxy
ssh -fN -D <proxyport> user@sshserver
To allow any internal host to use the proxy:
ssh -fN -D 0.0.0.0:<proxyport> user@sshserver
42. Contents
1 SSH tunneling & common uses
2 Local port forwarding
3 Remote port forwarding
4 Dynamic port forwarding
5 X forwarding
6 Some useful tools
43. X forwarding
• Using X, you can run remote X applications that open their
windows on your local display.
• The X protocol is insecure and wide open to snoopers.
• SSH X forwarding makes the communication secure by tunneling
the X protocol:
ssh -X user@server xclock
44. Contents
1 SSH tunneling & common uses
2 Local port forwarding
3 Remote port forwarding
4 Dynamic port forwarding
5 X forwarding
6 Some useful tools
45. autossh
autossh is a program to start a copy of ssh and
monitor it, restarting it as necessary should it die or
stop passing traffic.
autossh -M <port>[:echo_port] [-f] [SSH OPTIONS]
46. sslh
sslh makes it possible to connect to an SSH server or
an OpenVPN on port 443 while still serving HTTPS
on that port.
47. Port knocking
port knocking is a method of externally opening ports on
a firewall by generating a connection attempt on a set of
prespecified closed ports. Once a correct sequence of
connection attempts is received, the firewall rules are
dynamically modified to allow the host which sent the
connection attempts to connect over specific port(s).
— Wikipedia
48. Port knocking
(A) client cannot connect to
application listening on port n
(B) client cannot establish connection
to any port
49. Port knocking
(1,2,3,4) client connects to a
well-defined set of ports in a sequence
that contains an encrypted message
by sending SYN packets; client has a
priori knowledge of the port knocking
daemon and its configuration, but
receives no acknowledgement during
this phase because firewall rules
preclude any response
50. Port knocking
(A) server process (a port knocking
daemon) intercepts connection
attempts and interprets (decrypts and
decodes) them as comprising an
authentic "port knock"; server carries
out specific task based on content of
port knock, such as opening port n to
client
51. Port knocking
(A) client connects to port n and
authenticates using applications
regular mechanism
52. knockd
knockd is a port-knock server. It listens to all traffic on
an ethernet interface, looking for special "knock"
sequences of port-hits.
54. Picture credits
• Cover photo by twicepix:
http://www.flickr.com/photos/twicepix/2825051329/
• The map of the cyber-censorship by Reporters Without Borders:
http://march12.rsf.org/en/
55. This work is licensed under a Creative Commons
Attribution-NonCommercial-ShareAlike 3.0 Unported License.