25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Where:<br />

RSV Reserved for future use. All bytes are zero.<br />

FRAG Current fragment number.<br />

ATYP Address types in octets:<br />

X'01' <strong>IP</strong>v4 address<br />

X'03' Domain-name<br />

X'04' <strong>IP</strong>v6 address<br />

DST.ADDR Desired destination address.<br />

DST.PORT Desired destination port in network octet order.<br />

DATA User data.<br />

The UDP relay server gets the <strong>IP</strong> address of the client, which sends UDP<br />

datagrams to the port specified by DST.PORT. It then discards any datagram<br />

that comes from another source.<br />

22.6 Secure Shell (1 <strong>and</strong> 2)<br />

22.6.1 SSH overview<br />

SSH can secure connections between systems. It allows application traffic, such<br />

as that generated by Telnet, FTP POP3, or even X Window System, to be both<br />

encrypted <strong>and</strong> compressed. Compression is useful over slow modem links.<br />

Implementations allow the user a choice of encryption methods.<br />

Client software often offers both SSH1 <strong>and</strong> SSH2 support. The user is<br />

authenticated by password or public/private key.<br />

SSH1 offers Blowfish, DES, 3DES, <strong>and</strong> RC4 encryption ciphers.<br />

SSH2 offers 3DES, RC4, <strong>and</strong> Twofish encryption ciphers.<br />

SSH establishes a single <strong>TCP</strong>/<strong>IP</strong> connection from the client to the server. The<br />

traffic sent down this connection is encrypted, <strong>and</strong> optionally compressed using<br />

LempleZiv compression. Public/private keys can be used to verify both the user<br />

<strong>and</strong> the identity of the remote system.<br />

SSH <strong>and</strong> X Window System<br />

X Window System sessions can pass through the SSH connection. The SSH<br />

server generates a new DISPLAY variable (<strong>and</strong> xauth key) for the remote<br />

Chapter 22. <strong>TCP</strong>/<strong>IP</strong> security 853

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!