25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

X Window System’s clients. SSH forwards the X Window System traffic to the<br />

user’s local X Server. Users have to supply their own X Server applications;<br />

make sure it is listening on the local host.<br />

SSH port forwarding<br />

SSH offers the ability to map <strong>TCP</strong>/<strong>IP</strong> ports across systems. For example, you<br />

can configure SSH to copy data between a port on the client’s local host <strong>and</strong> the<br />

servers POP3 port. By running a POP3 client <strong>and</strong> pointing it at the local host, you<br />

establish a secure encrypted session over which to read e-mail.<br />

22.7 Secure Sockets Layer (SSL)<br />

22.7.1 SSL overview<br />

SSL is a security protocol that was developed by Netscape Communications<br />

Corporation, along with RSA Data Security, Inc. The primary goal of the SSL<br />

protocol is to provide a private channel between communicating applications,<br />

which ensures privacy of data, authentication of the partners, <strong>and</strong> integrity.<br />

SSL provides an alternative to the st<strong>and</strong>ard <strong>TCP</strong>/<strong>IP</strong> socket API that has security<br />

implemented within it. Therefore, in theory, it is possible to run any <strong>TCP</strong>/<strong>IP</strong><br />

application in a secure way without changing the application. In practice, SSL is<br />

only widely implemented for HTTP connections, but Netscape Communications<br />

Corp. has stated an intention to employ it for other application types, such as<br />

NNTP <strong>and</strong> Telnet, <strong>and</strong> there are several such implementations freely available<br />

on the Internet. <strong>IBM</strong>, for example, uses SSL to enhance security for TN3270<br />

sessions in the <strong>IBM</strong> WebSphere Host On-Dem<strong>and</strong> <strong>and</strong> eNetwork<br />

Communications Server products.<br />

SSL is composed of two layers:<br />

► At the lower layer, a protocol for transferring data using a variety of<br />

predefined cipher <strong>and</strong> authentication combinations, called the SSL Record<br />

Protocol. Figure 22-49 on page 855 illustrates this <strong>and</strong> contrasts it with a<br />

st<strong>and</strong>ard HTTP socket connection. Note that this diagram shows SSL as<br />

providing a simple socket interface on which other applications can be<br />

layered. In reality, current implementations have the socket interface<br />

embedded within the application <strong>and</strong> do not expose an API that other<br />

applications can use.<br />

► On the upper layer, a protocol for initial authentication <strong>and</strong> transfer of<br />

encryption keys, called the SSL H<strong>and</strong>shake Protocol.<br />

854 <strong>TCP</strong>/<strong>IP</strong> <strong>Tutorial</strong> <strong>and</strong> <strong>Technical</strong> <strong>Overview</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!