23.11.2012 Views

Securing the VOS Telnet Daemon

Securing the VOS Telnet Daemon

Securing the VOS Telnet Daemon

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Using SSH tunnels<br />

� How users set up <strong>the</strong> SSH tunnel will depend on <strong>the</strong>ir SSH client<br />

� What happens is<br />

1. SSH client on <strong>the</strong> client host makes a connection to <strong>the</strong> SSH server<br />

on <strong>the</strong> module (link A in next slide)<br />

2. The SSH client on <strong>the</strong> client host starts listening on <strong>the</strong> port<br />

specified (12345) during setup on <strong>the</strong> client host<br />

3. The client’s telnet client makes a connection to localhost port 12345<br />

(link B in next slide)<br />

4. The SSH client sends this connection request to <strong>the</strong> SSH server on<br />

<strong>the</strong> module which makes a connection to <strong>the</strong> port specified (23)<br />

during setup on <strong>the</strong> client system (link C)<br />

� The connections between <strong>the</strong> telnet client and SSH on <strong>the</strong> client<br />

system and between SSHD and telnetd on <strong>the</strong> module are<br />

unencrypted but never leave <strong>the</strong> local host<br />

� Communication between hosts is encrypted by SSH<br />

14

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!