![]() Although many things are encrypted by default these days, this strategy can be useful if you find yourself using a program or protocol that isn’t. For example, if you are using an unencrypted protocol like pop3 mail, and accessing this over an untrusted network such as on public wifi, this type of tunnel can help you avoid others eavesdropping on your emails. One way this type of tunneling can be useful, is when you need to encrypt network traffic that would otherwise be sent in in the clear. In this case, you can use SSH tunneling to create a secure connection to the remote network, and then access the services you need as if you were on the network directly. For example, you might use this technique if you need to securely access services on a remote network, but the network does not have a VPN. There are many situations in which SSH tunneling can be useful. In a future article we will explain how to edit /etc/hosts in Windows and Linux for this purpose. This allows you to put or into your browser’s address bar, and the browser would then believe these websites are hosted at IP address 127.0.0.1, and so the traffic would go via your tunnel. You’d then update your /etc/hosts file to point to 127.0.0.1. To get this started, you want to have the “Source Port” be port 80 (for http websites), or port 443 (for https websites), in the PuTTy settings. However, there is a way around this limitation, but it requires a bit of effort, and needs to be done for each website you want to access. Due to these limitations, this type of tunnel setup is usually better for traffic other than website traffic, such as telling an email client what server IP and port to connect to. However, the website at that address would usually link to the full domain name at and so clicking on anything would lead to loading the website directly instead of through the tunnel. If you are using a web browser to get to you can now browse to it via the tunnel when entering the URL. Any traffic sent to the local IP and port will be forwarded through the secure SSH tunnel to the destination host and port. 8080) as if it were the remote port on the destination host (e.g. Once the tunnel is established, you can use your local port (e.g. Almost there! Just click “open” to connect via SSH, and enter your username and password when prompted.From here, enter a name for the session under “Saved Sessions”, and then click “Save” so that you can easily load these options again later. Click the “Session” option in the “Category” panel to go back to the first screen again. ![]() ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |