
Hence redundant levels of security can be achieved using this. The main point to note here is that, the application that you will secure using SSH will not even be aware of this, hence there is no major modification required on that application (But yeah you need to modify the ssh settings ).Īnother added advantage of securing other insecure applications using SSH is that, the security provided by ssh will be an added layer of security apart from the existing security layer provided by the application itself. So the security features that secures an SSH connection can now be used to secure other protocols as well. You can say that the insecure protocol, will travel inside the secure SSH connection. The idea behind this is to forward or tunnel other insecure communication channels inside an ssh secure channel. The main objective of this article is to explain the working of securing other insecure applications by using a secure SSH connection. You might be thinking how can you secure another application which will be running on another port, other than ssh using SSH itself. There are too many weakly authenticated applications out there, which can be secured by using SSH. I must say using this feature, you can go ahead and secure any insecure protocol available. And it has got several good features, that can even help secure some other insecure protocols. The SSH application that comes with many of the Linux distribution is called as OpenSSH. We have already discussed about that modified version, which is a good alternative to ssh. It has got several advanced features compared to ssh. There is a better modified application which was inspired by ssh, and is now available. However there are many other protocol's that needed to be secured.Īfter the initial introduction of SSH in 1995, the protocol has went a couple of iterations and the current secure version is SSH version 2 protocol. SSH secured our primary task of remote login, by authenticating both the client and the server and also securing the data transmitted with powerful encryption algorithms. If you daily use SSH and wants to know how this thing works, then I would recommend reading the below post.

System administrators use this tool day and night to gain access to their remote systems.

The new design and implementation made by Tatu Ylönen, is called as SSH (Secure Shell.). Due to this, anybody with a little bit technical knowledge can sniff the packets and read the password. In other words, remote login programs prior to 1995 used to send login credentials and other critical information in clear text format through the wire.
#Creating ssh tunnel linux password
The primary objective behind Tatu Ylönen's design of the new protocol was to stop password sniffing attacks. During the mid 90's (1995 to be precise) one researcher named Tatu Ylönen, at the university of Helsinki (Finland) designed a protocol, that eventually replaced all remote login programs.
