Results 1 to 9 of 9

Thread: ssh tunnel - how good?

  1. #1
    adam1701
    Guest

    ssh tunnel - how good?

    I use an SSH tunnel for all of my internet usage. How secure is this? If someone looks at the packets, what can they tell? (apart from the destination..)

    cheers

  2. #2
    Jay
    Jay is offline
    Gentlemen.. we're history Jay's Avatar
    Join Date
    Aug 2006
    Location
    Jita
    Posts
    8,365
    Thanks
    304
    Thanked
    568 times in 409 posts

    Re: ssh tunnel - how good?

    they can probably tell its SSH and that's about it. SSH isn't as secure as everyone thinks though.
    Last edited by Jay; 16-09-2009 at 08:53 AM.
    □ΞVΞ□

  3. #3
    Seething Cauldron of Hatred TheAnimus's Avatar
    Join Date
    Aug 2005
    Posts
    17,168
    Thanks
    803
    Thanked
    2,152 times in 1,408 posts

    Re: ssh tunnel - how good?

    tell that to the openbsd team!
    throw new ArgumentException (String, String, Exception)

  4. #4
    Gentoo Ricer
    Join Date
    Jan 2005
    Location
    Galway
    Posts
    11,048
    Thanks
    1,016
    Thanked
    944 times in 704 posts
    • aidanjt's system
      • Motherboard:
      • Asus Strix Z370-G
      • CPU:
      • Intel i7-8700K
      • Memory:
      • 2x8GB Corsiar LPX 3000C15
      • Storage:
      • 500GB Samsung 960 EVO
      • Graphics card(s):
      • EVGA GTX 970 SC ACX 2.0
      • PSU:
      • EVGA G3 750W
      • Case:
      • Fractal Design Define C Mini
      • Operating System:
      • Windows 10 Pro
      • Monitor(s):
      • Asus MG279Q
      • Internet:
      • 240mbps Virgin Cable

    Re: ssh tunnel - how good?

    Quote Originally Posted by adam1701 View Post
    I use an SSH tunnel for all of my internet usage. How secure is this? If someone looks at the packets, what can they tell? (apart from the destination..)

    cheers
    As long as the server is well configured and you have your public RSA key on it, it's very very secure. SSH1 has some known vulnerabilities however.
    Quote Originally Posted by Agent View Post
    ...every time Creative bring out a new card range their advertising makes it sound like they have discovered a way to insert a thousand Chuck Norris super dwarfs in your ears...

  5. #5
    Senior Member
    Join Date
    Aug 2003
    Posts
    655
    Thanks
    0
    Thanked
    22 times in 22 posts

    Re: ssh tunnel - how good?

    Nobody is interested in your internet traffic, really. That's rather paranoid. And from the end of your tunnel to the destination it's not encrypted unless you only visit SSL sites.

  6. #6
    adam1701
    Guest

    Re: ssh tunnel - how good?

    Quote Originally Posted by Lourdes View Post
    Nobody is interested in your internet traffic, really. That's rather paranoid. And from the end of your tunnel to the destination it's not encrypted unless you only visit SSL sites.
    you don't know my situation, and yes, I'm only worried about traffic travelling over the network im using, once its on the internet im happy.

  7. #7
    The late but legendary peterb - Onward and Upward peterb's Avatar
    Join Date
    Aug 2005
    Location
    Looking down & checking on swearing
    Posts
    19,378
    Thanks
    2,892
    Thanked
    3,403 times in 2,693 posts

    Re: ssh tunnel - how good?

    Lourdes has confused SSL with SSH.

    SSH is an encryption system that uses well known (and secure) cryptographic techniques to protect the packet contents, but the packet headers are not encrypted so the source and destination addresses are in clear. SSH also provides an authentication procedure using PKI techniques, so unless you are likely to be specifically targeted, it is unlikely that your traffic can be decrypted - and provided you take appropriate precautions to protect your private key you should be OK.

    I use SSH to remotely connect to my server - it is regularly attacked (although not AFAIK a directed attack, and so far it has protected me - but that is the authentication side).

    If you haven't already done so, visit the SSH website or Google SSH) and download the manuals. There are a number of configuration files (sshd.conf and ssh.conf are the two important ones) that you need to pay attention to, if only to understand the potential weaknesses of mis-configuration.

    Like any security mechanism, it can be weakened by poor configuration or management.

    http://www.openssh.com/manual.html
    Last edited by peterb; 01-10-2009 at 07:29 AM.
    (\__/)
    (='.'=)
    (")_(")

    Been helped or just 'Like' a post? Use the Thanks button!
    My broadband speed - 750 Meganibbles/minute

  8. #8
    Jay
    Jay is offline
    Gentlemen.. we're history Jay's Avatar
    Join Date
    Aug 2006
    Location
    Jita
    Posts
    8,365
    Thanks
    304
    Thanked
    568 times in 409 posts

    Re: ssh tunnel - how good?

    One of the biggest faults I have seen with sshd.conf and ssh.conf is incorrect security settings on the files.
    □ΞVΞ□

  9. #9
    The late but legendary peterb - Onward and Upward peterb's Avatar
    Join Date
    Aug 2005
    Location
    Looking down & checking on swearing
    Posts
    19,378
    Thanks
    2,892
    Thanked
    3,403 times in 2,693 posts

    Re: ssh tunnel - how good?

    Quote Originally Posted by Jay View Post
    One of the biggest faults I have seen with sshd.conf and ssh.conf is incorrect security settings on the files.
    Indeed - and as I mentioned in my post above, any security mechanism can be negated by poor configuration. However the measures you impose and the effort you put into securing your system comes down to a risk assessment - the likelihood of an attack, and the impact if it is successful, against the effort (and perhaps cost) of increasing the security posture to mitigate the risk.

    One example is the configuration file line that allows or disallows password authentication. If you are using PKI authentication, this should be disabled - it then ONLY possible to login using the private key. But this is something you need to do manually! Look at the documents I linked to above! You need to consider how SSH will act in conjunction with othert security mechanisms that may be in place (PAM for example). In most cases the default will be sufficient, but you should at least review it to be certain that the default is satisfactory.


    Security is not a 'fit and forget' capability - at the very least the logs need monitoring, and the overall security policy and posture of the system needs periodic review. And this is true of any computer system regardless of operating system!
    Last edited by peterb; 01-10-2009 at 07:38 AM.
    (\__/)
    (='.'=)
    (")_(")

    Been helped or just 'Like' a post? Use the Thanks button!
    My broadband speed - 750 Meganibbles/minute

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Wind tunnel modelling without the wind tunnel?
    By HEXUS in forum HEXUS News
    Replies: 0
    Last Post: 02-12-2008, 02:40 PM
  2. what (firewall+router) ports do i need to open? (rdp over ssh)
    By lanceuppercut in forum Networking and Broadband
    Replies: 0
    Last Post: 24-02-2008, 10:17 AM
  3. Need help building a wind tunnel
    By arthurleung in forum General Discussion
    Replies: 5
    Last Post: 09-10-2005, 10:19 AM
  4. SSH Tunnel
    By Raz316 in forum Software
    Replies: 3
    Last Post: 09-08-2005, 08:06 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •