Questions tagged [tunneling]

tunneling refers to a mechanism in which one network protocol encapsulates a different payload protocol.

120 questions
42
votes
3 answers

Security Concerns with X11 Forwarding

What are some of the security concerns and reasons either for or against allowing X11 Forwarding. I have generally taken an approach of not allowing it under the blanket guise of security. Recently, I had a user indicated that they thought that…
John
  • 1,009
  • 3
  • 11
  • 16
25
votes
2 answers

How can I tunnel through an SSH server for application layer protocols such as HTTP/s and FTP?

Are there client programs that allow me to "tunnel" through my SSH enabled server for normal Internet requests such as HTTP(s)? If so what are they and can someone point me in the right direction? Note: I'm not asking about a VPN; I'm specifically…
user13785
24
votes
2 answers

Is telnet secure through SSH tunneling

Firstly sorry, maybe dumb question, but I have one service running on my server which can be operated only by telnet (port 23), but I know that telnet is insecure, so I blocked port 23 in iptables except loopback interface (to be not accessible from…
tomsk
  • 389
  • 2
  • 8
21
votes
5 answers

Do you detect/react to DNS tunnelling?

I've just seen a talk about tunnelling TCP/IP over DNS requests, because port 53 UDP is usually open and unfiltered. What techniques exist to detect and block such tunnels, and have you ever seen that tunnelling on a real network? The technique uses…
user185
18
votes
4 answers

How to use public WiFi safely?

The Dangers of Open Wi-Fi How does one go about sending valuable information (for example inputting email username and password) over a free password-less public WiFi network? The only option that I can think of is ssh-in into a secure server and…
Vorac
  • 1,817
  • 3
  • 20
  • 27
18
votes
6 answers

How does a network admin block the reverse SSH in company?

Given firewall inbound: all are blocked outbound: allow port 80, 443 Problem colleagues are still able to ssh to home device by port 80/443, and establish a reverse ssh tunnel from company to home, and further from home to…
developer.cyrus
  • 317
  • 1
  • 2
  • 5
16
votes
2 answers

How safe is Tor from MITM/snooping attacks?

I am behind an HTTP proxy, and I frequently tunnel out via an ssh -D SOCKS proxy (I have access to a couple of outside servers which I can tunnel to) when the HTTP proxy causes problems1. Now, this works for me, but I have some friends who need a…
Manishearth
  • 8,237
  • 5
  • 34
  • 56
15
votes
1 answer

Does a VPN provide any security benefits over sshuttle or a vanilla ssh tunnel?

I use sshuttle to tunnel my traffic through one of my remote boxes whenever I'm in a cafe or connected to an insecure network. Does a VPN provide any additional security benefit over this kind of setup? What are the pros and cons of a VPN versus an…
chishaku
  • 253
  • 1
  • 6
10
votes
4 answers

Should I tunnel multiple TCP connections through a TLS/SSL tunnel or use TLS/SSL for each connection?

I am developing an application that runs on Windows PCs. The application is able to connect to some kind of devices within a LAN. It can create multiple TCP-connections to the device it is connected to. I want to secure every single TCP-connection…
WMEZ
  • 341
  • 2
  • 11
9
votes
2 answers

What are the security implications of SSH tunneling?

We have an internal lan (not connected to internet, all internal ip addresses, behind a firewall, no routing to outside), we also have a machine that sits on the edge of our lan (two nics, one on the internal lan, one on a public lan that can "see"…
Ali
  • 723
  • 1
  • 9
  • 18
9
votes
2 answers

How to force ALL programs to use my Proxy?

I have a local proxy on my PC. (localhost:8888) But unfortunately there are many programs which are not able to go through this proxy. So how can I force all my programs to go through my local proxy (or tunnel my connections to my local proxy)? So…
planIT
  • 365
  • 1
  • 3
  • 6
9
votes
3 answers

What is the difference between encrypted data and data sent through an encrypted tunnel?

I am looking at different VPN protocols. L2TP does not provide encryption so require IPSec to encrypt the data IPSec tunnel provide encryption to the tunnel What is the difference in terms of the packet that get sent through the link? Can you…
Terry
  • 193
  • 1
  • 4
9
votes
1 answer

Maximum number of nodes with IPSec?

From my understanding, for incoming packets over IPSec, the Security Association (SA) is identified by the SPI field of the ESP header. Then let's say I have a bunch of nodes where each node wants to be able to talk to each other node using IPSec…
mmtauqir
  • 281
  • 3
  • 9
9
votes
4 answers

Computer sending unstopped ICMP echo request to an IP

I noticed while hanging in Microsoft Network Monitor that my computer is sending ICMP echo request to an arbitrary IP address 202.39.253.11. I looked for the owner of this IP and I found it is owned by some Chinese or Taiwanese communication…
Alex Rose
  • 91
  • 1
  • 4
8
votes
4 answers

How to tunnel all network communication?

I'm looking for a way to tunnel all network communication from my laptop through another computer. I can control the software on both the laptop and the computer. The connection between them should be encrypted. Which technique should I use? VPN…
pelli
  • 81
  • 2
1
2 3 4 5 6 7 8