Tunnelling Using Secure Shell Protocol Computer Science Essay

SSH ( Secure Shell ) is a set of plans used for accessing a distant computing machine or an insecure web firmly, like the Internet. It replaces the “ Berkeley Services ” , which is insecure holding the undermentioned bids: rsh, rlogin, rcp and applications like FTP and Telnet. [ SSH.Com, 2003 ] It uses UNIX/LINUX bid interface, where the user can login in utilizing hallmark and remotely command the web. [ SearchSecurity.Com, 2005 ] It is made up of 3 parts:

“ Transport Layer Protocol ” which gives privateness, hallmark and dependability of the waiter.

This bed normally uses over TCP/IP connexion to run but may even run over other reliable connexion. It is given by SSH-TRANS.

“ User Authentication Protocol ” which will authenticate the user before connexion to server. It is used over the conveyance bed. It is given by SSH-USERAUTH.

“ Connection Protocol ” divides the secure tunnel into many channels which are logical. It is used over the hallmark protocol and is given by SSH-CONNECT. [ Ylonen, Lonvick, 2006 ]

When connexion of the conveyance later is made, the user sends out a service petition.

Get quality help now
Doctor Jennifer
Verified writer

Proficient in: Computer Networking

5 (893)

“ Thank you so much for accepting my assignment the night before it was due. I look forward to working with you moving forward ”

+84 relevant experts are online
Hire writer

After the hallmark of the user is completed, another service petition is sent out. This lets coexistence of new protocols along with the 1s given. There are many utilizations of the connexion protocol. The most common usage is supplying a set up of an synergistic SSH session and tunnelling/forwarding random ports of TCP/IP and connexions of X11. [ Ylonen, Lonvick, 2006 ]

When user sends informations to a web through a computing machine, the SSH codes it automatically. When the receiver gets this coded information, SSH decodes it automatically.

Get to Know The Price Estimate For Your Paper
Number of pages
Email Invalid email

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

"You must agree to out terms of services and privacy policy"
Write my paper

You won’t be charged yet!

The user is non cognizant of the safe cryptography process of informations in the connexion to the web. The coding algorithm is modern and found in assorted applications in large companies which are mission-critical. [ Barrett, Silverman, 2001 ]

SSH prevents any sort of security onslaughts on the informations, like obtaining recognition card Numberss, watchwords etc, altering informations when it is being transferred between users, and forging references of webs or altering the connexions to a waiter that is non existent. [ SSH.Com, 2003 ]

There are 2 versions of SSH. SSH-1 uses many coding algorithms which are patented ( some expired ) and it is exposed to a security jeopardy where information is inserted by a hacker in the watercourse of communicating. SSH-2 is used in OpenSSH suite ( version of connexion tools of SSH – hypertext transfer protocol: //www.openssh.com/ ) which is an jury-rigged version of SSH1 where there is no menace since it uses an advanced “ cardinal exchange ” algorithm. Connections of SSH-1 are non supported by OpenSSH. [ Red Hat Inc, 2005 ]


There is a client/server design, where the SSH plan ( waiter ) allows or naturals any connexions being received to the computing machine it has been installed on. The user runs SSH plans ( client ) on other systems and attempts to do a communicating to the SSH waiter, which is prevented from any alterations. [ Barrett, Silverman, 2001 ] Figure 1 below shows the basic architecture of SSH.

Fig 1. Basic Architecture of SSH [ Media.Wiley.Com, 2003 ]

The procedure is:

Authentication is provided by the client to the SSH waiter. At the beginning of the connexion, the user gets the “ host cardinal ” of the waiter. This key can non be imitated unlike an IP reference.

The waiter verifies the mandate of the user to make connexion to the SSH by look intoing the username and watchword or a “ public key ” which is presented to the client. The whole procedure is done in cryptography.

When the waiter validates the user and he/she is permitted and connexion is made, the SSH session is started between user and SSH. Encrypted communications take topographic point. [ Media.Wiley.Com, 2003 ]

This client/server architecture allows users to hold one authentication/authorization beginning, which lets them entree the SSH service merely and more hallmark is required for the entree to other services like intranet, electronic mail, etc. This individual beginning allows them to entree plans devoid of more usernames/passwords. [ Media.Wiley.Com, 2003 ]


A. Security of Remote Login.

Users connect to their history on assorted computing machines from their computing machine, by first connect to their ISP and so, login in utilizing the Telnet plan. But, the information used to login in like the username and watchword is non unafraid because telnet transportations this information in plaintext format, which is clear and there is a opportunity of a security breach by person. This job does non happen if SSH is being used. Example ; if the username goutami is used to log in on a host computing machine main.host.com, with ssh, this bid used is:

$ ssh -l goutami main.host.com

The login inside informations are coded/encrypted before it is being sent from the host machine through an encrypted connexion. The user is so authenticated by the client and waiter logs the user in and so, the encrypted session starts between the two parties. The coding procedure that takes topographic point in the connexion s transparent. [ Barrett, Silverman, 2001 ] .The encoding is 128 spots, which makes any interrupt informations in a connexion hard to decrypt. [ RedHat.Com, 2005 ]

B. Security of File Transfer

When reassigning a private file between two different logins in two different computing machines over a web ( cyberspace ) , normally email or transfer plans like FTP ( File Transfer Protocol ) , rcp is used, but there is no security utilizing them for transportations as anyone can interfere in the connexion. To avoid this, the file is foremost encrypted utilizing “ PGP ( Pretty Good Privacy ) ” plan on the first history ( goutami @ firstaccount.com ) , so reassign to the 2nd history ( ghanta @ secondaccount.com ) where it is decrypted. But this sort of procedure is strenuous and is non crystalline. Files can be transferred firmly utilizing SSH with a “ unafraid transcript bid ” which is ;

$ scp gfile ghanta @ secondaccount.com:

where gfile is the file name. This bid is run on the firstaccount.com. scp coded the file when it is sent from firstaccount.com and decoded it when it is received by secondaccount.com [ Barrett, Silverman, 2001 ]

C. Security for Execution of Remote Command

If the user is the decision maker ( system ) and wants to run one bid in all the systems ( local country web – Local area network ) , a Unix bid /usr/ucb/w is used. If rsh is configured in the user ‘s computing machine, so it can be used in the signifier of rsh daemon/service ( rshd ) . Assuming there are 4 computing machines in the LAN – black, ruddy, bluish and xanthous, the bid ( Shell Script ) is:

# ! /bin/sh

for machine in black ruddy blue yellow


rsh $ machine /usr/ucb/w


The consequences of the bid are sent as a plaintext through the LAN, which makes it insecure. Alternatively of utilizing rsh, ssh can be used to give the undermentioned bid:

# ! /bin/sh

for machine in black ruddy blue yellow


ssh $ machine /usr/ucb/w


Though the end products are similar in both instances, the consequences and the bid are coded when they are transferred and when connected to a system, hallmark possibly required. [ Barrett, Silverman, 2001 ]

D. Authentication

Having assorted watchwords for histories on different computing machines can be a job when it comes to retrieving them. Users make errors when come ining the watchwords incorrect or in the incorrect topographic point. SSH uses “ keys ” as a method of hallmark alternatively of watchwords. Keies are defined as series of spots which forms an individuality. There are 2 sorts: Public and Private keys. They are kept coded and frequently a passphrase is required to decrypt them. With the aid of the keys and an hallmark plan, the user can be authenticated by SSH to all the system without the demand to come ining all the different watchwords. The procedure is:

First, maintain files ( “ public key files ” ) in the histories, which allows ssh, scp accessing the histories.

Start ssh-agent plan in the local computing machine.

Select keys that is required during login.

With ssh-add, come in the keys into agent which needs the passphrase of the key.

Now, the user has entree to all the computing machines incorporating the public key files without necessitating a watchword. Before login out, stop the ssh-agent bid. [ Barrett, Silverman, 2001 ]

Keies are generated utilizing ssh-keygen. An illustration, given by SSH Communications Security Corp ( www.ssh.com ) , is used to explicate the apparatus. [ SSH.Com, 2003 ] The footings used in this illustration:

RemoteHost = SSH waiter ; RemoteUser = username of the user ; LocalHost = computing machine with SSH Client ;

1. In the constellation files in both distant ( /etc/ssh2/sshd2_config ) and local machine ( /etc/ssh2/ssh2_config ) , the AllowedAuthorisation field should hold the words “ publickey ” , so that mandate of public key is possible.

AllowedAuthentications publickey


Local & gt ; ssh-keygen2

Generating 2048-bit dsa key brace

1 oOo.oOo.o

Key generated.

2048-bit dsa, user @ Local, Wed Mar 22 2002 00:13:43 +0200


Passphrase Again:

Private key saved to /home/user/.ssh2/id_dsa_2048_a

Public key saved to /home/user/.ssh2/id_dsa_2048_a.pub

3. When the passphrase is asked, a sequence of 20 or more characters should be entered. An.ssh2 directory is created by SSH-keygen2, when the hallmark keys are stored in 2 files. One key is private which the user must non portion and must be used along with passphrase ( id_dsa_2048_a ) and the other is a public key which can be shared ( id_dsa_2048_a.pub ) . [ SSH.Com, 2003 ]

E. Control of Access

To let user to entree another user ‘s history for a definite usage, SSH allows this entree without demoing or modifying the watchword of the user. [ Barrett, Silverman, 2001 ]

F. Tunnelling/Port Forwarding

Applications utilizing TCP/IP like file transfer protocol, telnet connexion has increased security when SSH is used. “ Port forwarding ” or “ Tunnelling ” is a method which makes these connexions go through SSH connexion where all informations being transferred is coded from get downing to stop. It besides allows these applications to travel through firewalls in webs which are prevented otherwise. If user wants to link to a web ( illustration, b.white.com ) , which has a firewall that does non let any connexion to all particularly the port for the web ( illustration, port 20 ) , from a system, he/she can utilize SSH protocol, which is allowed by the firewall since it is secured, through a port on the system ( illustration, port 120 ) and make a connexion between the 2 ports. The bid for this is:

$ ssh -L 120: localhost:20 b.white.com

Once the connexion is formed, informations can be transferred between the web and the user ‘s computing machine. [ Barrett, Silverman, 2001 ]

G. Management

Secure direction is maintained utilizing SSH by leting communicating which is coded for any system or direction. It besides makes GUI ( Graphic User Interface ) connexions secure, alternatively of utilizing insecure plans like Telnet, etc. Authentication which is 2-factor based ( public key and watchword ) is provided by SSH for accessing direction methods, because this sort of hallmark prevents any security rear of barrel. SSH besides lessens the costs and add simpleness for administrative intent for system and device direction. The advantages are:

Coded direction.

Coded direction of GUI with tunnelling.

Less cost.

Removes the demand of “ out-of-band ” direction webs.

Simple to utilize.

Authentication based on 2 factors. [ Media.Wiley.Com, 2003 ]

H. Secure Services for Proxy

SSH is used to put up proxy services, which is used for accessing distant devices, systems and application in a secure and simple manner. These placeholders set up a secure traffic of web over webs like the Internet. It is besides used for linking to remote waiters which is found in intra-networks with the aid of HTTP ( Hyper Text Transfer Protocol ) burrowing to the Internet with SSH. This provides security for the web and application when these waiters are accessed. [ Media.Wiley.Com, 2003 ]


For Windows:

WinSCPA ( hypertext transfer protocol: //winscp.net/ ) – which gives a graphical interface for reassigning files firmly.

Freeware SSH and SCP for Windows 9x, NT, ME, 2000 and XPA ( hypertext transfer protocol: //www.jfitz.com/tips/ssh_for_windows.html )

SSH under WindowsA ( hypertext transfer protocol: //www.openssh.com/windows.html ) – with OpenSSH.

PuTTYA ( hypertext transfer protocol: //www.chiark.greenend.org.uk/~sgtatham/putty/ ) – Free execution of Telnet and SSH for Win32

CHAFFEEA ( hypertext transfer protocol: //bmrc.berkeley.edu/people/chaffee/winntutil.html ) – Command-line merely client

sshCEA ( hypertext transfer protocol: //www.movsoftware.com/products/sshce/sshce.htm ) – SSH1 client for Windows CE with VT100/VT52 emulation

For Mac [ except Classic OS ( Operating System ) ] :

OpenSSHA ( hypertext transfer protocol: //www.openssh.com/ )

FuguA ( hypertext transfer protocol: //rsug.itd.umich.edu/software/fugu/ ) – Cocoa interface to SSH, SCP and SFTP.

MacCVSClient and SSHA ( hypertext transfer protocol: //www.heilancoo.net/MacCVSClient/MacCVSClientDoc/ssh-osx.html ) – Using the SSH protocol with MacCVSClient.

Version Control with CVS on Mac OS XA ( hypertext transfer protocol: //developer.apple.com/internet/opensource/cvsoverview.html ) [ Cube Soft Networks, 2010 ]

Fig 2. Screenshot of SSH service after SSH package has been installed on Windowss [ Media.Wiley.Com, 2003 ]


Tunnelling is the encrypted connexion between two computing machines across an insecure web, like the Internet. [ Flickenger, 2001 ]

hypertext transfer protocol: //www.ssh.com/support/documentation/online/ssh/winhelp/32/tunnel1-54.gif

Fig 3 Encrypted Tunnel ( SSH2 ) [ SSH.Com, 2003 ]

This allows users to look into their electronic mail through any web service ( DSL, Modem, Cable, etc ) utilizing the IP reference firmly. There is an hallmark process for the connexion between client and waiter and it possibly connected to a port figure which is fixed, or the larboard figure available is selected for burrowing. [ SSH.Com, 2003 ] Port forwarding is of 2 types:

Local: sends incoming informations from a local port to a certain remote port

Remote control: sends incoming informations from a distant port to a local port. [ SSH.Com, 2003 ]

To put up port forwarding, first SSH connexion has to be set up. The procedure is explained utilizing an illustration, originally illustrated by Rob Flickenger, where the user wants to read his/her electronic mail from a private computing machine utilizing an email client like Microsoft Outlook. It can be done by configuring the email client but the connexion is non unafraid. During informations transportation, there is a opportunity that a hacker may step in and roll up the information or modify it. OpenSSH and SecureCT clients are used.

Measure 1: Connection

In OpenSSH, the undermentioned bid was entered: [ Flickenger, 2001 ]

# ssh -L 110: mailhost:110 -l user -N mailhost

-L 110: mailhost:110 – this portion of the bid creates port send oning. It request SSH to reassign mail from port 110 on the local computing machine to port 110 on the user ‘s computing machine ( distant ) .

mailhost – is the name of the mail waiter or its IP reference

user – name of the user

port 110 – Dad ( Post Office Protocol ) port of the email client.

-N – distant bid should non be executed. [ O’Brien, 2006 ]

In SecureCRT, a connexion was created for the mail waiter. As seen in the screenshot 1 below ( Fig. 4 ) , ssh2 was selected for “ Protocol ” . The name of the mail waiter or IP reference was entered in “ Hostname ” . [ Flickenger, 2001 ]

hypertext transfer protocol: //www.oreillynet.com/wireless/2001/02/23/graphics/scrt1.png

Fig 4. Screenshot 1 [ Flickenger, 2001 ]

Under the “ Advanced ” option, the “ Port Forwarding ” check was selected. 110 was entered for “ local port ” , mail host for “ hostname ” and 110 for “ distant host ” . It was saved. ( Fig 5 ) [ Flickenger, 2001 ]

hypertext transfer protocol: //www.oreillynet.com/wireless/2001/02/23/graphics/scrt2.pngFig 5. Screenshot 2 [ Flickenger, 2001 ]

Once the connexion was made, the user entered his/her username and watchword and the tunnel was created.

Measure 2: Configure

The electronic mail client needed to be configured for the user to have electronic mails through the right “ hostname ” ( localhost and non mailhost ) . Here, Netscape Communicator is used as the electronic mail client.

Under the “ Preference ” option, “ Mail & A ; Newsgroups Tree ” was expanded and “ Mail Servers ” was selected. The current mail waiter for incoming mail was removed and new one was added. Under the “ General ” check, localhost was typed for “ Server Name ” . POP3 was selected for “ Server Type ” and OK was clicked. The electronic mail was now retrievable. ( Fig 6 ) [ Flickenger, 2001 ]

hypertext transfer protocol: //www.oreillynet.com/wireless/2001/02/23/graphics/ns.png

Fig 6: Screenshot 3 [ Flickenger, 2001 ]


It permits a computing machine outside a LAN to link with a computing machine inside the LAN. The most common port forwarding is larboard 21 ( FTP entree ) and port 80 ( web waiters ) . For burrowing to go on, Mac ( OS X ) uses an ipfirewall ( ipfw ) which is pre-installed and Linux uses iptables. [ TopBits.com, 2010 ]


One machine can utilize one port at a clip.

Any machine can link to the forwarded port, doing the connexion small insecure.

The engineering is made in such a manner that the terminal machine acknowledges the incoming informations from a router and non the original computing machine that sends out the information. [ TopBits.com, 2010 ]

Applications and Variations

It is majorly used in schools, offices, places where computing machines are connected to a web ( Internet ) and port forwarding is done between these computing machines if they portion the IP reference. Unix systems encourage port forwarding since the root decision maker merely can entree ports below 1024. The users by and large forward the entrance informations of a low figure port to a higher one.

There are two basic fluctuations of burrowing. The “ Double port forwarding ” is a web of computing machines connected utilizing many routers. Datas from port of one router is forwarded to the other router which forwards to the host of the LAN. The “ Reverse port send oning ” comprises a session waiter and client. Port is connected to the waiter and waiter is connected to the client with the waiter constituent. [ TopBits.com, 2010 ]


VPN ( Fig 7 ) is a web of computing machines which allows users to hold entree to a private web through a public web ( Internet ) . The information from the private web can be shared between the users in VPN and supply privateness and security at the same clip, utilizing burrowing methods, where information is coded when sent and decoded when received. It is besides cost efficient. The added security here is even the receiving and directing references of web is encrypted. [ Collins, Keeley, Waye, 2010 ] It uses hallmark techniques which allow authorized people to link to the web. [ Supprt.Microsoft.com, 2007 ]

Fig 7. VPN [ VPNInfo.com, 2010 ]

To utilize VPN, its client package must be installed in the user ‘s system. There is a firewall between the user ‘s system and the server/host web. Once the system tries to link to the web, the VPN client package gets connected to VPN waiter utilizing the tunnelling method. When the user ‘s hallmark is successful, the connexion ( unafraid tunnel ) between user ‘s computing machine and waiter is formed and informations started acquiring exchanged through this tunnel. They are encrypted when sent, decrypted when received. Though this secure connexion is made through an insecure web, it is considered to be secure for the user ‘s computing machine to be trusted by other computing machines in the web.

VPN client plans are programmed in such a manner that all the IP traffic should travel through the tunnel till the web is active, significance that entree to any information outside the secure web will travel through the firewall merely like when connected physically with a overseas telegram. In that manner, the opportunities of a 3rd party to acquire entree to the web is less. This sort of security is important because other user in the web can non be trusted wholly. Each user would wish to maintain their informations secure and private. The security plays an of import portion when the user accesses the web from a Wi-Fi entree point. [ VPNInfo.com, 2010 ]

The procedure of encoding and tunnelling is done by the SSH. It provided the security required for the web. The following illustration explains the stairss to make VPN tunnel utilizing SSH. Both waiter and client demand to be configured. This illustration was originally given by Erik Meitner. [ Meitner, 2007 ] Before get downing the stairss for constellation, the footings used in the illustration:

Private net =, eth0 on the waiter has public IP, eth1 on the waiter has private IP, VPN web =, tun0 on the waiter has private IP, tun0 on the client has private IP

Client: Key is generated through keygen. In the file /etc/network/interfaces, the followers was added:

face tun0 inet inactive

pre-up ssh -S /var/run/ssh-myvpn-tunnel-control -M -f -w 0:0 true

pre-up slumber 5




up path add -net netmask gw tun0

post-down ssh -S /var/run/ssh-myvpn-tunnel-control -O issue

Waiter: In /etc/ssh/sshd_config file, two keywords were modified:

PermitTunnel point-to-point

PermitRootLogin forced-commands-only

In /root/.ssh/authorized_keys file, the undermentioned bid was added:

tunnel= ” 0 ” , command= ” /sbin/ifdown tun0 ; /sbin/ifup tun0 ” ssh-rsa AAAA..snipped.. == root @ waiter

ssh-rsa is replace with the public key /root/.ssh/id_rsa.pub

In /etc/network/interfaces file, the followers was added:

iface tun0 inet inactive




In /etc/sysctl.conf file, the net.ipv4.conf.default.forwarding was changed to 1

$ sudo sysctl net.ipv4.conf.default.forwarding=1

The system was restarted. When VPN was used:

user @ client: ~ $ sudo ifup tun0

RTNETLINK replies: File exists

run-parts: /etc/network/if-up.d/avahi-autoipd exited with return codification 2

user @ client: ~ $ ping -c 2

Ping ( ) 56 ( 84 ) bytes of informations.

64 bytes from icmp_seq=1 ttl=64 time=96.3 MS

64 bytes from icmp_seq=2 ttl=64 time=94.9 MS

— – Ping statistics — –

2 packages transmitted, 2 received, 0 % package loss, clip 999ms

rtt min/avg/max/mdev = 94.954/95.670/96.387/0.780 MS

user @ client: ~ $ sudo ifdown tun0

Exit petition sent.


SSH can supply security for both simple and large plans. The user does non hold to compromise on security to entree any private informations. This protocol is being used in organisations, infirmaries, schools, etc where secure informations transportation is required. Authentication, which is an of import factor, will guarantee that there is no security menace on any informations. SSH is being used to heighten protocols which were non unafraid. In 2006, an article stated that SSH was traveling to heighten FTP to SFTP ( Secure File Transfer Protocol ) [ AccessmyLibrary.com, 2006 ] As each protocol gets unafraid, more organisations and users will be able to utilize more security in their web, for as old ages go by, the security jeopardy keeps increasing with the figure of aggressors and their package and techniques.

Cite this page

Tunnelling Using Secure Shell Protocol Computer Science Essay. (2020, Jun 02). Retrieved from https://studymoose.com/tunnelling-using-secure-shell-protocol-computer-science-new-essay

Tunnelling Using Secure Shell Protocol Computer Science Essay

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment