Solved

Tunneling and SSH and SSL

Posted on 2014-03-26
5
318 Views
Last Modified: 2014-03-26
Why does SSL and SSH require tunneling as part of their protocols

(Sorry for the simple question)
0
Comment
Question by:Anthony Lucia
  • 3
  • 2
5 Comments
 
LVL 33

Accepted Solution

by:
Dave Howe earned 500 total points
ID: 39957276
Hmm.

SSL *is* a tunnelling protocol, and has no meaning outside of that - nobody uses SSL on its own for anything, but uses it to tunnel another protocol - hence, HTTPS is HTTP over SSL (TLS), SMTPS is SMTP over SSL, LDAPS... ah, you get the idea.

SSH is more complex to answer. part of the protocol definition allows both client and server to support tunnelling - there are ways to disable that, but the protocol defines it and it is commonly implemented.  SSH is itself a replacement for telnet, and in some cases (to cisco devices, for example) that is all that is supported. However, SSH can also do much, much more, including using public keys for authentication (similar to how SSL certificates work), tunnelling, proxying, file transfer - its a feature-rich connectivity option.  But the default feature set is to allow you to get a command prompt on a remote server and use that to issue commands - anything else is a bonus :)
0
 
LVL 83

Expert Comment

by:Dave Baldwin
ID: 39957282
Oops.
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 39957289
oops?
0
 
LVL 83

Expert Comment

by:Dave Baldwin
ID: 39957290
I erased my reply cause I like yours better.
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 39957297
aww, I want to see your reply now :)
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s a strangely common occurrence that when you send someone their login details for a system, they can’t get in. This article will help you understand why it happens, and what you can do about it.
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now