Tunneling and SSH and SSL

Posted on 2014-03-26
Medium Priority
Last Modified: 2014-03-26
Why does SSL and SSH require tunneling as part of their protocols

(Sorry for the simple question)
Question by:Anthony Lucia
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
LVL 33

Accepted Solution

Dave Howe earned 2000 total points
ID: 39957276

SSL *is* a tunnelling protocol, and has no meaning outside of that - nobody uses SSL on its own for anything, but uses it to tunnel another protocol - hence, HTTPS is HTTP over SSL (TLS), SMTPS is SMTP over SSL, LDAPS... ah, you get the idea.

SSH is more complex to answer. part of the protocol definition allows both client and server to support tunnelling - there are ways to disable that, but the protocol defines it and it is commonly implemented.  SSH is itself a replacement for telnet, and in some cases (to cisco devices, for example) that is all that is supported. However, SSH can also do much, much more, including using public keys for authentication (similar to how SSL certificates work), tunnelling, proxying, file transfer - its a feature-rich connectivity option.  But the default feature set is to allow you to get a command prompt on a remote server and use that to issue commands - anything else is a bonus :)
LVL 84

Expert Comment

by:Dave Baldwin
ID: 39957282
LVL 33

Expert Comment

by:Dave Howe
ID: 39957289
LVL 84

Expert Comment

by:Dave Baldwin
ID: 39957290
I erased my reply cause I like yours better.
LVL 33

Expert Comment

by:Dave Howe
ID: 39957297
aww, I want to see your reply now :)

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
IF you are either unfamiliar with rootkits, or want to know more about them, read on ....
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question