Solved

Tunneling and SSH and SSL

Posted on 2014-03-26
5
320 Views
Last Modified: 2014-03-26
Why does SSL and SSH require tunneling as part of their protocols

(Sorry for the simple question)
0
Comment
Question by:Anthony Lucia
  • 3
  • 2
5 Comments
 
LVL 33

Accepted Solution

by:
Dave Howe earned 500 total points
ID: 39957276
Hmm.

SSL *is* a tunnelling protocol, and has no meaning outside of that - nobody uses SSL on its own for anything, but uses it to tunnel another protocol - hence, HTTPS is HTTP over SSL (TLS), SMTPS is SMTP over SSL, LDAPS... ah, you get the idea.

SSH is more complex to answer. part of the protocol definition allows both client and server to support tunnelling - there are ways to disable that, but the protocol defines it and it is commonly implemented.  SSH is itself a replacement for telnet, and in some cases (to cisco devices, for example) that is all that is supported. However, SSH can also do much, much more, including using public keys for authentication (similar to how SSL certificates work), tunnelling, proxying, file transfer - its a feature-rich connectivity option.  But the default feature set is to allow you to get a command prompt on a remote server and use that to issue commands - anything else is a bonus :)
0
 
LVL 83

Expert Comment

by:Dave Baldwin
ID: 39957282
Oops.
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 39957289
oops?
0
 
LVL 83

Expert Comment

by:Dave Baldwin
ID: 39957290
I erased my reply cause I like yours better.
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 39957297
aww, I want to see your reply now :)
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With healthcare moving into the digital age with things like Healthcare.gov, the digitization of patient records and video conferencing with patients, data has a much greater chance of being exposed than ever before.
In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question