[index] [text page] [<<start] [<prev] [next>] [last>>]
Page 42: Crypto tunnels with SSH

Page 42

  
  Crypto tunnels with SSH
  Requires SSH on client and server
  Server authentication via SSH host keys
  Client authentication via
  Password, Kerberos, SSH PubKey/Identity authentication, etc
  Several methods to allow secure unattended authentication
  Tunneled connections are encapsulated in the existing SSH TCP connection.

Copyright 2003, Bri Hatch of Onsight, Inc.

Presented at Real World Linux, 2003.

Presentation created using vim and MagicPoint.