spk-logo-white-text-short2
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Using SSH to Securely Tunnel a TCP Application

Written by Mike Solinap
Published on June 28, 2012

Often times, I’m caught in a situation where an application or service is not directly accessible to me from the network I’m currently on.  For instance, if I’m at a customer site, I may need VNC or RDP access to a collocated server.  Sure, I could open up port 5901 to the Internet on my firewall, but that would be ill advised, as VNC sends passwords in clear text.  Even still, the site I’m at may have port 5901 outbound blocked.

Similarly, there have been situations where customers have two or more separate networks, joined only by certain multi-homed machines, or privileged machines in terms of router access lists.  How do you then go about accessing a web app, for instance, via those machines?

Take another situation — you’re at the airport looking for public WiFi.  You join a wireless network which you believe is legitimate.  Can you be certain?  When privacy is of concern, I immediately open up an SSH tunnel to my personal Linux machine where a squid proxy is running, and I tunnel all web traffic through that.

Not only does SSH provide encryption, but it can also provide compression.  So applications such as VNC and HTTP further benefit from this, especially when you’re on a WAN link with limited bandwidth.

The list of potential situations where an SSH tunnel would be useful is endless, continue reading to become an SSH tunnel guru in no time.  If you have any unique uses for SSH tunneling, I’d like to hear them!

Michael Solinap
Sr. Systems Integrator
SPK & Associates

Latest White Papers

Which of CISA’s Six Types of SBOMs Are Right for You?

Which of CISA’s Six Types of SBOMs Are Right for You?

Are you interested in different types of SBOMs, but not sure which is right for you? Dive into this eBook to explore six different kinds of SBOMs and when to use them. What You Will Learn In this eBook, you will explore: Six kinds of SBOMs Which SBOM is best for you...

Related Resources

PLM vs. PDM: Understanding the Key Differences for Engineering Teams

PLM vs. PDM: Understanding the Key Differences for Engineering Teams

Accelerating product development, improving product quality, and enhancing collaboration are all main priorities for designers and manufacturers. Achieving these goals requires the proper digital solutions for managing product data and processes. Product Lifecycle...

A Checklist to Optimizing Cloud for Engineering Teams

A Checklist to Optimizing Cloud for Engineering Teams

Is your engineering team truly optimizing the cloud—or just getting by?The cloud holds enormous potential for accelerating innovation, streamlining workflows, and reducing time to market.  But many engineering teams struggle to navigate the complexity of cloud...

Empowering Cloudticity’s Team with Atlassian Training

Empowering Cloudticity’s Team with Atlassian Training

When Cloudticity first purchased Atlassian licensing, their teams were using tools such as Confluence and Opsgenie for information tracking and critical alerts. However, the main tools they were using for task management and ticketing were not under the Atlassian...