SSH Security and Tunneling
The cluster focuses on debates about SSH's security for remote access and tunneling, comparisons to VPNs as alternatives, risks of exposing SSH to the internet, and its use in restricted networks like running on port 443 to mimic HTTPS.
Activity Over Time
Top Contributors
Keywords
Sample Comments
That's not mentioned in the article, do you know if it is worse than just normal ssh?
You forgot that SSH can be used to tunnel arbitrary TCP streams. FTP over ssh, http over ssh, etc.
Yes, but it's also ssh functioning in a way people don't know about.
I guess we can't use ssh for everything.
SSH doesn't have to be exposed to the Internet, use VPN.
What makes you say it's not particularly suited for SSH?
Basically why I stay with SSH, it's my poor man's VPN.
How is a VPN more secure than SSH?
Why not just wrap all your SSH packets as HTTPS?
It's definitely not for everyone. Inbound/outbound SSH is usually blocked on corp networks. One of the reasons is you can tunnel/forward ports and expose the internal network. HTTPS takes that away. Plus you can't copy files off the server and the idea is you can audit what is being done. Depends on what the threat is in IMHO.