Thank you.
You know how we sometimes only have vague understanding that somehow stays 
vague..
Your explanation below popped things into place and cleared the fog I had.
Thanks again!


On Saturday, December 30th, 2023 at 12:26, Jon Perryman <jperr...@pacbell.net> 
wrote:


> On Sat, 30 Dec 2023 04:02:22 +0000, kekronbekron kekronbek...@protonmail.com 
> wrote:
> 
> > So SSH is used for auth and encryption,
> 
> 
> SSH has multiple features. Understand that SSH primary feature is "Secure 
> SHell" where you can issue UNIX commands on a remote UNIX system thru an 
> encrypted connection. You must login to that remote system thru SSH using one 
> of the implemented methods (e.g. userid / password). SSH is delivered on most 
> UNIX systems although it may require some configuration.
> 
> > and mainly just as a tunnel (as the first mail mentioned).
> 
> 
> Port tunneling is a second feature which I believe disables shell commands 
> (never bothered to try it). There's plenty of documentation on the internet 
> (e.g. https://linuxize.com/post/how-to-setup-ssh-tunneling/).
> 
> An unencrypted 3270 connection:
> tn3270 -host MVSsystem.com -port 3270
> 
> Encrypted 3270 connection
> ssh -L localhost:100:MVSsystem.com:3270 unix_use...@mvssystem.com
> TN3270 -host localhost -port 100
> 
> Specifying localhost is important because it limits access to his specific 
> machine. 0.0.0.0 would allow other machines to access MVSsystem.com thru this 
> machine.
> 
> The server and client can be on either side but I always used the client app 
> on the machine issuing the SSH with the server on the other machine.
> 
> > The traffic that's tunnelled may be any protocol or a TCP socket.
> 
> 
> In theory, yes but I've only used it with TCP.
> 
> > and the goal is to just use SSH's ubiquity (say port 22) to make life 
> > easier w.r.t firewalls and all that.
> 
> 
> The goal is encryption which is provided by SSH instead of building it into 
> the application. As for firewalls, I don't see how it changes anything. 
> Firewall implements NAT, filtering, proxy servers and ???. I would think that 
> implementing SSL into the client / server would be more secure.
> 
> > I wonder if spiped fits the bill - https://www.tarsnap.com/spiped.html
> 
> 
> I'm not familiar with SPIPED but from that documentation, it appears it could 
> be used for this purpose. The drawback is that you must install the client.
> 
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to