question re security risk with SSH tunnelling

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

If an SSH tunnel is created and used to allow say HTTP browser traffic to
occur from client to server, what security risks (if any) are introduced by
this tunnel?  e.g.

- ability for other rogue apps on the client to use the tunnel to get to the
server?
- ability for other rogue apps on the server (with the web app) to use the
tunnel to attach the client?
- does the tunnel effectively "join" the networks? 

Assume for example use of Putty to SSH to the server, but with a tunnel
specified to forward local say port 7777 traffic to the server host xxxx on
port yy.  

Tks




-- 
View this message in context: http://www.nabble.com/question-re-security-risk-with-SSH-tunnelling-tf4933827.html#a14122149
Sent from the SSH (Secure Shell) mailing list archive at Nabble.com.


[Index of Archives]     [Open SSH Unix Development]     [Fedora Users]     [Fedora Desktop]     [Yosemite Backpacking]     [KDE Users]     [Gnome Users]

  Powered by Linux