All Questions
Tagged with ssh-tunnel security
18
questions
0
votes
0
answers
56
views
How do I create a limited user that can only do SSH port forwarding?
I need to create a user on my server that is restricted to only performing SSH port forwarding. This user should not have any other capabilities, such as reading files or executing commands.
The ...
0
votes
1
answer
2k
views
SSH Tunnel Through Multiple Hosts to Forward Traffic to Device
I am attempting to minimize my Public facing attack surface. Allowing only traffic from a specific IP address. I want to prevent all input access to the remote WAN/Edge Router's management port from ...
1
vote
1
answer
770
views
How can I securely create an autossh tunnel from an untrusted server to a trusted server?
Suppose you have a semi-trusted machine (e.g. one where your business partner's IT department has root access to) sitting behind a firewall and you want to connect to this machine from one of your ...
1
vote
1
answer
431
views
MySQL through SSH Tunnel
I have a php web application (Server A) that accesses MySQL on a remote server (Server B) through an SSH tunnel. Once the tunnel is set up, I can log in and run queries on Server B from Server A ...
0
votes
3
answers
5k
views
Security advantages of a SSH jumphost / jumpserver
I want to learn more about hardening Webservers and currently stopped on the topic Jumphost. So for me it seems like a Jumphost for example is connected to a webserver via VPN and the only server who ...
0
votes
0
answers
142
views
SSH Server Connection over VPN
I connect my VPS over SSH terminal via ssh keys stored in my computer, password login is disabled.
But sometimes I need to surf web behind VPN service which changes public IP for my home computer.
...
-1
votes
2
answers
271
views
set up secure connection over SSH [closed]
I'm setting up a server application which requires to establish a secure connection over SSH2, e.g. a client must open SSH2 connection to the server to reach specific application:
% ssh -s -p5000 my....
0
votes
1
answer
527
views
Weak points of ssh tunnel and x11 server, hack investigation
So, today I've been hacked. It's very puzzling to me how it was done, so I'm looking for experienced people to show weak points in design of my systems.
I have two servers. One is VPS with ...
0
votes
2
answers
939
views
Should I use openVPN or something Else?
I'm in charge of setting up a "walled network" set of servers for a group of employees, but I have no clue where to start. Posted below are the initial requirements, my line of thoughts, and my ...
3
votes
2
answers
10k
views
Windows Jump Host
A Jump Host is a special purpose computer on a network typically used to manage devices in a separate DMZ. So, I'm looking for the proper way to implement this for a target running on Windows.
I was ...
0
votes
2
answers
2k
views
tunneling VNC port and port forwording
I have two machine say A and B. machine A is a public gateway. machine B is in my network and running VNC server on port 6000. I want people should connect on machine A on VNC port say 5900 (unsecured)...
-1
votes
1
answer
174
views
how to set up ssh tunnel to acces administartion space [closed]
My administration space is accessible via a specific port (4848) and I want to block this port to increse security .
I have already disabled remote access to my database too and acces it via ssh ...
0
votes
1
answer
560
views
Is it possible to block specific outbound hostnames for SSH SOCKS users?
Is it possible to block connections to specific hostnames for users accessing the web via an SSH SOCKS proxy?
1
vote
2
answers
844
views
Most secure settings for user dedicated for SSH Tunnel
Due to security reasons, I have created a user on my remote VPS only to use it for SSH tunneling. My local PC goes in hands of many others which scares me because I need to leave that SSH session open....
1
vote
1
answer
224
views
SSH tunnel: can remote system take control of my PC?
that's the simple scenario: from pc A i open a tunnel SSH to a pc B. Can someone, on pc B, use this tunnel to enter or forwarding some protocol to pc A? Can i limit traffic to be generated only from ...