Tunneling With SSH
Use SSH to create secure tunnels across untrusted networks and hosts. Learn tunneling basics, tunneling GUI applications, tunneling into a machine behind a firewall, SOCKS proxy and other scenerios. The talk is an expansion of my LinuxJournal article.
Need to connect to an intranet? Need to connect back to your home network? Need a VPN, but want more control over what gets forwarded? Use SSH tunnels to create specific, secure connections. SSH, the original VPN. The presentation will include an SSH tunneling primer and more complex examples including forwarding web traffic, forwarding mail, and, of course, forwarding SSH connections. Use reverse connections to get into a home network that doesn't allow inbound SSH traffic. Securely connect across someone else's machine. Use SOCKS to forward arbitrary services. Learn to create and use SSH keys and to use them to limit what command can be run when SSH connects. Learn how you can sometimes run commands via SSH even though your server is thrashing too hard to allow logins. If you're a GNU/Linux system administrator and you don't know how to do all these things please read at least ssh(1), ssh-agent(1), ssh-keygen(1) and sshd(8) and also attend this talk.