With the tunnel in place, anyone who tries to monitor the conversation between your laptop and the mail server will get something resembling line noise. You then point your e-mail client to your local POP port, and it thinks it is talking to the remote end (only this time, the entire session is encrypted.) Your SSH client software sets up a port forwarding mechanism, so that traffic that goes to your laptop's POP port magically gets forwarded over the encrypted tunnel and ends up at the mail server's POP port. An SSH tunnel works like this: Rather than connecting to the mail server directly, we establish an SSH connection to the internal network that the mail server lives in (frequently, the mail server itself). To prevent this, you can use the tunneling capabilities of SSH. This login could then be used not only to gain unauthorized access to your e-mail, but in many cases will also grant a shell account on your mail server! If you connect to the machine directly, your e-mail client will send your login and password "in the clear." This means that a nefarious individual somewhere between you and your mail server (either elsewhere on your wireless network, or even "on the wire" if you are separated by an untrusted network) could be listening, and grab a copy of your information en route. You want to retrieve your e-mail from CIMS. Take this typical scenario, you're at work or at home, merrily typing away on your wireless laptop. You don't want to just throw your traffic really hard at the mountain and hope it gets there you want to first form a protected tunnel from you to CIMS, and then send the traffic through it. Picture a mountain of evil internet users sitting between your laptop and the CIMS server. It refers to a connection, usually encrypted, that connects two computers together across another, usually untrusted network. Otherwise, read on for information about SSH tunneling.Ī tunnel is a networking term with an appropriate name. Drive mapping is a simpler process see instructions here. Your CIMS directory can be mounted either by mapping a network drive or by SSH tunneling.
0 Comments
Leave a Reply. |