Built-In Server-to-Server Connectability (?)

  • Thread starter Thread starter sysreset
  • Start date Start date
Click For Summary

Discussion Overview

The discussion revolves around establishing a connection to a remote destination server from a mobile client with varying IP addresses, utilizing an intermediary server with a fixed IP address. Participants explore methods for connecting securely, including the use of SSH and telnet, and discuss the implications of SSL on the connection.

Discussion Character

  • Exploratory
  • Technical explanation
  • Debate/contested

Main Points Raised

  • The original poster seeks to understand how to configure an intermediary server to connect to a destination server while using a mobile client with dynamic IP addresses.
  • One participant suggests that the original poster could use telnet again to connect to the final destination and recommends using SSH for enhanced security.
  • Another participant explains that SSH port forwarding could allow telnet to tunnel over SSH, making it appear as telnet at the remote end.
  • The original poster expresses interest in SSH port forwarding and inquires about the built-in password protection of SSH.
  • A participant clarifies that SSH can use either passwords or shared keys for authentication and emphasizes that all traffic is strongly encrypted.
  • The original poster questions whether the presence of SSL on both the intermediate and destination servers would interfere with SSH encryption.

Areas of Agreement / Disagreement

Participants generally agree on the potential use of SSH for secure connections, but there are unresolved questions regarding the interaction between SSH encryption and SSL on the servers.

Contextual Notes

There are limitations regarding the understanding of SSH configuration, the specifics of the intermediary server setup, and the implications of using SSL in conjunction with SSH.

Who May Find This Useful

This discussion may be useful for individuals interested in server configuration, secure remote connections, and the use of SSH in networking.

sysreset
Messages
137
Reaction score
0
"Built-In" Server-to-Server Connectability (?)

I will try to ask this question coherently.

I am required to connect to a remote destination server from a fixed IP address. However, my computer is mobile and calls from various access points with differing IP addresses. So the solution I have selected is to set up an intermediary server with a fixed IP address that allows me (the client) to connect from any IP address and instruct the intermediary server to call the destination server with my username and password. I am testing this setup using telnet. For example, I transmit "telnet intermediaryserver.com 80" and I am connected to the intermediary server on port 80.

The question is what do I do on the intermediary server? Is there built-in functionality on the server that allows this with commands? Does this function reside in Windows, Linux, or Apache servers?
 
Computer science news on Phys.org


You could just do telnet again to the final destination.
Although ssh would be safer and would remove the need for the fixed ip (assuming that is for security) ssh has key exchange to ensure your machine is the one the server expects.

You can do ssh port forwarding to allow telnet (or other protoocls) to go tunnel over ssh but look like telnet at the remote end.
 


Thanks mgb! From my preliminary reading, ssh port forwarding is exactly what I was looking for. (It appears that the ssh client is built into newer versions of linux, so I just need to make sure the web host I choose includes the ssh client, and permissions to access it.)

Does ssh have built-in password protection?
 


Not sure what you mean by password protection.
You can either enter passwords for each login or use shared keys - either way all the traffic is strongly encrypted. Creating the keys for the first time is a bit tricky if you aren't familiar with the terms but there are lots of tutorials.
 


Oh, the intermediate server and the destination server are both SSL. Would that mess with the ssh encryptation?
 

Similar threads

Replies
3
Views
4K
  • · Replies 4 ·
Replies
4
Views
2K
Replies
4
Views
4K
  • · Replies 12 ·
Replies
12
Views
2K
  • · Replies 8 ·
Replies
8
Views
3K
  • · Replies 9 ·
Replies
9
Views
4K
  • · Replies 29 ·
Replies
29
Views
5K
  • · Replies 5 ·
Replies
5
Views
2K
Replies
4
Views
2K
  • · Replies 15 ·
Replies
15
Views
2K