国产 无码 综合区,色欲AV无码国产永久播放,无码天堂亚洲国产AV,国产日韩欧美女同一区二区

ssh | OpenSSH - with TCP port forwarding | ssh通過(guò) tcp轉(zhuǎn)發(fā)數(shù)據(jù) | ssh 隧道

這篇具有很好參考價(jià)值的文章主要介紹了ssh | OpenSSH - with TCP port forwarding | ssh通過(guò) tcp轉(zhuǎn)發(fā)數(shù)據(jù) | ssh 隧道。希望對(duì)大家有所幫助。如果存在錯(cuò)誤或未考慮完全的地方,請(qǐng)大家不吝賜教,您也可以點(diǎn)擊"舉報(bào)違法"按鈕提交疑問(wèn)。

講的會(huì)有點(diǎn)啰嗦
一次抓包 發(fā)現(xiàn)的問(wèn)題
tcpdump -vvv -X -n -i any -s0 host “xx.xx.xx.xx” and port 22 -w xxx.pcap
然后從數(shù)據(jù)中發(fā)現(xiàn)了一問(wèn)題,總所周知,ssh 通過(guò)加密的方式傳遞數(shù)據(jù) 多以 也會(huì)把 ssh 當(dāng)作隧道 通信
然后在抓的數(shù)據(jù)中發(fā)現(xiàn)了一些 tcp協(xié)議的數(shù)據(jù)包,然后分析這些包,全都是建立通信的包,然后再google

OpenSSH provides TCP port forwarding, also known as tunnelling, which allows other TCP applications to forward their network data over a secure SSH connection. In other words, existing TCP applications that do not encrypt their data before sending it across the network can send their network traffic through an SSH channel, thereby securing it.

Without TCP forwarding, an application’s client connections directly to its server across the network, as shown in Figure 1. To use port forwarding, an existing SSH session must exist.

簡(jiǎn)單粗俗的理解,我們使用ssh 對(duì)linux 操作 就是這個(gè)原理,進(jìn)程間的通信本地 client port2001 tcp server port 27 在傳輸數(shù)據(jù)的使用采用ssh 隧道 port 22
所以當(dāng)重點(diǎn)在ssh 隧道時(shí), 數(shù)據(jù)轉(zhuǎn)發(fā) 也就是tcp forword

好像理解這個(gè)也沒(méi)有多大的作用

ssh | OpenSSH - with TCP port forwarding | ssh通過(guò) tcp轉(zhuǎn)發(fā)數(shù)據(jù) | ssh 隧道,綜合部,操作系統(tǒng),tcp/ip,ssh,網(wǎng)絡(luò)

ssh | OpenSSH - with TCP port forwarding | ssh通過(guò) tcp轉(zhuǎn)發(fā)數(shù)據(jù) | ssh 隧道,綜合部,操作系統(tǒng),tcp/ip,ssh,網(wǎng)絡(luò)

ssh | OpenSSH - with TCP port forwarding | ssh通過(guò) tcp轉(zhuǎn)發(fā)數(shù)據(jù) | ssh 隧道,綜合部,操作系統(tǒng),tcp/ip,ssh,網(wǎng)絡(luò)

ssh | OpenSSH - with TCP port forwarding | ssh通過(guò) tcp轉(zhuǎn)發(fā)數(shù)據(jù) | ssh 隧道,綜合部,操作系統(tǒng),tcp/ip,ssh,網(wǎng)絡(luò)

####################################################
有一點(diǎn)需要注意的是,數(shù)據(jù)包中的真實(shí)內(nèi)容如果不采用加密的方式,那誰(shuí)都可以看到,也就是我們常說(shuō)的光膀子跳舞 然后雖然抓包能獲得原始數(shù)據(jù) 比如 以十六進(jìn)制展示,但是 這數(shù)據(jù)的轉(zhuǎn)義后的意義你是不了解的。

###################################################
ssh 通信 原理 流程

Authentication
The first step is that the SSH server and client authenticate themselves to one another. The server sends a certificate to the client to verify that it is the correct server. When making contact, there is the risk that a third party will get between the two participants and therefore intercept the connection. Since the certificate itself is also encrypted, it cannot be imitated. Once the client knows what the correct certificate is, no third parties can contact the relevant server.

After server authentication, however, the client must also identify itself as being authorized to access the server. A password can be used for this purpose. This (or the encrypted hash value of it) is stored on the server. As a result, users must enter their password each time they log onto the different server during the same session. For this reason, there is an alternative method of client-side authentication using the key pair public key and private key.

The private key is created individually for your own computer and secured with a passphrase that should be longer than a typical password. The private key is stored exclusively on your own computer and always remains secret. If you want to establish an SSH connection, just enter the passphrase and you will gain access to the private key.

There are also public keys on the server (just like on the client itself). The server creates a cryptographic problem with its public key and sends this to the client. The server then decrypts the problem with its own private key, sends the solution back, and informs the server that it is allowed to establish a legitimate connection.

During a session, you only need to enter the passphrase once to connect to any number of servers, At the end of the session, users should log off from their local computers to ensure that no third party with physical access to the local computer can connect to the server.

Encryption
After mutual authentication, the two communication participants establish an encrypted connection. To do this, a key is generated for the session, which expires when the session is over. This is not to be confused with the public/private key pairs, which are only used for key exchange. The key used for symmetric encryption is only valid with this one session. Both client and server have the same key, so any messages that are exchanged can be encrypted and decrypted. Client and server create the key simultaneously, but independently of one another. In the so-called key change algorithm, both parties use certain public and secret information to create the key.

Another form of encryption takes place in SSH through hashing. A hash is a form of signature for the transmitted data. An algorithm generates a unique hash from the data. If data is manipulated, the hash value changes automatically. This way the recipient can know whether data has been changed by third parties along the way. The hash values are designed in such a way that they cannot be easily simulated. It’s not possible to create two different transmissions with the same hash – this is known as collision protection.

SSH ports
TCP ports are endpoints that open servers and clients to enable communication. As with a port, the communication partners receive and send the data packets via these ports. TCP has an address space of 16 bits and therefore 65535 ports are available. However, the internet assigned numbers authority (IANA) has assigned a number of ports (exactly 1024) for certain applications, including the SSH port. By default, all SSH connections run on port 22.

##################################################
參考1
參考2文章來(lái)源地址http://www.zghlxwxcb.cn/news/detail-819259.html

到了這里,關(guān)于ssh | OpenSSH - with TCP port forwarding | ssh通過(guò) tcp轉(zhuǎn)發(fā)數(shù)據(jù) | ssh 隧道的文章就介紹完了。如果您還想了解更多內(nèi)容,請(qǐng)?jiān)谟疑辖撬阉鱐OY模板網(wǎng)以前的文章或繼續(xù)瀏覽下面的相關(guān)文章,希望大家以后多多支持TOY模板網(wǎng)!

本文來(lái)自互聯(lián)網(wǎng)用戶投稿,該文觀點(diǎn)僅代表作者本人,不代表本站立場(chǎng)。本站僅提供信息存儲(chǔ)空間服務(wù),不擁有所有權(quán),不承擔(dān)相關(guān)法律責(zé)任。如若轉(zhuǎn)載,請(qǐng)注明出處: 如若內(nèi)容造成侵權(quán)/違法違規(guī)/事實(shí)不符,請(qǐng)點(diǎn)擊違法舉報(bào)進(jìn)行投訴反饋,一經(jīng)查實(shí),立即刪除!

領(lǐng)支付寶紅包贊助服務(wù)器費(fèi)用

相關(guān)文章

  • logstash 消費(fèi)kafka數(shù)據(jù),轉(zhuǎn)發(fā)到tcp端口

    ./bin/logstash -f /xx/xx.yml

    2024年02月09日
    瀏覽(21)
  • 如何在Windows通過(guò)固定tcp公網(wǎng)地址ssh遠(yuǎn)程訪問(wèn)本地Kali Linux

    如何在Windows通過(guò)固定tcp公網(wǎng)地址ssh遠(yuǎn)程訪問(wèn)本地Kali Linux

    本文主要介紹如何在Kali系統(tǒng)編輯SSH配置文件并結(jié)合cpolar內(nèi)網(wǎng)穿透軟件,實(shí)現(xiàn)公網(wǎng)環(huán)境ssh遠(yuǎn)程連接本地kali系統(tǒng)。 默認(rèn)新安裝的kali系統(tǒng)會(huì)關(guān)閉ssh 連接服務(wù),我們通過(guò)命令打開(kāi): 啟動(dòng)后我們查看ssh 狀態(tài),active 表示ssh 正常運(yùn)行 通常ssh 是使用賬號(hào)或者密碼進(jìn)行登錄連接,所以還需要開(kāi)

    2024年04月23日
    瀏覽(21)
  • powershell 接收一個(gè)端口tcp數(shù)據(jù)復(fù)制轉(zhuǎn)發(fā)到多個(gè)目的

    在 PowerShell 中,你可以使用? New-Object ?來(lái)創(chuàng)建? System.Net.Sockets.TcpListener ?和? System.Net.Sockets.TcpClient ?對(duì)象,從而接收一個(gè) TCP 端口的數(shù)據(jù)并將其轉(zhuǎn)發(fā)到多個(gè)目的地。下面是一個(gè) PowerShell 腳本示例,該腳本展示了如何從一個(gè) TCP 端口接收數(shù)據(jù)并將其復(fù)制到多個(gè)目標(biāo)地址: 在這個(gè)

    2024年02月21日
    瀏覽(15)
  • 如何通過(guò)port-forward命令在本地訪問(wèn) k8s 集群服務(wù)

    公眾號(hào)「架構(gòu)成長(zhǎng)指南」,專注于生產(chǎn)實(shí)踐、云原生、分布式系統(tǒng)、大數(shù)據(jù)技術(shù)分享 在我們?cè)L問(wèn)k8s中的pod服務(wù)時(shí),一般通過(guò)node port映射pod端口進(jìn)行訪問(wèn),還有一種是通過(guò)ingress或者istio通過(guò)域名方式來(lái)訪問(wèn),雖然兩種方式能滿足我們需求,但是如果針對(duì)臨時(shí)訪問(wèn),配置起來(lái)還是

    2024年02月04日
    瀏覽(26)
  • docker端口含義(docker容器端口映射、容器內(nèi)部端口)(port/tcp、0.0.0.0:port1->port2/tcp、:::port1->port2/tcp)

    docker端口含義(docker容器端口映射、容器內(nèi)部端口)(port/tcp、0.0.0.0:port1->port2/tcp、:::port1->port2/tcp)

    其中: port/tcp 表示容器內(nèi)部的端口號(hào)和協(xié)議類型; 0.0.0.0:port1-port2/tcp 表示將主機(jī)的端口號(hào)映射到容器內(nèi)部的端口號(hào),其中 0.0.0.0 表示監(jiān)聽(tīng)所有的網(wǎng)絡(luò)接口; :::port1-port2/tcp 表示將主機(jī)的端口號(hào)映射到容器內(nèi)部的端口號(hào),其中 ::: 表示監(jiān)聽(tīng)所有的IPv6網(wǎng)絡(luò)接口。 注意: port/tcp 顯

    2024年02月14日
    瀏覽(12)
  • TCP Port numbers reused

    TCP Port numbers reused

    TCP Port numbers reused - 知乎 (zhihu.com) (608條消息) tcp port numbers reused出現(xiàn)原因_高并發(fā)架構(gòu)的TCP知識(shí)介紹_weixin_39878698的博客-CSDN博客 ?7.5.?TCP Analysis (wireshark.org) 網(wǎng)絡(luò)不通,會(huì)報(bào)? 這個(gè)錯(cuò)誤... (608條消息) tcp port numbers reused出現(xiàn)原因_TCP連接出現(xiàn)大量TimeWait狀態(tài)的連接-原因解析_weixin_3

    2024年01月25日
    瀏覽(17)
  • Nginx:轉(zhuǎn)發(fā)TCP流量

    近日在使用Docker容器部署某代理應(yīng)用的時(shí)候發(fā)現(xiàn),該應(yīng)用監(jiān)聽(tīng)的是127.0.0.1:1080地址,所以正常情況只有本地的程序才能使用該代理,但實(shí)際需要的是局域網(wǎng)或公網(wǎng)用戶都可以訪問(wèn)使用。 該代理應(yīng)用使用的協(xié)議為 http/sock ,因此只要把外部網(wǎng)絡(luò)的 TCP流量 轉(zhuǎn)發(fā)到本地1080端口即可

    2024年02月04日
    瀏覽(13)
  • QT通過(guò)TCP協(xié)議發(fā)送結(jié)構(gòu)體數(shù)據(jù)

    QT通過(guò)TCP協(xié)議發(fā)送結(jié)構(gòu)體數(shù)據(jù)

    做上位機(jī)的時(shí)候下發(fā)數(shù)據(jù),數(shù)據(jù)是一個(gè)結(jié)構(gòu)體,這里就闡述一下怎么通過(guò)TCP協(xié)議發(fā)送結(jié)構(gòu)體。 我自己寫(xiě)的時(shí)候主要通過(guò)兩種方式,一種是memcpy,另一種是用QDataStream。 先在mainwindow.h頭文件中定義結(jié)構(gòu)體: 函數(shù)原型為void *memcpy(void *destin, void *source, unsigned n);函數(shù)的功能是從源

    2024年02月16日
    瀏覽(16)
  • Nginx之TCP端口轉(zhuǎn)發(fā)

    Nginx之TCP端口轉(zhuǎn)發(fā)

    場(chǎng)景:很多企業(yè)業(yè)務(wù)都在云上,數(shù)據(jù)庫(kù)端口基本不會(huì)對(duì)外開(kāi)放。開(kāi)發(fā)、測(cè)試人員經(jīng)常會(huì)有通過(guò)外網(wǎng)去訪問(wèn)數(shù)據(jù)庫(kù)的需求,此時(shí)我們可以利用nginx的端口轉(zhuǎn)發(fā)功能來(lái)實(shí)現(xiàn)。 前提條件 :Nginx實(shí)現(xiàn)TCP端口轉(zhuǎn)發(fā),需要依賴stream模塊,即編譯安裝時(shí)帶 --with-stream --with-stream_ssl_module 參數(shù);

    2024年02月11日
    瀏覽(23)
  • nginx的TCP/UDP轉(zhuǎn)發(fā)

    一、nginx的TCP/UDP轉(zhuǎn)發(fā) ??一)stream模塊 1.9.0版之后nginx開(kāi)始具有TCP/UDP的代理轉(zhuǎn)發(fā)功能, 但需要手動(dòng)安裝stream模塊 用nginx -V命令(注意V是大寫(xiě), 可查詢nginx已安裝模塊)查了一下, 我的nginx是1.16.0版本, 并且已經(jīng)安裝了stream模塊(命令輸出包含--with-stream) ??二)配置 1、概述 TCP轉(zhuǎn)發(fā)的配

    2024年02月10日
    瀏覽(22)

覺(jué)得文章有用就打賞一下文章作者

支付寶掃一掃打賞

博客贊助

微信掃一掃打賞

請(qǐng)作者喝杯咖啡吧~博客贊助

支付寶掃一掃領(lǐng)取紅包,優(yōu)惠每天領(lǐng)

二維碼1

領(lǐng)取紅包

二維碼2

領(lǐng)紅包