Re: SSH tunneling/port forwarding and stateful packet inspection
From: steve (steph19731_at_yahoo.com)
Date: 25 Feb 2004 15:44:53 -0800
firstname.lastname@example.org (Richard E. Silverman) wrote in message news:<email@example.com>...
> > ... However, in doing a packet trace, I saw that the header of the
> > packet really is ssl traffic, but the actual port 3389 (term server)
> > traffic a) encrypted and b) encapsulated. So as far as teh SPI
> > functionality of the firewall is concerned, it is SSL traffic.
> Your terminology is confused and you want "SSH" here, not "SSL" (these are
> two entirely different protocols) -- but I suppose you've got the idea.
> All the firewall can see is a TCP connection whose contents are entirely
> opaque because they are encrypted. The fact that the connection is being
> to forward traffic between two other TCP connections elsewhere is
> invisible to the firewall.
My terminology is not mixed up. According to my packet trace, because
I have reconfigured SSH to run over port 443 the trace shows it as SSL
traffic. Of course the contents are encrypted. This is my whole
conclusion why the stateful packet inspection capabilities of the
firewall do not blow it going outbound. Because to it, it is just an
SSL packet encapsulating SSH data, which of course is encrypted.