Obfuscated SSH Tunneling

Obfuscated SSH Tunneling

Obfuscated SSH Tunneling, which is also known as Port Forwarding via SSH, can simply be defined as the process of creating a secure connection in between a remote machine and a local computer through determining the services that can be relayed. This would be an encrypted connection. As a result, it is identified as a useful method available for transmitting information via an unencrypted protocol such as IRC, VNC, HTTP etc.

Before you explore Obfuscated SSH Tunneling in depth, you need to have a clear understanding about the types of port forwarding. As per the existing port forwarding feature of SSH, many different types of Internet traffic can be smuggled into a network or out of the network. This method is being used in order to avoid sniffers or network monitoring. It can also be used for bypassing routers on the internet.

With SSH, three different types of port forwarding are possible. They include:

– Local port forwarding – In here, connections from the SSH client would be forwarded through the SSH server, before they reach the destination server.
– Remote port forwarding – According to remote port forwarding, connections from the SSH server would be forwarded through SSH client and then into the destination server.
– Dynamic port forwarding – Under dynamic port forwarding, connections from different programs would be forwarded through SSH client through the SSH servers and then into destination servers.

Obfuscated SSH Tunneling has become extremely popular in countries such as China. In China, VPN service providers are cracked down on and blocked. In addition, the usage of open source anti-censorship tools has been eliminated. Therefore, Obfuscated SSH Tunneling has become a savior for people in China. Obfuscated SSH Tunneling helps gains access to websites that people want. It is an effective and a convenient method available for them to reach websites, which have been made inaccessible within the country.

ssh dynamic port forwarding

For more detail info please visit Tunneling Protocl and Obfuscated TCP