
In this scenario, a client wishes to connect to a service that does not natively use encryption but does not want the traffic to be sent unencrypted through the Internet. Scenario - Connecting to an insecure service Common SSH clients include OpenSSH and PuTTY for Windows.

The SSH server will need to have access to the listening port on the target server. Network communications between the SSH server and the target server are NOT encrypted by the SSH tunnel (see diagram below), so if the servers are running on different machines, ideally they should be located together on a secure network.Ĭonfiguring an SSH server is beyond the scope of this article, but popular options include OpenSSH for unix-based systems and Bitvise SSH Server for Windows.

The SSH server may be running on the same machine as the target server, or on a different machine.

Secure Shell, or SSH, is used to create a secure channel between a local and remote computer.
