Restrict SSHChannel usage

Discussion of open issues, suggestions and bugs regarding network security and data protection solution - SecureBridge
Post Reply
alexdanmayer
Posts: 1
Joined: Fri 13 Apr 2018 10:04

Restrict SSHChannel usage

Post by alexdanmayer » Fri 13 Apr 2018 10:15

Hi,

we've downloaded the trail-Version of SecureBridge to test it for our needs.
We want to use it to tunnel TCP traffic via a secure SSHChannel within an application.

It is configured as follows:
The secure channel opens a local port on 45000. This local port is tunneled via the SSH to a the server with a specific service. This service is protected by a firewall from direct accessing it. (The SSH port is protected with private key authentication). We have this setup now working - so far so good.

My question:
Is it possible to restrict the usage of port 45000 from other applications? Only the app, which is opening this port/channel should be able to use it for communication.

Thanks in advance,
Alexander.

ViktorV
Devart Team
Posts: 3168
Joined: Wed 30 Jul 2014 07:16

Re: Restrict SSHChannel usage

Post by ViktorV » Fri 13 Apr 2018 14:35

The TCP protocol architecture does not allow you to implement the functionality you need.
Note that if the TScSSHChannel.GatewayPorts property is set to False (the default value), you can connect to forwarded ports only from the local machine.
You can also use the TScSSHChannel.Direct property. In this case, instead of the TCP protocol, you can directly transfer SSH data to the client.

Post Reply