Is it better to leave my SSH reverse tunnels exposed on a server, or expose them through tcp forwarding?

This is a follow up on When I use SSH tunneling, can I assume that the server does not need to be trusted?
When I am using an intermediate server I to connect to my endpoints via SSH tunnels, is it better if I don’t leave their ports open … Continue reading Is it better to leave my SSH reverse tunnels exposed on a server, or expose them through tcp forwarding?

Why does IPsec use tunnel-mode for an external laptop? Could transport-mode be used? Why can’t a gateway control access in transport-mode?

In an IPsec Secure gateway setup, why is tunnel-mode used when an external laptop wants to access an internal service protected by a firewall? Is tunnel-mode necessary or could transport-mode be used instead? Why can’t a gateway perform ac… Continue reading Why does IPsec use tunnel-mode for an external laptop? Could transport-mode be used? Why can’t a gateway control access in transport-mode?

2 network tunnels from 2 providers to 1 machine running docker, will this expose all containers on both tunnels?

I have a server running multiple docker containers, accessible through tunneling.
I want to create a new tunnel that is separate from the one I already have. Will the new tunnel service interfere or expose the other containers running unde… Continue reading 2 network tunnels from 2 providers to 1 machine running docker, will this expose all containers on both tunnels?

PCI-DSS Compliance: SSL Tunneling Credit Card Information Through A HTTPS Mobile/Residential Proxy Service to A Destination Service

If a PCI compliant service decides to SSL-Tunnel credit card information via an independent residential/mobile proxy service to a destination payment service, would this protocol still be PCI compliant?
Since the credit card information is… Continue reading PCI-DSS Compliance: SSL Tunneling Credit Card Information Through A HTTPS Mobile/Residential Proxy Service to A Destination Service