encrypt streaming until public ip

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
0
down vote

favorite












i want to create a web radio station in linux (mint or whatever) with icecast2 and darkice.
my concept is to have a server A in a place who will running the darkice and at server A will recording the mic,
and then the darkice will send the data to a server B that B will be far away and from that place-IP the people will connect and listen to the streaming



my question is can somebody see the data that travel between the server A (private mystic unsafe ip- darkice-radio station) and the server B(public safe IP)



so,in other words i want to set up a web radio in a place A (A external IP), and to give it to the public with another IP (server B)



excuse me for bad english
thnx!







share|improve this question




















  • based on your explanation that you gonna use external IP for server A which is static ip, and a public ip for server B gonna be given for back end client in order to stream ? so kindly confirm which data transportation you gonna use in order to allow us to help you?
    – Î±Ô‹É±Ò½Ôƒ αмєяιcαη
    Dec 5 '17 at 23:56














up vote
0
down vote

favorite












i want to create a web radio station in linux (mint or whatever) with icecast2 and darkice.
my concept is to have a server A in a place who will running the darkice and at server A will recording the mic,
and then the darkice will send the data to a server B that B will be far away and from that place-IP the people will connect and listen to the streaming



my question is can somebody see the data that travel between the server A (private mystic unsafe ip- darkice-radio station) and the server B(public safe IP)



so,in other words i want to set up a web radio in a place A (A external IP), and to give it to the public with another IP (server B)



excuse me for bad english
thnx!







share|improve this question




















  • based on your explanation that you gonna use external IP for server A which is static ip, and a public ip for server B gonna be given for back end client in order to stream ? so kindly confirm which data transportation you gonna use in order to allow us to help you?
    – Î±Ô‹É±Ò½Ôƒ αмєяιcαη
    Dec 5 '17 at 23:56












up vote
0
down vote

favorite









up vote
0
down vote

favorite











i want to create a web radio station in linux (mint or whatever) with icecast2 and darkice.
my concept is to have a server A in a place who will running the darkice and at server A will recording the mic,
and then the darkice will send the data to a server B that B will be far away and from that place-IP the people will connect and listen to the streaming



my question is can somebody see the data that travel between the server A (private mystic unsafe ip- darkice-radio station) and the server B(public safe IP)



so,in other words i want to set up a web radio in a place A (A external IP), and to give it to the public with another IP (server B)



excuse me for bad english
thnx!







share|improve this question












i want to create a web radio station in linux (mint or whatever) with icecast2 and darkice.
my concept is to have a server A in a place who will running the darkice and at server A will recording the mic,
and then the darkice will send the data to a server B that B will be far away and from that place-IP the people will connect and listen to the streaming



my question is can somebody see the data that travel between the server A (private mystic unsafe ip- darkice-radio station) and the server B(public safe IP)



so,in other words i want to set up a web radio in a place A (A external IP), and to give it to the public with another IP (server B)



excuse me for bad english
thnx!









share|improve this question











share|improve this question




share|improve this question










asked Dec 5 '17 at 21:41









stathios

1




1











  • based on your explanation that you gonna use external IP for server A which is static ip, and a public ip for server B gonna be given for back end client in order to stream ? so kindly confirm which data transportation you gonna use in order to allow us to help you?
    – Î±Ô‹É±Ò½Ôƒ αмєяιcαη
    Dec 5 '17 at 23:56
















  • based on your explanation that you gonna use external IP for server A which is static ip, and a public ip for server B gonna be given for back end client in order to stream ? so kindly confirm which data transportation you gonna use in order to allow us to help you?
    – Î±Ô‹É±Ò½Ôƒ αмєяιcαη
    Dec 5 '17 at 23:56















based on your explanation that you gonna use external IP for server A which is static ip, and a public ip for server B gonna be given for back end client in order to stream ? so kindly confirm which data transportation you gonna use in order to allow us to help you?
– Î±Ô‹É±Ò½Ôƒ αмєяιcαη
Dec 5 '17 at 23:56




based on your explanation that you gonna use external IP for server A which is static ip, and a public ip for server B gonna be given for back end client in order to stream ? so kindly confirm which data transportation you gonna use in order to allow us to help you?
– Î±Ô‹É±Ò½Ôƒ αмєяιcαη
Dec 5 '17 at 23:56










1 Answer
1






active

oldest

votes

















up vote
1
down vote













To put it simple, if you are using a non-encrypted protocol such as HTTP, FTP, RTSP. Then yes, in that sutation it would be a typical man-in-the-middle attack.



And the way to overcome your concern is quit simple in Linux.



What you have to do is:



  1. Establish a secure shell connection (SSH) with port forwarding.

  2. Continuously check the connectivity and re-establish upon disconnection.

To establish a connection use the following command:



~$ ssh username@serverIP -D 9999


A good reference:
https://help.ubuntu.com/community/SSH/OpenSSH/PortForwarding






share|improve this answer




















  • A VPN connection may work better, as it would auto-reconnect.
    – Jason Rush
    Dec 5 '17 at 23:34










  • @JasonRush Ya I agree, but that's an added complexity to set-up an VPN server. Also if the connection between the two point is reliable, we should not consider network loss or disconnection.
    – Abdullah
    Dec 7 '17 at 0:49










  • Over the years I've learned not to assume perfect reliability, and (split-tunnel) VPN would also be one less manual step for someone to remember.
    – Jason Rush
    Dec 7 '17 at 1:40










Your Answer







StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "106"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
convertImagesToLinks: false,
noModals: false,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);













 

draft saved


draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f409041%2fencrypt-streaming-until-public-ip%23new-answer', 'question_page');

);

Post as a guest






























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes








up vote
1
down vote













To put it simple, if you are using a non-encrypted protocol such as HTTP, FTP, RTSP. Then yes, in that sutation it would be a typical man-in-the-middle attack.



And the way to overcome your concern is quit simple in Linux.



What you have to do is:



  1. Establish a secure shell connection (SSH) with port forwarding.

  2. Continuously check the connectivity and re-establish upon disconnection.

To establish a connection use the following command:



~$ ssh username@serverIP -D 9999


A good reference:
https://help.ubuntu.com/community/SSH/OpenSSH/PortForwarding






share|improve this answer




















  • A VPN connection may work better, as it would auto-reconnect.
    – Jason Rush
    Dec 5 '17 at 23:34










  • @JasonRush Ya I agree, but that's an added complexity to set-up an VPN server. Also if the connection between the two point is reliable, we should not consider network loss or disconnection.
    – Abdullah
    Dec 7 '17 at 0:49










  • Over the years I've learned not to assume perfect reliability, and (split-tunnel) VPN would also be one less manual step for someone to remember.
    – Jason Rush
    Dec 7 '17 at 1:40














up vote
1
down vote













To put it simple, if you are using a non-encrypted protocol such as HTTP, FTP, RTSP. Then yes, in that sutation it would be a typical man-in-the-middle attack.



And the way to overcome your concern is quit simple in Linux.



What you have to do is:



  1. Establish a secure shell connection (SSH) with port forwarding.

  2. Continuously check the connectivity and re-establish upon disconnection.

To establish a connection use the following command:



~$ ssh username@serverIP -D 9999


A good reference:
https://help.ubuntu.com/community/SSH/OpenSSH/PortForwarding






share|improve this answer




















  • A VPN connection may work better, as it would auto-reconnect.
    – Jason Rush
    Dec 5 '17 at 23:34










  • @JasonRush Ya I agree, but that's an added complexity to set-up an VPN server. Also if the connection between the two point is reliable, we should not consider network loss or disconnection.
    – Abdullah
    Dec 7 '17 at 0:49










  • Over the years I've learned not to assume perfect reliability, and (split-tunnel) VPN would also be one less manual step for someone to remember.
    – Jason Rush
    Dec 7 '17 at 1:40












up vote
1
down vote










up vote
1
down vote









To put it simple, if you are using a non-encrypted protocol such as HTTP, FTP, RTSP. Then yes, in that sutation it would be a typical man-in-the-middle attack.



And the way to overcome your concern is quit simple in Linux.



What you have to do is:



  1. Establish a secure shell connection (SSH) with port forwarding.

  2. Continuously check the connectivity and re-establish upon disconnection.

To establish a connection use the following command:



~$ ssh username@serverIP -D 9999


A good reference:
https://help.ubuntu.com/community/SSH/OpenSSH/PortForwarding






share|improve this answer












To put it simple, if you are using a non-encrypted protocol such as HTTP, FTP, RTSP. Then yes, in that sutation it would be a typical man-in-the-middle attack.



And the way to overcome your concern is quit simple in Linux.



What you have to do is:



  1. Establish a secure shell connection (SSH) with port forwarding.

  2. Continuously check the connectivity and re-establish upon disconnection.

To establish a connection use the following command:



~$ ssh username@serverIP -D 9999


A good reference:
https://help.ubuntu.com/community/SSH/OpenSSH/PortForwarding







share|improve this answer












share|improve this answer



share|improve this answer










answered Dec 5 '17 at 23:04









Abdullah

1717




1717











  • A VPN connection may work better, as it would auto-reconnect.
    – Jason Rush
    Dec 5 '17 at 23:34










  • @JasonRush Ya I agree, but that's an added complexity to set-up an VPN server. Also if the connection between the two point is reliable, we should not consider network loss or disconnection.
    – Abdullah
    Dec 7 '17 at 0:49










  • Over the years I've learned not to assume perfect reliability, and (split-tunnel) VPN would also be one less manual step for someone to remember.
    – Jason Rush
    Dec 7 '17 at 1:40
















  • A VPN connection may work better, as it would auto-reconnect.
    – Jason Rush
    Dec 5 '17 at 23:34










  • @JasonRush Ya I agree, but that's an added complexity to set-up an VPN server. Also if the connection between the two point is reliable, we should not consider network loss or disconnection.
    – Abdullah
    Dec 7 '17 at 0:49










  • Over the years I've learned not to assume perfect reliability, and (split-tunnel) VPN would also be one less manual step for someone to remember.
    – Jason Rush
    Dec 7 '17 at 1:40















A VPN connection may work better, as it would auto-reconnect.
– Jason Rush
Dec 5 '17 at 23:34




A VPN connection may work better, as it would auto-reconnect.
– Jason Rush
Dec 5 '17 at 23:34












@JasonRush Ya I agree, but that's an added complexity to set-up an VPN server. Also if the connection between the two point is reliable, we should not consider network loss or disconnection.
– Abdullah
Dec 7 '17 at 0:49




@JasonRush Ya I agree, but that's an added complexity to set-up an VPN server. Also if the connection between the two point is reliable, we should not consider network loss or disconnection.
– Abdullah
Dec 7 '17 at 0:49












Over the years I've learned not to assume perfect reliability, and (split-tunnel) VPN would also be one less manual step for someone to remember.
– Jason Rush
Dec 7 '17 at 1:40




Over the years I've learned not to assume perfect reliability, and (split-tunnel) VPN would also be one less manual step for someone to remember.
– Jason Rush
Dec 7 '17 at 1:40

















 

draft saved


draft discarded















































 


draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f409041%2fencrypt-streaming-until-public-ip%23new-answer', 'question_page');

);

Post as a guest













































































Popular posts from this blog

How to check contact read email or not when send email to Individual?

Displaying single band from multi-band raster using QGIS

How many registers does an x86_64 CPU actually have?