encrypt streaming until public ip

Multi tool use
Multi tool use

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
0
down vote

favorite












i want to create a web radio station in linux (mint or whatever) with icecast2 and darkice.
my concept is to have a server A in a place who will running the darkice and at server A will recording the mic,
and then the darkice will send the data to a server B that B will be far away and from that place-IP the people will connect and listen to the streaming



my question is can somebody see the data that travel between the server A (private mystic unsafe ip- darkice-radio station) and the server B(public safe IP)



so,in other words i want to set up a web radio in a place A (A external IP), and to give it to the public with another IP (server B)



excuse me for bad english
thnx!







share|improve this question




















  • based on your explanation that you gonna use external IP for server A which is static ip, and a public ip for server B gonna be given for back end client in order to stream ? so kindly confirm which data transportation you gonna use in order to allow us to help you?
    – Î±Ô‹É±Ò½Ôƒ αмєяιcαη
    Dec 5 '17 at 23:56














up vote
0
down vote

favorite












i want to create a web radio station in linux (mint or whatever) with icecast2 and darkice.
my concept is to have a server A in a place who will running the darkice and at server A will recording the mic,
and then the darkice will send the data to a server B that B will be far away and from that place-IP the people will connect and listen to the streaming



my question is can somebody see the data that travel between the server A (private mystic unsafe ip- darkice-radio station) and the server B(public safe IP)



so,in other words i want to set up a web radio in a place A (A external IP), and to give it to the public with another IP (server B)



excuse me for bad english
thnx!







share|improve this question




















  • based on your explanation that you gonna use external IP for server A which is static ip, and a public ip for server B gonna be given for back end client in order to stream ? so kindly confirm which data transportation you gonna use in order to allow us to help you?
    – Î±Ô‹É±Ò½Ôƒ αмєяιcαη
    Dec 5 '17 at 23:56












up vote
0
down vote

favorite









up vote
0
down vote

favorite











i want to create a web radio station in linux (mint or whatever) with icecast2 and darkice.
my concept is to have a server A in a place who will running the darkice and at server A will recording the mic,
and then the darkice will send the data to a server B that B will be far away and from that place-IP the people will connect and listen to the streaming



my question is can somebody see the data that travel between the server A (private mystic unsafe ip- darkice-radio station) and the server B(public safe IP)



so,in other words i want to set up a web radio in a place A (A external IP), and to give it to the public with another IP (server B)



excuse me for bad english
thnx!







share|improve this question












i want to create a web radio station in linux (mint or whatever) with icecast2 and darkice.
my concept is to have a server A in a place who will running the darkice and at server A will recording the mic,
and then the darkice will send the data to a server B that B will be far away and from that place-IP the people will connect and listen to the streaming



my question is can somebody see the data that travel between the server A (private mystic unsafe ip- darkice-radio station) and the server B(public safe IP)



so,in other words i want to set up a web radio in a place A (A external IP), and to give it to the public with another IP (server B)



excuse me for bad english
thnx!









share|improve this question











share|improve this question




share|improve this question










asked Dec 5 '17 at 21:41









stathios

1




1











  • based on your explanation that you gonna use external IP for server A which is static ip, and a public ip for server B gonna be given for back end client in order to stream ? so kindly confirm which data transportation you gonna use in order to allow us to help you?
    – Î±Ô‹É±Ò½Ôƒ αмєяιcαη
    Dec 5 '17 at 23:56
















  • based on your explanation that you gonna use external IP for server A which is static ip, and a public ip for server B gonna be given for back end client in order to stream ? so kindly confirm which data transportation you gonna use in order to allow us to help you?
    – Î±Ô‹É±Ò½Ôƒ αмєяιcαη
    Dec 5 '17 at 23:56















based on your explanation that you gonna use external IP for server A which is static ip, and a public ip for server B gonna be given for back end client in order to stream ? so kindly confirm which data transportation you gonna use in order to allow us to help you?
– Î±Ô‹É±Ò½Ôƒ αмєяιcαη
Dec 5 '17 at 23:56




based on your explanation that you gonna use external IP for server A which is static ip, and a public ip for server B gonna be given for back end client in order to stream ? so kindly confirm which data transportation you gonna use in order to allow us to help you?
– Î±Ô‹É±Ò½Ôƒ αмєяιcαη
Dec 5 '17 at 23:56










1 Answer
1






active

oldest

votes

















up vote
1
down vote













To put it simple, if you are using a non-encrypted protocol such as HTTP, FTP, RTSP. Then yes, in that sutation it would be a typical man-in-the-middle attack.



And the way to overcome your concern is quit simple in Linux.



What you have to do is:



  1. Establish a secure shell connection (SSH) with port forwarding.

  2. Continuously check the connectivity and re-establish upon disconnection.

To establish a connection use the following command:



~$ ssh username@serverIP -D 9999


A good reference:
https://help.ubuntu.com/community/SSH/OpenSSH/PortForwarding






share|improve this answer




















  • A VPN connection may work better, as it would auto-reconnect.
    – Jason Rush
    Dec 5 '17 at 23:34










  • @JasonRush Ya I agree, but that's an added complexity to set-up an VPN server. Also if the connection between the two point is reliable, we should not consider network loss or disconnection.
    – Abdullah
    Dec 7 '17 at 0:49










  • Over the years I've learned not to assume perfect reliability, and (split-tunnel) VPN would also be one less manual step for someone to remember.
    – Jason Rush
    Dec 7 '17 at 1:40










Your Answer







StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "106"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
convertImagesToLinks: false,
noModals: false,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);













 

draft saved


draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f409041%2fencrypt-streaming-until-public-ip%23new-answer', 'question_page');

);

Post as a guest






























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes








up vote
1
down vote













To put it simple, if you are using a non-encrypted protocol such as HTTP, FTP, RTSP. Then yes, in that sutation it would be a typical man-in-the-middle attack.



And the way to overcome your concern is quit simple in Linux.



What you have to do is:



  1. Establish a secure shell connection (SSH) with port forwarding.

  2. Continuously check the connectivity and re-establish upon disconnection.

To establish a connection use the following command:



~$ ssh username@serverIP -D 9999


A good reference:
https://help.ubuntu.com/community/SSH/OpenSSH/PortForwarding






share|improve this answer




















  • A VPN connection may work better, as it would auto-reconnect.
    – Jason Rush
    Dec 5 '17 at 23:34










  • @JasonRush Ya I agree, but that's an added complexity to set-up an VPN server. Also if the connection between the two point is reliable, we should not consider network loss or disconnection.
    – Abdullah
    Dec 7 '17 at 0:49










  • Over the years I've learned not to assume perfect reliability, and (split-tunnel) VPN would also be one less manual step for someone to remember.
    – Jason Rush
    Dec 7 '17 at 1:40














up vote
1
down vote













To put it simple, if you are using a non-encrypted protocol such as HTTP, FTP, RTSP. Then yes, in that sutation it would be a typical man-in-the-middle attack.



And the way to overcome your concern is quit simple in Linux.



What you have to do is:



  1. Establish a secure shell connection (SSH) with port forwarding.

  2. Continuously check the connectivity and re-establish upon disconnection.

To establish a connection use the following command:



~$ ssh username@serverIP -D 9999


A good reference:
https://help.ubuntu.com/community/SSH/OpenSSH/PortForwarding






share|improve this answer




















  • A VPN connection may work better, as it would auto-reconnect.
    – Jason Rush
    Dec 5 '17 at 23:34










  • @JasonRush Ya I agree, but that's an added complexity to set-up an VPN server. Also if the connection between the two point is reliable, we should not consider network loss or disconnection.
    – Abdullah
    Dec 7 '17 at 0:49










  • Over the years I've learned not to assume perfect reliability, and (split-tunnel) VPN would also be one less manual step for someone to remember.
    – Jason Rush
    Dec 7 '17 at 1:40












up vote
1
down vote










up vote
1
down vote









To put it simple, if you are using a non-encrypted protocol such as HTTP, FTP, RTSP. Then yes, in that sutation it would be a typical man-in-the-middle attack.



And the way to overcome your concern is quit simple in Linux.



What you have to do is:



  1. Establish a secure shell connection (SSH) with port forwarding.

  2. Continuously check the connectivity and re-establish upon disconnection.

To establish a connection use the following command:



~$ ssh username@serverIP -D 9999


A good reference:
https://help.ubuntu.com/community/SSH/OpenSSH/PortForwarding






share|improve this answer












To put it simple, if you are using a non-encrypted protocol such as HTTP, FTP, RTSP. Then yes, in that sutation it would be a typical man-in-the-middle attack.



And the way to overcome your concern is quit simple in Linux.



What you have to do is:



  1. Establish a secure shell connection (SSH) with port forwarding.

  2. Continuously check the connectivity and re-establish upon disconnection.

To establish a connection use the following command:



~$ ssh username@serverIP -D 9999


A good reference:
https://help.ubuntu.com/community/SSH/OpenSSH/PortForwarding







share|improve this answer












share|improve this answer



share|improve this answer










answered Dec 5 '17 at 23:04









Abdullah

1717




1717











  • A VPN connection may work better, as it would auto-reconnect.
    – Jason Rush
    Dec 5 '17 at 23:34










  • @JasonRush Ya I agree, but that's an added complexity to set-up an VPN server. Also if the connection between the two point is reliable, we should not consider network loss or disconnection.
    – Abdullah
    Dec 7 '17 at 0:49










  • Over the years I've learned not to assume perfect reliability, and (split-tunnel) VPN would also be one less manual step for someone to remember.
    – Jason Rush
    Dec 7 '17 at 1:40
















  • A VPN connection may work better, as it would auto-reconnect.
    – Jason Rush
    Dec 5 '17 at 23:34










  • @JasonRush Ya I agree, but that's an added complexity to set-up an VPN server. Also if the connection between the two point is reliable, we should not consider network loss or disconnection.
    – Abdullah
    Dec 7 '17 at 0:49










  • Over the years I've learned not to assume perfect reliability, and (split-tunnel) VPN would also be one less manual step for someone to remember.
    – Jason Rush
    Dec 7 '17 at 1:40















A VPN connection may work better, as it would auto-reconnect.
– Jason Rush
Dec 5 '17 at 23:34




A VPN connection may work better, as it would auto-reconnect.
– Jason Rush
Dec 5 '17 at 23:34












@JasonRush Ya I agree, but that's an added complexity to set-up an VPN server. Also if the connection between the two point is reliable, we should not consider network loss or disconnection.
– Abdullah
Dec 7 '17 at 0:49




@JasonRush Ya I agree, but that's an added complexity to set-up an VPN server. Also if the connection between the two point is reliable, we should not consider network loss or disconnection.
– Abdullah
Dec 7 '17 at 0:49












Over the years I've learned not to assume perfect reliability, and (split-tunnel) VPN would also be one less manual step for someone to remember.
– Jason Rush
Dec 7 '17 at 1:40




Over the years I've learned not to assume perfect reliability, and (split-tunnel) VPN would also be one less manual step for someone to remember.
– Jason Rush
Dec 7 '17 at 1:40

















 

draft saved


draft discarded















































 


draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f409041%2fencrypt-streaming-until-public-ip%23new-answer', 'question_page');

);

Post as a guest













































































E8 Y9j3,ms5X,eZ6u4S1Xgo73Aml IAc
NMGvdiKt PhkpLJzWvR,IIIzeLJ3fZWjsGda1tV2xc Ne DlzS2GQrIjAd,Sg,xevcy,No4sTIPB5l

Popular posts from this blog

How to check contact read email or not when send email to Individual?

How many registers does an x86_64 CPU actually have?

Displaying single band from multi-band raster using QGIS