I just set this up last week for remote access from home, when the
powers-that-be removed our old access without providing a replacement. We do
not go on the Internet, this is all Intranet, and it works great. It is even
better then the old solution, because now we have colour, and the PF keys
are defined to be similar to our standard Attachmate layout.

> -----Original Message-----
> From: Kern, Thomas [SMTP:[EMAIL PROTECTED]
> Sent: Tuesday, May 13, 2003 11:36 AM
> To:   [EMAIL PROTECTED]
> Subject:      Re: Running ssh under z/VM 4.3
>
> One of the things I was considering as an alternative to SSL-enabled
> TN3270,
> was to set up a userid on my Linux system that had an initial program as
> C3270. Then I could use PuTTY on my workstation to connect to the Linux
> system safely, then the C3270 program could connect across an internal
> connection to the VM stack in the clear but still unsniffable. I haven't
> gotten around to trying it. Has anyone else tried? Succeeded?
>
> /Thomas Kern
> /301-903-2211
>
> > -----Original Message-----
> > From: Adam Thornton [mailto:[EMAIL PROTECTED]
> > Sent: Tuesday, May 13, 2003 10:21
> > To: [EMAIL PROTECTED]
> > Subject: Re: Running ssh under z/VM 4.3
> >
> >
> > n Tue, May 13, 2003 at 10:52:22AM -0400, Alan Altmark wrote:
> > > On Tuesday, 05/13/2003 at 03:47 ZE2, Rene Wiedewilt
> > > <[EMAIL PROTECTED]> wrote:
> > >
> > > > i want to connect via ssh to my z/VM.
> > > > Does tcpip for z/vm 4.3 support ssh?
> > >
> > > No, Rene, it does not.
> >
> > Does an SSH-enabled 3270 client even exist?  I mean, sure you could do
> > line-mode 3215, but, ick.
> >
> > Anyway, VM doesn't natively support it, but you *can* wrap
> > all external
> > communication to VM inside SSH if you want to cheat a little and use a
> > Linux guest as helper.
> >
> > Basically, set up an ssh tunnel (with a passwordless host key) between
> > your desktop and the Linux guest, and on the back end of that on the
> > Linux guest, connect that to netcat to Port 23 of the VM stack, which
> > does not have to be visible to the outside world or indeed attach to a
> > real device.  Then you'd connect your 3270 client to the tunnel end on
> > your localhost; the traffic would be encrypted on the wire,
> > and would be
> > in the clear between the Linux guest and the VM stack--but that piece
> > would only exist within the S/390 anyway, so it's impossible to sniff
> > unless you've already compromised a privileged account on VM or on the
> > Linux guest.
> >
> > Adam
> >

Reply via email to