[ Previous ] [ Next ] [ Index ] [ C-Kermit Home ] [ Kermit Home ]

Case Study: Secure Telnet Using C-Kermit 7.1 With Stunnel

Kirk Turner-Rustin, Ohio Wesleyan University

Rev 0.98

Last revised: 16 March 2001

This is a summary of the steps taken at Ohio Wesleyan University to setup secure telnet communication between C-Kermit 7.1 and a telnet daemon wrapped with stunnel. Notes are also included relevant to using Kermit 95 for the client.


Table of Contents
1. Disclaimer
2. Feedback
3. Background
4. Building the Kermit client
5. Setting up the stunnel server
5.1. Building and installing the server
5.2. Creating an RSA certificate signed by our own CA
6. Making the connection
6.1. Starting the secure telnet service
6.2. Connecting from Kermit
7. Remaining Problems
8. Troubleshooting
9. Acknowledgements

1. Disclaimer

In order to protect my employer, I must state that if you try anything that is described in this document, you do so at your own risk. In no way do I or anyone else at Ohio Wesleyan University offer any protection or guarantee as to the suitability of this document or its contents for any use whatsoever. Also, I am not connected in any way with The Kermit Project at Columbia University, other than the fact that I work at a school which has licensed and uses their excellent Kermit product.


2. Feedback

If you have questions about anything described herein and how it worked or didn't work at Ohio Wesleyan, or if you have other feedback about this document (especially corrections to my mistakes), I welcome hearing from you at .


3. Background

I was assigned the job of finding a way of encrypting the telnet traffic between campus staff, who were using Kermit for a telnet client, and our administrative database server, an IBM RS/6000 model F50 running AIX 4.3.

I consulted the